Hello everybody i would like some worked on the field of **SQL test cases generation based mutation**. In fact i almost wrote the test cases mutation code and i generated mutated test cases. but now i want to validate thus inputs or test the mutation by verifiying the killed and survived mutants on other softwares or web-based applications...........please any help any ideas i really i spent long time i read a lot of paper but couldn't find how to do it

Member Avatar
+0 forum 0

Ever wondered why the bad guys continue throwing malware in your direction? The obvious answer is the correct one: because they make money from doing it. On Thanksgiving Day, as all others across the year it would seem, they can be thankful for the high profit to be raked in from using readily available malware purchased within the dark market. Kaspersky Lab researchers have been doing the math, and their figures suggest that when comparing the cost of the most common hacker tools with the cold cash stolen using them the profit is around 20 times greater than the outlay. …

Member Avatar
+2 forum 0

New research shows that hackers are becoming increasingly lazy in their search for online exploits, with 98% of Remote File Inclusion and 88% of SQL injection attacks now being fully automated. It comes as no surprise whatsoever to DaniWeb administrators and moderators that your average cybercriminal is looking for the easiest way to earn a dishonest buck. After all, we have recently completely re-coded the DaniWeb forum from the ground up partly in order to deal with the increasing number of spambot attacks that were being launched against us across much of last year. Spammers have long since used software …

Member Avatar
Member Avatar
+1 forum 1

The results of a new security survey, which asked some 6,000 people across Europe questions about cybercrime, would appear to suggest that nearly everyone (88% of respondents in fact) is some kind of online victim. Have things really got this bad, or is it just another case of the security industry painting a very dark picture in order to drive demand for IT security solutions and services? Well let's take a look at the results of that survey which was carried out by security vendor Sitecom. I can understand fully that the 73% of people 'concerned about their security online' …

Member Avatar
Member Avatar
+0 forum 9

Fatal System Error, subtitled 'The Hunt for the New Crime Lords Who Are Bringing Down the Internet' is that rarest of finds: an IT security book that is not only informative and fascinating, but truly gripping from start to finish. This newly published made for Kindle edition is the cheapest option aa well, saving $11.26 off of the $25.95 print edition cover price. [attach]17844[/attach]Joseph Menn, a reporter for the Financial Times, is surely a closet novelist such are the twists and turns that he weaves into what by rights ought to be a pretty dry expose of the emerging cybercrime …

Member Avatar
Member Avatar
+0 forum 3

The demand for compromised social network accounts is now so big on the cybercrime black market that, according to the latest research, just one such underground site has 1.5 million of them for sale. The international reach of social networks has meant that these sites have become the de facto target for cyber criminals today. As I mentioned previously, they have become popular [URL="http://www.daniweb.com/news/story277390.html"]homes to malware mules[/URL]. Now [URL="http://labs.idefense.com/"]iDefense[/URL], the cyber security intelligence arm of VeriSign, has uncovered one user called 'kirllos' at a particularly popular crime marketplace site that advertises social networking login details who claims to have 1.5 …

Member Avatar
+0 forum 0

The latest research from security vendor Symantec would appear to suggest that cybercrime gangs are now applying drug smuggling techniques to their trade, and are actively using 'malware mules' in order to distribute threats within social friendship networks. According to the latest Internet Security Threat Report, email accounts are now being sold for just 65p on the underground web black market, and these are then used to distribute spam or malware via people’s trusted network of contacts. The advertised prices of email accounts in 2009 ranged between 65p and £13 for each account. Most advertisements listed a flat rate, although …

Member Avatar
+1 forum 0

Today the cyber security experts at [URL="http://www.symantec.com/about/news/release/article.jsp?prid=20100322_01"]Norton announced the top 10 riskiest U.S. cities for cybercrime[/URL]. The next time you pay a bill or update your status on Facebook you might want to look over your shoulder [virtually]. It seems Seattle, Boston, San Francisco and Washington D.C. are the riskiest all around cybercrime cities, thanks in part to the large number of Wi-Fi hotspots. [B]Let’s have a look at the top 10:[/B] 1) Seattle 2) Boston 3) Washington, D.C. 4) San Francisco 5) Raleigh, N.C. 6) Atlanta 7) Minneapolis 8) Denver 9) Austin, TX 10) Portland, OR The above rankings …

Member Avatar
Member Avatar
+0 forum 2

As the Chief Security Officer at telco giant AT&T, Edward Amoroso knows a thing or two about cybercrime. Which is why he has been giving testimony before the United States Senate Committee on Commerce, Science, and Transportation specifically assessing how vulnerable the US is on the cybersecurity front and proposing the government level action that needs to be taken in order to make things better. Amoroso's recommendations on the solutions front were practical enough: dealing with botnets needs a smarter government procurement response, international cooperation must improve and the current arms-length relationship with service providers must be reconsidered. This last …

Member Avatar
+0 forum 0

President Obama - I still like saying that and I'm not even in his continent (OK, a little bias there, you may disagree) - is of course to be applauded for his decision to launch a root and branch investigation into American cyber-security. In fact I'd urge other countries, particularly my own (which apparently can't hold on to addresses on a disk for longer than five minutes without losing them) to sit up and pay attention. Or just sit up and bark. Get on with it. The BBC's account is [URL="http://news.bbc.co.uk/1/hi/technology/7880695.stm"]here[/URL]. But there's another angle to this story. One of …

Member Avatar
Member Avatar
+0 forum 2

The IBM Internet Security Systems division, better known simply as ISS, has today warned of the 'perfect storm' of security threats which has been created by the global economic slowdown, an unprecedented level of cybercrime activity and both the cost and complexity of legal security infrastructures. ISS announced a set of actions in order to help bolster its security solutions to navigate this perfect storm while, apparently, saving money at the same time. These actions have been prompted, I am informed, after the IBM X-Force team of elite security experts detected a couple of things which startled them somewhat. First …

Member Avatar
+0 forum 0

I was privileged to attend the 5th [URL="http://www.kaspersky.com/"]Kaspersky[/URL] Lab forum, held in the city of London, yesterday. It was actually a Cybercrime Forum (I have no idea if the other forums were as well, as this was my first), and so the main focus was – yeah, you guessed it – Cybercrime; criminals operating through the freedom and openness of the internet, causing all kinds of harm to internet, computer, and smart phone users not just for kicks and giggles as it used to be in the good old days, but now for money, and big money too. It emerged …

Member Avatar
Member Avatar
+0 forum 2

The [URL="http://www.oecd.org/dataoecd/53/34/40724457.pdf"]Malicious software (malware): a security threat to the Internet economy[/URL] report published by the Organisation for Economic Co-operation and Development over the weekend suggests that the PC malware infection rate in the US has hit 25 percent. These OECD cybercrime infection findings are highly disturbing, admits Geoff Sweeney, CTO with behavioural analysis IT security specialists [URL="http://www.tier-3.com"]Tier-3[/URL] (whose customers spread across major corporations and governments the world over) but nonetheless are accurate. In fact, the figures confirm the companies own findings with regards to infections. OECD says in the report that while the economic and social impacts of malware may …

Member Avatar
Member Avatar
+0 forum 1

According to a [URL="http://www.yougov.com"]YouGov[/URL] survey published today by [URL="http://www.verisign.com"]VeriSign[/URL] the average UK consumer is worth £10,077 ($20,000) online in terms of banking, gaming and shopping accounts. The pan-European survey on consumer attitudes to online security concludes that UK Internet users are putting as much as £361 billion ($720 billion) at risk by sharing data on poorly protected web sites. 65 percent of those who took part in the survey admitted sharing personal information with their online bank every week, while 58 percent did likewise with online retailers and surprisingly only 31 percent got friendly on the data sharing front with …

Member Avatar
+0 forum 0

In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and new forms of attack, it has never been more important for organizations to make sure that they have water-tight security systems and policies. Hackers and in particular organized crime groups, are now of the firm realization that rather than just causing disruption, there is a great deal of money to …

Member Avatar
+0 forum 0

The End.