Relative Content

Tag Archive for Hacker’s

Black Hat USA 2010: Constricting the Web: Offensive Python for Web Hackers 1/4

Speakers: Nathan Hamiel, Marcin Wielgoszewski It seems that everything is a web application nowadays. Whether the application is cloud-based, mobile, or even fat client they all seem to be using web protocols to communicate. Adding to the traditional landscape there is rise in the use of application programming interfaces, integration hooks, and next generation web […]

DEFCON 18: Constricting the Web: Offensive Python for Web Hackers 2/4

Speakers: Nathan Hamiel, Marcin Wielgoszewski It seems that everything is a web application nowadays. Whether the application is cloud-based, mobile, or even fat client they all seem to be using web protocols to communicate. Adding to the traditional landscape there is rise in the use of application programming interfaces, integration hooks, and next generation web […]

Hackers exploit chink in Web’s armor

Hackers exploit chink in Web’s armor Attack highlights flaws in a now-antiquated system that gives 650 different organizations, including the Tunisian government, the master keys to Web authentication. Read more on CNET Hackers exploit chink in Web’s armor Attack highlights flaws in a now-antiquated system that gives 650 different organizations, including the Tunisian government, the […]

Hackers find Google’s music cloud

Hackers find Google’s music cloud Google Music Sync is go Android hackers have discovered that Google’s cloud-based music service is up and running, for those prepared to muck about with the internals of Honeycomb at least.… Read more on The Register Magid: Is your data safe in the ‘cloud’? Problems experienced last week by customers […]

‘The Box’ Stops Hackers in Their Tracks

{thumbnail} Wilmette, IL (PRWEB) March 6, 2007 Small business computer networks have become prime targets for hackers. Though most owners believe that their firewalls and virus protection software shield them from the dangers lurking on the Internet, the truth would shock and worry them. However, e-Based Security in Illinois has introduced “The Box,” […]

The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws

The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws ISBN13: 9780470170779 Condition: New Notes: BRAND NEW FROM PUBLISHER! BUY WITH CONFIDENCE, Over one million books sold! 98% Positive feedback. Compare our books, prices and service to the competition. 100% Satisfaction Guaranteed This book is a practical guide to discovering and exploiting security flaws in […]