Blog Posts Tagged with "Imperva"

69dafe8b58066478aea48f3d0f384820

Web Application Attacks Can Peak at 25,000 an Hour

July 25, 2011 Added by:Headlines

The study of 10 million web application attacks shows automated attacks peak at 25,000 an hour. "The level of automation in cyber attacks continues to shock us. The sheer volume of attacks that can be carried out in such a short period of time is almost unimaginable to most businesses..."

Comments  (0)

924ce315203c17e05d9e04b59648a942

Monitoring Site Traffic for Fraud Prevention

January 25, 2011 Added by:Richard Stiennon

Although deploying web application firewalls from Imperva or AppSec Inc. is the best way to defend against these attacks, more sophisticated attacks may take advantage of yet undiscovered vulnerabilities or use the very structure of the site to engage in fraudulent practices, often as authenticated users...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacked .GOV .MIL and .EDU Sites for Sale

January 22, 2011 Added by:Headlines

"The victims' vulnerabilities were probably obtained by SQL injection vulnerability automatic scanner and exploited in automatic manner, as the hacker published his methods in a post in some hacker forum – see screen shot and explanation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Employees Plan to Steal Company Data

November 24, 2010 Added by:Headlines

A new study reveals an alarming statistic: The majority of workers plan on stealing company data if and when they leave their current positions. The survey of 1000 white collar employees conducted by Imperva shows that more than two-thirds are willing to take everything from client and customer records to the intellectual property of their employer...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Imperva Releases Top 10 Security Threats for 2011

November 15, 2010 Added by:Headlines

The predictions for the top ten information security trends expected in 2011, compiled by Imperva’s Application Defense Center, are based on analysis of incident and vulnerability data from the past year as well as findings from the company’s Hacker Intelligence Initiative...

Comments  (0)