Saturday , September 22 2018
Home / IT Security / Black Hat (page 2)

Black Hat

Screensavers and Locked Screens

Screensavers and Locked Screens

Screensavers and Locked Screens: In the past, one of the common ways to gain access to a system to simply look around for an unattended system. In many cases, the system would be left logged in and unlocked by a user who was going to step away “for a moment” …

Read More »

Scripting Errors

Scripting Errors

Scripting Errors: Web applications, programs, and code such as Common Gateway Interface (CGI), ASP.NET and JavaServer Pages (JSP) are commonly in use in web applications and present their own issues. Vulnerabilities such as a lack of input validation scripts can be a liability. A savvy hacker can use a number …

Read More »

Know What Information Is Available

Know What Information Is Available

Know What Information Is Available About You: If you have Google yourself, you have learned firsthand what is available about you online, but you probably missed a quite a bit. If you have not done so already, try Googling yourself: See what types of information are available, and note that …

Read More »

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More Private: The hackers have the complete details of every single individual in Pakistan, their NADRA details, Phone Call Details, Telecom Details, Driving License Details, and if these details go into the wrong hands they can destroy someone innocents life. Behind this all vulnerable Websites, …

Read More »

Session Management Issues

Session Management Issues

Session Management Issues: A session represents the connection that a client has with the server application. The session information that is maintained between the client and the server is important and can give an attacker access to confidential information if compromised. Ideally, a session will have a unique identifier, encryption, …

Read More »