252 posts categorized "ADC Team"

May 02, 2012

Tomorrow is a significant day in the history of the French language. AFNIC, a French organization that manages domain names, will authorize .FR, .RE, .PM, .YT, .WF, and .TF domain owners to register the accented...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (1)

April 10, 2012

Late in 2011, Max Schrems asked Facebook for a profile the social networking company assembled based on his posts, likes and friends. Max received a 1200 page PDF file with lots of personal details. Being...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

April 03, 2012

In yesterday's blog, we described how an RFI/LFI attack worked in the case of militarysingles.com. How do they work in general? Today's blog attempts to describe how these attacks works in the wild. We will...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

April 02, 2012

The most recent Verizon Data Breach report states: Of the 174 million records lost, 100 million (or 58%) were the result of hacktivism against large organizations. No losses had been attributed to hacktivism in previous...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

February 26, 2012

Below you'll find a graphical summary describing the attack sequence used by Anonymous in the attack we recorded. The view the full report, please click on this link to download the PDF (no registration required)....Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)
 Paul Cezanne: Still Life with Skull (Nature morte au crane) You have seen our report featured in the New York Times article which details the people, process and technology used in a failed Anonymous...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

February 07, 2012

As attacks on customers expand beyond banking and popular retail applications, organizations cannot sit on the sidelines and expect the average consumer to avoid infection and mitigate attacks on their own. Fraud is a key--and...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)
In an interview, the Syrian president Assad claims that the 'American psyche can be easily manipulated.' Not as easy to manipulate as his email password, however: Some 78 inboxes of Assad's aides and advisers were...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

January 26, 2012

Today we published our second Web Application Attack Report (WAAR). The full version is available here (no reg required). Last report we described the most common attacks against applications which included SQL injection, Local File...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

January 24, 2012

Yesterday we mentioned that the Polish government experienced numerous DDoS attacks. Today, it is Brazil's turn. This pastebin site shows that several Brazilian government sites were brought down: http://pastebin.com/sSi54WFf Here's an image of a downed...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)