Cross-site request forgery

Results: 270



#Item
41Computing / Software engineering / Magic quotes / Eval / Cross-site request forgery / This / Software

Securing PHP Survey of the solutions Stanislav Malyshev Most code is extremely buggy…

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
42Computer access control / Computer security / Cryptography / Security / One-time password / Google Authenticator / Sina Weibo / Cross-site request forgery / Authentication / Short Message Service / Multi-factor authentication

Security report for Peatio exchange Peatio is an open source Bitcoin exchange: https://github.com/peatio/peatio    Hijacking the account

Add to Reading List

Source URL: sakurity.com

Language: English - Date: 2016-01-11 15:40:03
43Computing / Cyberwarfare / Computer security / HTML / Cross-site scripting / Hacking / Web applications / Data management / Cross-site request forgery / JavaScript / Web application firewall / SQL injection

PDF Document

Add to Reading List

Source URL: www.elearnsecurity.com

Language: English - Date: 2014-11-24 05:50:21
44Hacking / Clickjacking / Computer security / Software testing / Likejacking / Tapjacking / Penetration test / Like button / Cross-site request forgery / Computing / Facebook / Social engineering

Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing and Clickjacking:

Add to Reading List

Source URL: 2011.zeronights.org

Language: English - Date: 2011-12-28 02:05:06
45Computing / Software testing / Hacking / Vulnerability / Penetration test / Exploit / Threat model / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:36:52
46Cross-platform software / Platform as a service / Cross-site request forgery / Timing attack / Password / Advantage / JavaScript / RSA / HTTP cookie / Cryptography / Computing / Cloud computing

Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2014-12-20 11:41:32
47Cross-site scripting / NTFS / Forensic science / Cross-site request forgery / Microsoft SQL Server / File system / Computer forensics / SQL injection / Computer security / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: 7safe.com

Language: English - Date: 2014-08-08 10:21:40
48Computer security / Data management / Cross-site request forgery / Electronic commerce / SQL injection / Microsoft SQL Server / World Wide Web / Cyberwarfare / Computer network security / Security

PDF Document

Add to Reading List

Source URL: 7safe.com

Language: English - Date: 2015-01-23 11:16:05
49Cyberwarfare / Internet privacy / Cryptographic protocols / Secure communication / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Internet

Web (In)Security: Remediation Efforts Status and Outlook Jeff Hodges Andy Steingruebl PayPal

Add to Reading List

Source URL: kingsmountain.com

Language: English - Date: 2011-02-22 23:56:14
50

Writing Secure WordPress Code CSRF Cross Site Request Forgery

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

- Date: 2015-05-12 07:45:34
    UPDATE