fbpx

Codesealer blog

Session Hijacking & Cookies

What is a Session Hijacking Attack? On a website, cookies and Sessions are used to...

The most popular Cyperattacks 2020

  Almost 40 % of cyber-attacks in 2019 were performed using “cross-site scripting”, the most...

Vulnerabilities of Ajax

Ajax is used to create fast, efficient, and better web applications using HTML, CSS, XML,...

What are reverse engineering and the danger of it? 

Reverse engineering is a process to decode an object that reveals its architecture and collect...

Securing JavaScript

JavaScript is a very powerful programming language mostly used for the Web. JavaScript is an...

Why You Need User Interface Protection

Cyber-crime is at an all-time high. As the number of possible attacks evolves and expands,...

Payment Service Directive (PSD2): End user protection

The Payment Service Directive The second Payment Service Directive (PSD2) is a directive aimed to...

Step by step with the hacker; How “Refund scam” steals your money

The age of cypercrime is in it’s fullest, and hackers/scammers continuously develop new methods to...

Securing IOT: Attacks Scenarios, vulnerabilities and protection methods

We differentiate between two types of IOT devices: – Smart Devices with high processor and...

The Secrets Behind Man-in-the-Browser Attacks

Cyber-crime continues to innovate and evolve. New trends in digital warfare emerge all the time...

CnP Fraud impact on industry and how to prevent it.

Do you worry about CNP-attacks? Then it is for good reason! “Card Not Present” attacks...

Javascript eSkimming: A rising threat

Javascript is a key language for developers in creating interactive web applications.  As on of...

Targeted Malware

As the name suggests, targeted malware is a set of cyberattacks that are explicitly designed...