Hacking

Results: 3953



#Item
271Computing / Computer security / Cyberwarfare / Hacking / Software testing / Vulnerability / SQL injection / Transport Layer Security / Dynamic SSL

http://www.sektioneins.de Security Problems in Web Applications except Injection Vulnerabilities Stefan Esser <> Ben Fuhrmannek <>

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-02-06 15:51:10
272Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
273

A Visual History of Making transmitters By Tetsuo Kogawa In the earliest stage of our radio transmission, I tried to have a hardware-hacking: transforming ready-made transmitters.

Add to Reading List

Source URL: anarchy.translocal.jp

Language: English - Date: 2014-06-06 11:16:53
    274Software / Computer access control / Computer security / Cryptographic software / Identity management / Hacking / Password manager / Password / Keychain / Cross-site scripting / Clickjacking / Crypt

    Protecting Users Against XSS-based Password Manager Abuse Ben Stock Martin Johns

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    275

    Hacking industry analysis: Analyst relations for startups Donnie Berkholz, Ph.D. Research Director Heavybit, August 2015

    Add to Reading List

    Source URL: d3aeja1uqhkije.cloudfront.net

    - Date: 2015-09-09 19:20:21
      276

      Ethical hacking by C. C. Palmer The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material,

      Add to Reading List

      Source URL: pdf.textfil.es

      Language: English - Date: 2001-09-17 15:04:43
        277

        Research Brief June 2014 The Citizen Lab Police Story: Hacking Team’s Government Surveillance Malware

        Add to Reading List

        Source URL: citizenlab.org

        Language: English - Date: 2015-03-18 14:57:42
          278

          SWISS CYBER STORM Press release Ethical hacking courses to counter skills shortage Yesterday, a dozen young IT enthusiasts gathered in the Kirchenfeld secondary school in Bern to learn more

          Add to Reading List

          Source URL: www.swisscyberstorm.com

          Language: English - Date: 2016-03-03 13:12:35
            279

            Hacking Team Data Review 17JUL15    Overview We  began  our  analysis  by  pulling  down  the  ‘Hacked  Team’1  Github  repository.  Although  this 

            Add to Reading List

            Source URL: www.rooksecurity.com

            Language: English - Date: 2015-07-22 13:38:45
              280Ajax / Hacking / Cross-site scripting / JavaScript / JSONP / JSON / HTTP cookie / Code injection / SQL injection / Exploit / Firefox / JQuery

              25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies Ben Stock

              Add to Reading List

              Source URL: ben-stock.de

              Language: English - Date: 2013-09-09 06:37:05
              UPDATE