Cookies: when they should be used, and what can happen if they are misused
|
12-19-2006, 09:43 AM,
Post: #1
|
|||
|
|||
Cookies: when they should be used, and what can happen if they are misused
Quote:Within one week's time, we stumbled across two different sites using cookies the wrong way. While the attack vectors were a bit different, both sites trusted the cookie data to secure their usersÂ’ accounts. Therefore, this week we are going to spend some time discussing cookies, when they should be used, and what can happen if they are misused... full article: http://www.informit.com/guides/content.asp?g=security&seqNum=232&rl=1 |
|||
08-04-2007, 09:02 AM,
Post: #2
|
|||
|
|||
Unencrypted Cookies Could Allow Hackers To Steal User Data
A related article:
Quote:Hackers and computer security specialists gathered in Las Vegas on Friday took aim at popular social networking websites, exposing ways to plunder data from software "cookies" used to track users... full article: http://news.yahoo.com/s/afp/20070804/tc_...anymyspace |
|||
« Next Oldest | Next Newest »
|
Possibly Related Threads… | |||||
Thread | Author | Replies | Views | Last Post | |
Ad Networks Used to Infect Computers | mandy | 0 | 2,857 |
06-23-2007, 08:05 AM Last Post: mandy |
|
A Primer on how SQL Injection is used to Hack into Website Databases | regic | 2 | 3,284 |
05-30-2006, 06:56 PM Last Post: valleygirl |
|
Port Scanning: Do Hackers Look Before They Leap? | Kristijntje | 0 | 2,450 |
12-10-2005, 09:27 AM Last Post: Kristijntje |
Users browsing this thread: 1 Guest(s)