Tag Archives | Information-Security




Common Criteria Web Application Security Scoring (CCWAPSS) Released

The purpose of the scoring scale CCWAPSS is to share a common evaluation method for web application security assessments/pentests between security auditors and final customers. This scale does not aim at replacing other evaluation standards but suggests a simple way of evaluating the security level of a web application. CCWAPSS is focused on rating the […]

Topic: Countermeasures, Web Hacking

TJX (T.J. Maxx and Marshall’s) Largest Breach of Customer Data in U.S. History

This case has been going on for a while but obviously hush hush, being that it is the largest breach of customer data in U.S. History. The details of the case have only started emerging in the last couple of months. Information Week published a good article covering what has been going on recently. Amazing […]

Topic: Hacking News, Legal Issues

Vista more secure than Mac OSX and Linux?

Judging by figures alone, Vista is more secure than Mac OSX and Linux? I somehow find this a rather strange claim, I guess these things are always subjective. Most numbers can be moulded into any shape you want, and can show any result you like. According to the numbers given in a new report from […]

Topic: Hacking News

Hackers Steal U.S. Government Corporate Data from PCs – AGAIN

Seems like a social engineering type attack again relying on human ignorance and stupidity. Based around some kind of malware reporting back to a central repository. Remember kids if a deal is too good to be true…it isn’t. Hackers stole information from the U.S. Department of Transportation and several U.S. companies by seducing employees with […]

Topic: Hacking News

The Soft Underbelly? – Database Security

It not surprising SQL Injection and database hacking are getting more frequent as people ramp up perimeter security more often than not they forget about interior security, software application security and most of all database security. Of the 2007 total corporate IT budget, respondents said they have allocated 34 percent for database infrastructure and 20.6 […]

Topic: Database Hacking

Popular Tags

computer-security · darknet · ddos · dos · exploits · fuzzing · google · hacking-networks · hacking-websites · hacking-windows · hacking tool · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · pen-testing · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · windows · windows-security · Windows Hacking · worms · XSS ·