• Home
  • About
  • Services
  • Blog
  • Contact
  • Sign Up
  • Log In
  • Home
  • About
  • Services
  • Blog
  • Contact
  • Sign Up
  • Log In

blog default left sidebar

  1. Home
  2. blog default left sidebar

Recent Posts

  • Broken Authentication and Session Management
  • Cross-Site Scripting (XXS Flaws)
  • Security Misconfiguration and Your Web Applications
  • Is Your Business’s Website Safe From a Hacker’s SQL Injection Attack?
  • Siza Technologies Can Help Prevent Cybercrime and Protect Your Business Assets

Archives

  • June 2018
  • February 2018
  • May 2017
  • April 2017

Categories

  • Announcements
  • Blog
  • Tutorial
  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Search

tags

business email compromise cross site request forgery attack cross site scripting CSRF cybercrime cybercriminals cybersecurity compliance Data Breaches default credentials fake WAP hacking methods HTTPS insecure configuration OS injection flaws penetration testing redirection Security Breaches SQL Injection SQL injection attacks SQL injection prevention tips to prevent security misconfiguration vulnerability scanning watering hole attack website what is CSRF what is SQL injection XSS attacks XSS vulnerability XXS flaws

Flickr Widget

Please insert your Flickr ID

What is an RFI Attack?

[email protected] May 9, 2017 Blog, Uncategorized Comments are off for this post.

Image Credits: Pixabay A remote file incursion (RFI) is a type of computer attack wherein the hacker seeks to exploit...


Test Your Website’s Vulnerability with these Simple Steps

[email protected] May 2, 2017 Blog Comments are off for this post.

Testing the robustness of your website on a periodic basis is crucial to its security. You can take a wide...


Beware of Unvalidated Redirects and Forwards

[email protected] May 2, 2017 Blog Comments are off for this post.

Unvalidated redirects and forwards is a common problem that occurs when a web application trusts or accepts unsecured input that...


Use Siza SQLmap Scan to Shield Your Network

[email protected] May 2, 2017 Blog Comments are off for this post.

Sqlmap is probably the most popular type of SQL injection that is used to hack vulnerable networks. The service has...


Key Takeaways on Vulnerability Scanning

[email protected] April 19, 2017 Blog Comments are off for this post.

Vulnerability scanning is an effective technique that reveals the flaws in systems and networks, but it is not a solution...


Three Lesser Known Hacking Techniques

[email protected] April 19, 2017 Blog Comments are off for this post.

Watering hole attack: This attack is launched at websites that your business and/or employees visit frequently. The attacker may modify...


What You Should Know About Cross-Site Scripting

[email protected] April 19, 2017 Blog Comments are off for this post.

Web application and website users are at the greatest risk of cross-site scripting (XSS), a common attack vector. Here, a...


Help prevent cybercrime with Siza Technologies

[email protected] April 17, 2017 Blog Comments are off for this post.

Siza Technologies Can Help Prevent Cybercrime and Protect Your Business Assets If there is one thing cybercriminals are good at,...


The True Cost of Cybercrime

[email protected] April 15, 2017 Blog Comments are off for this post.

The True Cost of Cybercrime Image Credit: Pixabay There’s no doubt that money is a major motivator for cyber criminals....


Tips to Avoid Security Misconfiguration

[email protected] April 15, 2017 Blog Comments are off for this post.

An application or a platform, database, web server or even a custom code that is insecurely configured can be a...


  • « Previous
  • 1
  • 2
  • 3
  • Next »

Copyright © 2018 Siza Technologies, LLC. All rights reserved.