18.5 C
Saturday, September 23, 2017
Home Tags Hypertext Markup Language (HTML)

Tag: Hypertext Markup Language (HTML)

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code.

At Kaspersky Lab, we have several sandboxes, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform.
The web is at the heart of many modern business applications. We use browsers as the universal interface for our services, wrapping them in familiar HTML and JavaScript.
If yoursquo;ve got an internet connection and a browser, yoursquo;ve got access to an application, whether on your PC or on your smartphone.But what if you need access to more than the keyboard and the mouse, such as using cameras or other device hardware in your code?[ Only at InfoWorld: What you need to know about progressive web apps. | Get your websites up to speed with HTML5 today using the techniques in InfoWorldrsquo;s HTML5 Deep Dive PDF how-to report. | Learn where HTML5 is headed next. ]Thatrsquo;s where the next iteration of the web comes in to play, the progressive web app. Progressive web apps originated at Google, with a focus on the mobile web and the prospect of being able to deliver web apps that can work offline. With cross-platform support a key deliverable, itrsquo;s an important shift, one that goes further than Microsoftrsquo;s existing hosted web apps.

Build a progressive web app for Android, and it should work on a future release of Windows 10.To read this article in full or to leave a comment, please click here
30.8% of W3C members disapproved of the decision.
The Microsoft.NET framework fails to properly parse WSDL content,which can allow a remote,unauthenticated attacker to execute arbitrary code on a vulnerable system.
A collection of Bluetooth implementation vulnerabilities known asBlueBornehas been released.

These vulnerabilities collectively affect Windows,iOS,and Linux-kernel-based operating systems including Android and Tizen,and may in worst case allow an unauthenticated attacker to perform commands on the device.
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file.

For devices utilizing this environment encryption mode,U-Boot's use of a zero initialization vector and improper handling of an error condition may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data.
Apache Struts 2 framework,versions 2.5 to 2.5.12,with REST plugin insecurely deserializes untrusted XML data.

A remote,unauthenticated attacker can leverage this vulnerability to execute arbitrary code in the context of the Struts application.
Faris Sweis is senior vice president and general manager of the developer tooling business at Progress.Today, enterprise developers have an enormous number of frameworks at their disposal to build mobile applications.

A popular approach is to use a framework such as Apache Cordova to build “hybridrdquo; mobile apps, which allow developers to leverage web development skills and still tap native smartphone features like geolocation and the accelerometer. However, because hybrid frameworks replace native user interfaces with HTML, they often donrsquo;t deliver native or even consistent performance.To read this article in full or to leave a comment, please click here
Akeo Consulting Rufus fails to securely check for and retrieve updates,which an allow an authenticated attacker to execute arbitrary code on a vulnerable system.
An exploit dubbed ROPEMAKER relies on taking advantage of email design functionality, namely by remotely changing CSS in HTML-based emails after they've been sent.
AngularJS is a complete JavaScript framework that helps you create dynamic, interactive applications in HTML.To read this article in full or to leave a comment, please click here(Insider Story)
Microsoft Windows automatically executes code specified in shortcut(LNK)files.