Cross site scripting attacks are some of the most prevalent vulnerabilities in enterprise systems today. Although most of these flaws are fairly trivial, nearly everybody has been hit by one - including online giants such as Google and Yahoo.
In the second episode of our video blog series, we'll demonstrate how attackers can look for cross site scripting vulnerabilities on a website and then exploit them to steal confidential information. The website is set up for the purpose of the demo - no mission critical core was harmed during the creation of this video.
next week: Search history theft
Previous episode: Why botnet herders love adware
Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night
Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018
Meteor showers as a service will be visible for about 100 kilometres in all directions
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago