Whitepaper called Anti-Fraud Image Solutions - The Use Of Distribution Tracing Within Web Content To Identify Counterfeiting Sources.
b9fe2c5926e1fdc309e98785e517a3dfb8ccf9d52c4c01eab58053100d2be83e
Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg".
ce547d6e607ecd39cfd126ab4728d62ffb1f7731c73fcc2dafca170a94c6e6fd
Authentication processes in web-based applications are frequently vulnerable to automated brute force guessing attacks. Whilst commonly proposed solutions make use of escalating time delays and minimum lockout threshold strategies, these tend to prove ineffectual in real attacks and may actually promote additional attack vectors. Resource metering through client-side computationally intensive "electronic payments" can provide an alternative strategy in defending against brute force guessing attacks. This whitepaper discusses how such a solution works and the security advantages it can bring.
15245aa7f4bb6184fef5aa8d48258f1200f40a2d9cf75e582ce17ce1140f0645
Whitepaper discussing the best security practices for host naming and URL conventions.
e9a5dc480f6839ca756e12580e639976fae0181c72d56978a013e4263afab1cb
Whitepaper discussing how injection of data can later be used to carry out an attack at a different point in time.
382baf0d9e247ca98e6e8644e2f15a095fb8b043e6c0d2995b5f0c01175b6c68
White paper from NGS Software that covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organizations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.
6a8bb1037838fd20da9753a4b17817d78de7a39a7eb9c8bab70ab301084599f3