Posts From Mo Moin

SQL injection definition Structured Query Language (SQL) injection is a type of attack that can give an adversary complete control over your web application database by inserting arbitrary SQL into a database query. Immortalized by “Little Bobby Drop Tables” in XKCD

Checkpoint experts discovered in the Dark Web an online builder, dubbed Gazorp, that allows crooks to create customized binaries for the Azorult malware. Security researchers from Checkpoint have discovered in the Dark Web an online builder, dubbed Gazorp, that allows crooks to easily create

At its height, the AlphaBay dark web market had 40,000 vendors, more than 400,000 users, and was facilitating more than $600,000 worth of illegal transactions daily. July 2017 saw both AlphaBay and rival marketplace Hansa taken down by law enforcement

The world of finance is under constant attack. The financial information it hosts – along with the money it holds and moves – makes the industry an incredibly attractive target for hackers. According to a report from IBM X-Force, it

CVE-2018-17780 – Security researcher Dhiraj Mishra discovered that Telegram default configuration would expose a user’s IP address when making a call. Strangely tdesktop 1.3.14 and Telegram for windows ( WP8.1) leaks end-user private and public IP address while making calls. .@telegram unsafe default behavior of

In light of the news from the EU that will mean payments of over €30 will require multifactor authentication, please see the below comments from Brett Beranek, General Manager, Security Line of Business, Nuance Enterprise Division. Brett Beranek, General Manager, Security

It is being reported that Facebook said an attack on its computer network led to the exposure of information from nearly 50 million of its users. The company discovered the breach earlier this week, finding that attackers had exploited a feature in Facebook’s code that

The worst suspect is a disconcerting reality, Facebook admitted that advertisers were able to access phone numbers of its users for enhanced security. Researchers from two American universities discovered that that phone numbers given to Facebook for two-factor authentication were also

Following Cisco’s SMB Cybersecurity Report, which has revealed that 53% of midmarket companies have experienced a data breach, Todd Peterson, Product Manager at One Identity, discusses why they are such an attractive target to hackers and how they can protect

In its first enforcement of the Identity Theft Red Flags Rule, the SEC fined Voya Financial Advisors one million dollars for insufficient security policies to protect confidential personal data. Will LaSala, Director Security Solutions, Security Evangelist at OneSpan: “This is

Over ten years ago, five credit unions came together and formed a credit union service organization (CUSO). A majority interest was held by one, very large credit union, which owned all of the technology, had a full-time IT staff and

The zero trust approach to enterprise security proposed by analyst firm Forrester Research nearly a decade ago can be challenging to implement. You need a clear understanding of the changes it entails and the impact it can have on the

Wireshark is the world’s leading network traffic analyzer, and an essential tool for any security professional or systems administrator. This free software lets you analyze network traffic in real time, and is often the best tool for troubleshooting issues on

The computer system in a Florida Keys school district were down for a week due to a ransomware attack. The problems were made worse when just as the district was bringing up some administration and school computers, Comcast suffered a

When travelers at Bristol Airport in the U.K. looked at flight information screens over the weekend, they saw a blue screen with white lettering that stated: OUT OF SERVICE We are sorry for the inconvenience. Our Engineers are currently working