Tag: attacker
A Primer on Evil Twin Wireless Attacks
In a scenario where we are using freely available public wireless networks all the time, security considerations are vital. Wireless attacks can be launched...
Things you should know about Advanced Persistent Threats
As personal, corporate and even national computer systems get subjected to stealthy, continuous cracking processes, it makes sense to be warned and armed. Read...
Securing Apache, Part 8: DoS & DDoS Attacks
In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning...
Securing Apache, Part 6: Attacks on Session Management
In this part of the series, we are going to concentrate on attacks on session management. Application-level attacks on the session is about obtaining...
Securing Apache, Part 5: HTTP Message Architecture
In the last four articles in this series, we have discussed SQL injection, XSS, CSRF, XST and XSHM attacks, and security solutions. This article...
Securing Apache, Part 4: Cross-site Tracing (XST) & Cross-site History Manipulation...
This series of articles addresses the Web security concerns of information security experts, systems administrators and all those who want to jump-start their careers...
Securing Apache, Part 3: Cross-Site Request Forgery Attacks (XSRF)
Intended for information security experts, systems administrators, and all those concerned about Web security, this third article in the series moves on from SQL...
Securing Apache, Part 2: XSS Injections
In the previous article in this series, we started our journey to a secured Apache by dissecting its internals. We then looked at various...