Watchfire has published a whitepaper on the most common application-level hack attacks
It lists the most common attacks on web-forms which are used to collect personal, classified and confidential information.
- Manipulating cookie information
- Manipulation of hidden fields
- Changing parameters
- Buffer overflow
- Cross-site scripting
- and many more
The paper also outlines a guideline for developing secure web applications.
By giving away your details you can register to receive this whitepaper at watchfire.com
In a 12 month undercover investigation Channel 4 (UK) could prove that Indian call center staff sold credit card data. In a similar incident one year ago,reported on CNET News.com, an employee of Indian call centre Saffron was arrested.
Meanwhile companies from Germany report an increase in fraudulent product orders (Der Spiegel, 38/2006, 18.09.2006). The obvoius aim is either to cash in quickly on money and presents – or to pirate German car parts and IT goods.
The question arises if off-shoring to the East could be a self-killing business strategy instead of a quick road to cheaper products and services. Time will tell, but authorities and businesses in the East are being closely watched if they are showing leadership to achieve the level of trustworthiness that is required in global business.
His conclusion: A terrorist attack on critical infrastructure would need loads and loads and loads of inside knowledge and is very likely to inflict limited damage. Terrorist use of the Internet, however, is evident for communication and planning of attacks.