The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X, Windows and Cross Platform releases are all included in this file.
>> CATEGORY: Security
We are all ducks, meekly sitting while those who have the hacking skills infiltrate our mind’s eyes, aka our laptops. It seems, sadly, that among the latest victims of boys…
Some online service providers are in the cross hairs this week for allegedly abandoning WikiLeaks after it published secret U.S. diplomatic cables and drew retaliatory technical, political and legal attacks….
A bug that led popular social networking site Facebook to accidentally delete a host of legitimate accounts earlier this week was quickly seized by cybercriminals to get Facebook users to…
Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose sensitive information, bypass certain security restrictions, or to compromise a user’s system.
Secunia Security Advisory – Apple has acknowledged multiple vulnerabilities in Apple TV, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable device.
Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people bypass certain security restrictions, conduct spoofing attacks, disclose sensitive information, cause a DoS (Denial of Service), or to compromise a user’s system.
Secunia Security Advisory – Multiple vulnerabilities and weaknesses have been reported in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a user’s system.
Adobe Inc. said on Friday that it is planning to release an out-of-cycle update to fix critical security holes in its Reader and Acrobat products, including a fix for a…
An anonymous hacker wearing a Guy Fawkes mask took over classroom projection screens at Washington State University last Friday, the fifth of November, to broadcast a prerecorded message adapted from V…