Web Application Security

Over the past few years, it was known among cyber criminals that they would buy web extensions, modify them by injecting advertisements into websites to generate revenues. However, in recent events, it has become clear that hackers are currently shifting

Google has implemented new protections that should considerably reduce the risk of potentially malicious apps gaining control of users’ Google account. There can be no doubt that the added security is a direct consequence of the massive phishing attack in

A new vulnerability affecting one of the most popular WordPress plugin “WP Statistics” has been discovered allowing SQL Injection attacks to be potentially used. WP Statistics is a plugin that enables administrators to have information regarding the number of users

Password Reset MITM

Researchers have demonstrated that attackers can set up a malicious website and use users account registration process to successfully perform a password reset process on a number of popular websites and messaging mobile applications. The Password Reset Man in the

‘Do I really need to give this website so much about me?’ That’s exactly what I usually think after filling but before submitting a web form online asking for my personal details to continue. I am sure most of you

Scammers are increasingly abusing consumer awareness of sites that encrypt data sent over the internet using HTTPS, particularly through a spike in phishing attacks that hope to win the confidence of victims by using the protocol on spoofed sites. “For

A student uncovered a security vulnerability in the job placement website of Virgin Media that allegedly exposed “about 30,000 to 50,000” applications featuring personal information such as names, home addresses, email details and telephone numbers. In a blog post published

Nearly 5,900 e-commerce sites has been breached by hackers and installed malware that steals victim’s credit card details, according to a security researcher. According to Dutch security analyst Willem De Groot he said that, the hackers gained access to a