Posts

Showing posts from July 31, 2019

Daily Deal - City Car Driving, 65% Off

Image
Today's Deal: Save 65% on City Car Driving !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Friday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2K6aWKB"

Daily Deal - Euro Truck Simulator 2, 75% Off

Image
Today's Deal: Save 75% on Euro Truck Simulator 2 !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Friday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2yoTQRP"

Top Three Cross-Site Scripting Attacks You Need to Know Now

Image
Cross-Site Scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users. Cross-Site scripting attacks occur when an attacker can squeeze nasty code into your web application from any input field or functionality where a user can have their input reflected in the source code of your application. The primary issue usually always falls down to sanitizing user input, in other words; it is essential to check the data going into the web application and also where it shows or how it is handled in the output from the site. Easier said than done! A basic concept Let's say you post a comment online like Hello World.. (a cliche example). The web application will then show the text for everyone to see…. If this web application was vulnerable

Top Three Cross-Site Scripting Attacks You Need to Know Now

Image
Cross-Site Scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users. Cross-Site scripting attacks occur when an attacker can squeeze nasty code into your web application from any input field or functionality where a user can have their input reflected in the source code of your application. The primary issue usually always falls down to sanitizing user input, in other words; it is essential to check the data going into the web application and also where it shows or how it is handled in the output from the site. Easier said than done! A basic concept Let’s say you post a comment online like Hello World.. (a cliche example). The web application will then show the text for everyone to see…. If this web application was vulnerable to a cross–site scripting attack then we could inject code into the application! If an attacker can inject code similar to this on your site, they can do all kinds of malicious activity!