FORGOT YOUR DETAILS?

YOU ARE HERE: HOME GeneralVulnerability

Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer. This is how it works: An email arrives, apparently from a trustworthy source, but instead it leads

Mobile application security scanner or vulnerability scanner are purpose built tool or system cater for mobile application security concern and requirement. Test mobile apps to the appropriate depth Not all mobile applications are created equal when it comes to security assurance. A simple marketing application may just need a fast automated scan with each incremental

Non-Persistent vs Persistent XSS Vulnerabilities Cross-site scripting (XSS) vulnerabilities can be classified into two types: Non-persistent (or reflected) cross-site scripting vulnerabilities occur when the user input is reflected immediately on the page by server-side scripts without proper sanitization. Reflected XSS vulnerabilities are the most common type. Persistent (or stored) cross-site scripting vulnerabilities occur when user

TOP