The perfect union: Vulnerability Assessment and Penetration Testing (VAPT)

One hundred percent—all of the applications Positive Technologies tested—had some kind of vulnerability. You might think, “Yeah, but how many of those were real, critical vulnerabilities?” Well, ninety-four percent of web applications tested contained a high-severity software flaw. Eighty-five percent of those same applications contained at least one confirmed, exploitable vulnerability.

Here we go again with another Android vulnerability

Many Android devices are susceptible to “Android Installer Hijacking” attacks that have the potential to compromise devices and give illegitimate apps access to sensitive data. This type of attack exploits a vulnerability called “Time-of-Check to Time-of-Use...

Shellshock: The Shock Heard Around the World Wide Web

Shellshock reared its ugly on September 24, 2014 when Stephane Chazelas discovered the bug that is also referred to as Bash Bug or Bashdoor.  Its name(s) comes from the fact that this bug affects the Unix Bash shell, which provides an interface for the UNIX operating...

Attention Kmart Shoppers: Your Data Has Been Breached

The discount retailer known for their Blue Light Specials has been added to the increasingly long list of companies in 2014 that have experienced serious data breaches.  On October 9, 2014 Kmart’s IT team discovered that its payment data systems were hacked.  They...

Dairy Queen Swept Up in Blizzard of Data Breaches

Known for its delicious frozen treats, the Dairy Queen restaurant chain joins the unenviable group of major retailers that has been hacked.  On October 9, 2014, the same day Kmart announced its data breach, Dairy Queen notified its customers that 394 of its 4,500...