Cross-site request forgery

Results: 270



#Item
101Social engineering / Hacking / Clickjacking / Cross-site request forgery / NoScript / Like button / Confused deputy problem / Google Chrome / HTTP cookie / Software / Computing / Cybercrime

ADAPTIVE USER INTERFACE RANDOMIZATION AS AN ANTI-CLICKJACKING STRATEGY Brad Hill Version 1.0, 18 MayAbstract

Add to Reading List

Source URL: www.thesecuritypractice.com

Language: English - Date: 2012-05-19 00:32:46
102Internet / Cryptographic protocols / Secure communication / Internet privacy / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Cyberwarfare

INTERNET STANDARDS AND WEB SECURITY Jeff Hodges PayPal August 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-08-23 16:12:20
103Risk / Software testing / Hacking / Cross-site scripting / Cross-site request forgery / Vulnerability / Code injection / Remote file inclusion / SQL injection / Cyberwarfare / Computer security / Failure

Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

Add to Reading List

Source URL: www.atlassian.com

Language: English - Date: 2015-05-09 18:02:05
104SQL / Data / Databases / Prepared statement / HTTP / SQL injection / Cross-site request forgery / HTTP cookie / Select / Data management / SQL keywords / Computing

Securing PHP Apps By: Ilia Alshanetsky 1 Let Google be our guide!

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2006-11-01 12:26:43
105HTML / Cross-site scripting / HTML5 / JavaScript / Cross-site request forgery / Canvas element / Web application / GetElementById / HTML5 in mobile devices / Computing / World Wide Web / Markup languages

Investigation Report Regarding Security Issues of Web Applications Using HTML5

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2014-07-30 00:58:55
106Computer network security / Software testing / OWASP / Security / Cross-site scripting / Web application security / Cross-site request forgery / Vulnerability / ColdFusion / Computing / Computer security / Cyberwarfare

Bilal Soylu - Application Security 1 PRACTICAL APPLICATION SECURITY

Add to Reading List

Source URL: boncode.net

Language: English - Date: 2011-10-29 15:46:44
107Internet / Computer security / Computer networking / Hacking / Internet ethics / DNS rebinding / DNS spoofing / Proxy server / Cross-site request forgery / Computing / Computer network security / Domain name system

Intranet Invasion Through Anti-DNS Pinning David Byrne, CISSP, MCSE Security Architect EchoStar Satellite / Dish Network

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
108Uniform resource locator / Cross-site scripting / HTTP cookie / JavaScript / Form / HTTP referer / Web server / Cross-site request forgery / Code injection / Computing / World Wide Web / Cyberwarfare

Advanced Cross Site Scripting by Gavin Zuchlinski http://libox.net Table of Contents

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2003-10-20 16:21:38
109Data / Prepared statement / SQL injection / Cross-site request forgery / Update / HTTP cookie / From / Code injection / Data management / Computing / SQL

PHP Security Pitfalls By: Ilia Alshanetsky 1 Let Google be our guide!

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2007-05-17 18:38:24
110Computer security / HTTP / HTTP cookie / Internet privacy / Clickjacking / Cookiejacking / Cross-site request forgery / Hacking / Computing / Social engineering

Cookiejacking Rosario Valotta Agenda !   Me, myself and I !   The IE security zones

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-28 00:11:29
UPDATE