SEO News

Security Vulnerabilities

RSS
  1. 5 New Website Vulnerabilities Straight from Black Hat & DEF CON

    For instance, XSS (Cross Site Scripting) is one of the most common security vulnerabilities on a website. There has always been the ability to scan for vulnerabilities, but now with the power of Hadoop one researcher HyperionGrey brought to DEF CON...

  2. Responsive Now! The Rise of Front-End Frameworks & Potential Pitfalls to Consider

    For example, take security precautions so you don't open your website to vulnerabilities. Security The majority of complete front-end frameworks are open source. Google's announcement that responsive web design is its preferred method for mobile...

  3. Top 5 Reasons Against Implementing a Tag Management Solution

    If you think about it, any externally-referenced code is susceptible to security vulnerabilities including some analytics software solutions themselves. In many cases, tag management can assist in debugging security vulnerabilities and malicious...

  4. Google Search Warns Users of Bad Websites 12-14 Million Times Daily

    As companies have designed browsers and plugins to be more secure over time, malware purveyors have also employed social engineering, where the malware author tries to deceive the user into installing malicious software without the need for any...

  5. Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web

    Advanced persistent threats require highly equipped and experienced individuals who -- in contrast to lower-level cyber criminals who spread their nets wide to catch as many unwitting suspects as possible -- select a small amount of high yield...

  6. Microsoft's Net Income Increases by 2%

    Microsoft's source code; actual or perceived security vulnerabilities in Microsoft products that could reduce revenue or lead to liability; government litigation and regulation affecting how Microsoft designs and markets its products;

  7. Google Jet Plane Security Threat? And Testing A Sofa In Mountain View

    The article details how certain details could allow someone trying to blow up the plant to know key vulnerabilities. Postscript From Danny: The security concerns voiced in the case made me wonder out details getting out about Google Force One...