Posts

ddos attack net of thieves over a computer desk

XSS: The Con-Artist

“XSS” is an acronym you hear often in the field of information…
Boy Programming On Computer With Multiple Monitors And Laptop On Desk

What's a Zero-Day Attack?

Zero-day attack, as cool as it may sound, is one of the most…
employee using laptop and coding injection

Web Vulnerabilities 101: What's SQL Injection?

If you're familiar with the digital or cyber world at all, you…
credit-card-1591492_640

Cyber Attacks on Banks: How Vulnerable is Your Money?

When it comes to online banking, there’s no room for tolerating…
stairs-1229149_1920

Database Encryption: the new trend?

We’ve talked quite a bit about database encryption in this…
stairs-1229149_1920

Website Defacement - What is it?

Website defacement is hard to imagine but visualize this —you…
employee using laptop and coding injection

Web Security: Why Does It Matter?

Once upon a time, to access the web we had to have access to…
Threat Report 2015-2

Web Application Threat Trends: Penta Security Systems Releases Bi-Annual Report

Second half of 2015 sees sharp increases in hacking attempts…
profile

Penta Security releases “AutoCrypt,” a solution for intelligent vehicle security

Integrated technologies that are mandatory for intelligent vehicle…
profile

Web Security for Financial Institutions

Financial institutions express high customer satisfaction with…