Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, May 17, 2017

Ransomware Attack



Top 10 countries with most detection of Ransomware Attack
Ransomware is malicious code that is used by cybercriminals to begin data kidnapping and lockscreen attacks. 

The target for ransomware attacks is across the counter, and unlike distinct types of attacks, the victim is regularly notified that an use for one own ends has occurred and is if instructions for at which point to liberate from the attack. 

Payment is constantly demanded in virtual nut to pull out of the fire the criminal’s identity.

What does ransomware do?
Encrypt files so you can't use them.
Prevent you from accessing Windows.
Stop certain apps from running.

Friday, February 10, 2017

Sample database connection in SQLite android app and prevent SQL Injection


Sample database connection in SQLite android app and prevent SQL Injection


Introduction

In SQL Injection, malicious lawmaking is inserted into strings that are later passed to an instance of SQLite or SQL Server for parsing and execution.


How to prevent SQL injection on android using prepare statement?

This article will guide the INSERT | SELECT | UPDATE | DELETE (CRUD) database on Android SQLite how to be safe.

The classes help matters Prepared SQLite statements on Android that is class. SQLite Statement important that I am Prepared statements are statements well the performance, expressly with the need to protect executed in multiple times Sql injection wade on an Android App while using. ContentValues It's a process Blind Parameter overdue in working to prevent Sql injection as well.


Sunday, January 29, 2017

Technical things in phishing attacks Tips and Guide


Technical things in phishing attacks Tips and Guide
Introduction

One of the first (or most important) goals of phishing is to illegally carry out fake/illegal (because of lying and stealing) (related to managing money) transactions for users using a formed/created email that contains a URL pointing to a fake website pretending to be an online bank or a government thing/business. 


A phisher may attract a victim into giving his/her Social Security Number, full name, & address, which can then be used to apply for a credit card on the victim's behalf.



Thursday, January 12, 2017

Securing Web Application from SQL Injection Attacks


Securing Web Application from SQL Injection Attacks
Introduction

SQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these databases contain. Various researchers have proposed various methods to address the SQL injection problem. To address this problem, we present an extensive review of the various types of SQL injection attacks. For each type of attack, we provide descriptions and examples of how attacks of that type could be performed. We also present a methodology to prevent the SQL injection attacks.