Blog

Blog

How an attacker could hack your website using Cross Site Scripting Vulnerability (XSS)

Blog | | Citadelo
Our customers and friends often ask us how a real hacker attack looks like. We want to show this on a very simple, but very common vulnerability called Cross Site Scripting or XSS.
Anzeigen

Be kind to your local security researcher

Blog |
As big fans of open source, we feel the urge to support the community and contribute to the projects we like. And because our code is ugly as hell, we try to do it at least by reporting bugs and security vulnerabilities.
Anzeigen

How to improve your privacy, security and comfort with three simple Google Chrome extensions (video howto)

Blog |
In this post I would like to show you how to install three very useful Google Chrome extensions that will increase your privacy and comfort online. You can either watch this short video that will explain everything or follow this post with screenshots.
Anzeigen

Apple calls home – more privacy on OS X

Blog |
After installing the firewall application called Little Snitch, I watched which applications on my Mac OS X are connecting to the Internet. Two notable services appeared – locationd and assistantd.
Anzeigen

How to enable disk encryption in OS X

Blog |
In recent versions of OS X, there is no need to install additional software because disk encryption feature is already embedded in the operating system. Activation and using are simple and straightforward.
Anzeigen

MS13-105: Oracle Outside In MDB Parsing Vulnerability – CVE-2013-5791

Blog |
People sometimes ask how to know what exact vulnerability was patched in particular piece of closed source software. In this blog, we would like to describe one such example from the Microsoft security bulletin.
Anzeigen