• Home
  • About
  • Services
  • Blog
  • Contact
  • Sign Up
  • Log In
  • Home
  • About
  • Services
  • Blog
  • Contact
  • Sign Up
  • Log In

Blog

  1. Home
  2. Blog
Broken Authentication and Session Management
Broken Authentication and Session Management
June 24, 2018 | Comments are off for this post.

User authentication and session management refer to a website verifying the user is who they say they are (authentication) and...

Read More
Cross-Site Scripting (XXS Flaws)
Cross-Site Scripting (XXS Flaws)
June 24, 2018 | Comments are off for this post.

Cross-Site Scripting, abbreviated as XSS, is a type of cyberattack that uses injection. The cyberattacker’s scripts are cleverly fed to...

Read More
Security Misconfiguration and Your Web Applications
Security Misconfiguration and Your Web Applications
June 24, 2018 | Comments are off for this post.

Security Misconfiguration on your website or web-based applications is preventable if you care about cybersecurity for your business and those...

Read More
Is Your Business’s Website Safe From a Hacker’s SQL Injection Attack?
Is Your Business’s Website Safe From a Hacker’s SQL Injection Attack?
June 24, 2018 | Comments are off for this post.

SQL Injection is one of the most common web hacking techniques there is. If your business’s website isn’t protected, it...

Read More
Siza Technologies Can Help Prevent Cybercrime and Protect Your Business Assets
Siza Technologies Can Help Prevent Cybercrime and Protect Your Business Assets
June 24, 2018 | Comments are off for this post.

If there is one thing cybercriminals are good at, it is finding weaknesses and security loopholes in technology. While small...

Read More
How to Use the Website’s Services
How to Use the Website’s Services
February 26, 2018 | Comments are off for this post.

Read More
How secure is WebDAV?
How secure is WebDAV?
February 26, 2018 | Comments are off for this post.

WebDAV, a popular HTTP extension, is one of the best transfer protocols on the web. As the protocol has been...

Read More
What Is An Os Commanding Scan?
May 10, 2017 | Comments are off for this post.

An OS command injection is an attack in which a malicious hacker hacks a system via a web interface or...

Read More
What is missing function level access control?
May 10, 2017 | Comments are off for this post.

According to the Open Web Application Security Project (OWASP), missing function level access control is one of the most common...

Read More
SQL Injections can Take Out Entire Networks
May 9, 2017 | Comments are off for this post.

Image Credits: Pixabay SQL injections are often underestimated as they are mostly known as attack vectors designed to exploit tiny...

Read More
What is an RFI Attack?
May 9, 2017 | Comments are off for this post.

Image Credits: Pixabay A remote file incursion (RFI) is a type of computer attack wherein the hacker seeks to exploit...

Read More
Test Your Website’s Vulnerability with these Simple Steps
May 2, 2017 | Comments are off for this post.

Testing the robustness of your website on a periodic basis is crucial to its security. You can take a wide...

Read More
Beware of Unvalidated Redirects and Forwards
May 2, 2017 | Comments are off for this post.

Unvalidated redirects and forwards is a common problem that occurs when a web application trusts or accepts unsecured input that...

Read More
Use Siza SQLmap Scan to Shield Your Network
May 2, 2017 | Comments are off for this post.

Sqlmap is probably the most popular type of SQL injection that is used to hack vulnerable networks. The service has...

Read More
Key Takeaways on Vulnerability Scanning
April 19, 2017 | Comments are off for this post.

Vulnerability scanning is an effective technique that reveals the flaws in systems and networks, but it is not a solution...

Read More
Three Lesser Known Hacking Techniques
April 19, 2017 | Comments are off for this post.

Watering hole attack: This attack is launched at websites that your business and/or employees visit frequently. The attacker may modify...

Read More
What You Should Know About Cross-Site Scripting
April 19, 2017 | Comments are off for this post.

Web application and website users are at the greatest risk of cross-site scripting (XSS), a common attack vector. Here, a...

Read More
Help prevent cybercrime with Siza Technologies
April 17, 2017 | Comments are off for this post.

Siza Technologies Can Help Prevent Cybercrime and Protect Your Business Assets If there is one thing cybercriminals are good at,...

Read More
The True Cost of Cybercrime
April 15, 2017 | Comments are off for this post.

The True Cost of Cybercrime Image Credit: Pixabay There’s no doubt that money is a major motivator for cyber criminals....

Read More
Tips to Avoid Security Misconfiguration
April 15, 2017 | Comments are off for this post.

An application or a platform, database, web server or even a custom code that is insecurely configured can be a...

Read More
What is CSRF?
April 15, 2017 | Comments are off for this post.

Cross site request forgery (CSRF) is one of the more creative cyber attacks affecting both individuals and businesses. Say you...

Read More
SQL Injection : Common but Lethal
April 15, 2017 | Comments are off for this post.

You ask a user for his/her username or id to add to the input boxes of your front-end web application.The...

Read More
Welcome to Siza Technologies
April 3, 2017 | Comments are off for this post.

Welcome to our new blog. We will be adding content soon. Stay tuned for updates…

Read More

Search

Recent Posts

  • Broken Authentication and Session Management
  • Cross-Site Scripting (XXS Flaws)
  • Security Misconfiguration and Your Web Applications
  • Is Your Business’s Website Safe From a Hacker’s SQL Injection Attack?
  • Siza Technologies Can Help Prevent Cybercrime and Protect Your Business Assets

Copyright © 2018 Siza Technologies, LLC. All rights reserved.