Re: [Owasp-delhi] Gumblar worm article at Citadelnotes

2009-06-10 Thread Gunwant Singh
Thanks for the crap !!! Are you educating or spreading the worm itself ! On Sat, Jun 6, 2009 at 4:29 PM, Abhay Bhargav wrote: > Hi all > > I have written a piece on the latest malware, the Gumblar worm and why > it is so dangerous. It will be useful to you as it contains some > measures to s

[Owasp-delhi] [XRS Cross Referer Scripting]

2009-06-10 Thread suresh tiwary
hi OWASP Delhi, Could anyone highlight on "XRS Cross Referer Scripting" ? Though google is there, still someone who has shown the attack in his pen-test can give an explanation and POC. Thanks & regards, Suresh___ Owasp-delhi mailing list Owasp

[Owasp-delhi] ATM Malware Attack

2009-06-10 Thread amar wakharkar
Dear All, I found this interesting news about ATM Malware. Interesting :) ... ATM Malware Spreading Around the World Cash machines around the world are hosting malware that can harvest a person's card details for use in fraud, a situation that could worsen as the malware becomes

[Owasp-delhi] ATM Malware Attack

2009-06-10 Thread amar wakharkar
Dear All, I found this interesting news about ATM Malware. Interesting :) ... ATM Malware Spreading Around the World Cash machines around the world are hosting malware that can harvest a person's card details for use in fraud, a situation that could worsen as the malware become

[Owasp-delhi] Gumblar worm article at Citadelnotes

2009-06-10 Thread Abhay Bhargav
Hi all I have written a piece on the latest malware, the Gumblar worm and why it is so dangerous. It will be useful to you as it contains some measures to secure against the worm. Please read it at http://citadelnotes.blogspot.com and spread the word because this is an extremely fast-sprea

[Owasp-delhi] Testing for Buffer Overflow and DOS vulnerabilities

2009-06-10 Thread Parmendra Sharma
Dear All, Kindly discuss that how do you test an application for the the issues mentioned below: -> Testing for Buffer Overflow -> DOS vulnerabilities Kindly explain the methodology which you follows. -- Thanks and Regards: Parmendra Sharma Computer Security Analyst