The Latest in IT Security

Posts Tagged ‘web applications’

Well, really there are far more, but the latest study from Imperva of 10 million attacks against 30 large organizations from January to May of 2011 cites a cocktail of techniques used by would-be hackers to spot the weaknesses and exploit them. For those of us who’ve tailed a log file spinning out of control […]

Read more ...

10
Jun
2011

Project Analyst (m/f) Posted: 10 June 2011 Company name: Avira GmbH Location: Tettnang Germany Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:Avira GmbH is expanding and developing nationally and internationally. In order to expand our web development team, we are searching for a Project Analyst (m/f) Job […]

Read more ...

By my count this is unlucky hack number 13 for Sony. A Lebanese hacker known as Idahc dumped another user database at Sony Europe containing approximately 120 usernames, passwords (plain text), mobile phone numbers, work emails and website addresses. The attacker claims that he used standard SQL injection techniques to acquire the database. I think […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments