HTTP Parameter Pollution Vulnerabilities in Web Applications
Friday, January 20, 2017
Posted by Cyber Security ...
Reader's rate:
0
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters in the URL and requested body which causes the Cross Site Scripting or Privilege Escalation or bypass Authorization.   Introduction HPP affects... + continue reading
Safeguard Yourself Against Scareware Attacks !
Friday, January 20, 2017
Posted by Cyber Security ...
Reader's rate:
0
Scareware infections are malicious pieces of software which pose as legitimate anti-virus programs. It is the simplest type of ransomware also called as deception software and the purpose is to frighten people into purchasing and installing it by bombarding you with alerts and pop-ups.... + continue reading
Key Principles to maintain Privacy and Confidentiality
Thursday, January 19, 2017
Posted by Hussainali Ladha
Reader's rate:
0
The Key Principles for the foundation of commitment to maintain Privacy and Confidentiality are as follows:   I. Transparency: Organization needs to be transparent about the collection and use of PII and Customer Data. Unit that collect PII and Customer Data must disclose to... + continue reading
Friday, January 13, 2017
Posted by Lilibeth Hanlon
Reader's rate:
0
Released Jan 10, 2017 https://www.nist.gov/cyberframework/draft-version-11 NEW REVISION: Cyber Supply Chain Risk Management – The organization can quickly and efficiently account for emerging cyber supply chain risks using real-time or near real-time information and leveraging an... + continue reading
Win a Career in TCS Cyber Security Team
Thursday, January 12, 2017
Posted by Cyber Security ...
Reader's rate:
0
Win a Career in TCS’ Cyber Security Team and grab a chance to be associated with the history of the contest as the Winner of the Inaugural Edition. Welcome to HackQuest, TCS Ethical Hacking Contest for students passing out in 2017.   Eligibility Criteria: Open for... + continue reading
HTTP Parameter Pollution Vulnerabilities in Web Applications
Safeguard Yourself Against Scareware Attacks !
Key Principles to maintain Privacy and Confidentiality
Win a Career in TCS Cyber Security Team

Home Page

Security Articles

HTTP Parameter Pollution Vulnerabilities in Web Applications
34views
reads
11 today
Friday, 20/01/17 - 0 comment(s)
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters in the URL and requested body which causes the Cross Site Scripting... + continue reading

Best Practices

22
reads
5 today
Friday, 13/01/17 - 0 comment(s)
Released Jan 10, 2017 https://www.nist.gov/cyberframework/draft-version-11 NEW REVISION: Cyber Supply Chain Risk Management – The organization can quickly and efficiently account for emerging... + continue reading

Security News

Win a Career in TCS Cyber Security Team
Thursday, 12/01/17
122views
reads
6 today
0 comment(s)
Win a Career in TCS’ Cyber Security Team and grab a chance to be associated with the history of the contest as the Winner of the Inaugural Edition. Welcome to HackQuest, TCS Ethical... + continue reading

Snippets

Steps to check quadrooter vulnerability in android devices
Views:
403
reads
4 today
Friday, 23/09/16 - 0 comment(s)
In the article , we have seen how an attacker can gain root level access to android devices by exploiting QuadRooter vulnerability. Many Qualcomm based Android devices are affected by... + continue reading

Recent Posts

HTTP Parameter Pollution Vulnerabilities in Web Applications
Views:
34
reads
11 today
Friday, 20/01/17 - 0 comment(s)
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters in the URL and requested body which causes the Cross Site Scripting... + continue reading

This Month Most Popular

Featured Articles

HTTP Parameter Pollution Vulnerabilities in Web Applications
Friday, 20/01/17
Total views: 34
0 comment(s)
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters in the URL and requested body which causes the Cross Site Scripting or Privilege Escalation or bypass Authorization.   Introduction HPP affects both Server side as well as Client Side components as... + continue reading
Safeguard Yourself Against Scareware Attacks !
Friday, 20/01/17
Total views: 32
0 comment(s)
Scareware infections are malicious pieces of software which pose as legitimate anti-virus programs. It is the simplest type of ransomware also called as deception software and the purpose is to frighten people into purchasing and installing it by bombarding you with alerts and pop-ups.   Scareware will attach themselves to infected... + continue reading
Key Principles to maintain Privacy and Confidentiality
Thursday, 19/01/17
Total views: 32
0 comment(s)
The Key Principles for the foundation of commitment to maintain Privacy and Confidentiality are as follows:   I. Transparency: Organization needs to be transparent about the collection and use of PII and Customer Data. Unit that collect PII and Customer Data must disclose to individuals and customers how PII and Customer Data will... + continue reading
Friday, 13/01/17
Total views: 22
0 comment(s)
Released Jan 10, 2017 https://www.nist.gov/cyberframework/draft-version-11 NEW REVISION: Cyber Supply Chain Risk Management – The organization can quickly and efficiently account for emerging cyber supply chain risks using real-time or near real-time information and leveraging an institutionalized knowledge of cyber supply chain risk... + continue reading