Hacking: Defense

Facebook Twitter

Blog. The past few days has seen an extensive discussion within the IT security industry about a cyberespionage campaign called Turla, aka Snake and Uroburos, which, according to G-DATA experts, may have been created by Russian special services.

Blog

One of the main conclusions also pointed out by research from BAE SYSTEMS, is a connection between the authors of Turla and those of another malicious program, known as Agent.BTZ, which infected the local networks of US military operations in the Middle East in 2008. We first became aware of this targeted campaign in March 2013. This became apparent when we investigated an incident which involved a highly sophisticated rootkit.

We called it the ‘Sun rootkit’, based on a filename used as a virtual file system: sunstore.dmp, also accessible as \\. \Sundrive1 and \\. We are still actively investigating Turla, and we believe it is far more complex and versatile than the already published materials suggest. Agent.btz: a global epidemic or a targeted attack? Hacker's Demo Shows How Easily Credit Cards Can Be Read Through Clothes And Wallets. Scams - report the scam here. SpywareGuide.com - Spyware, Greynets, Privacy, Botnets, Rootkits, Security Resource. Java web applications security. XSS. Web-based applications have become more complex in the recent years as a result of this fact the variety and level of vulnerabilities have also increased significantly.

Java web applications security. XSS

This is the first article out of a series of articles on security of Java web applications particularly powered by JSF, RichFaces and Seam. This article focuses on the XSS attacks and provides recommendations on securing applications against this type of attacks. The second article is focused on the XSRF attacks. Useful information about security audit tools such as Ratproxy will be gathered in the third article.

Overview XSS abbreviation stands for Cross-site Scripting. Vectors XSS attacks could be categorized into two vectors: stored and reflected. The stored attack means that malicious code is permanently stored in a database, a message forum, comments, etc. The reflected attack is delivered to victims via web page, e-mail message. Here is an example taken from YOUmozBlog: XSS aims Simple example <? <? Possible protection.