Security - list of most popular online security attacks and protection against cyber attacks (apps, websites, phone)

9 points
Created by:

NOTE: this is blog post, do not edit me this post. Thank you.

So, this is post about online security attacks. 

This post is part in English and Polish.


2FA - Two-factor authentication


  • MFA - Multi-factor authentication
  • 2FA - Two-factor authentication
  • FIDO - Fast IDentity Online
  • OTP - One-time password
  • TOTP - Time-based One-time Password
  • HOTP -¬†HMAC-based One-Time Password
  • HMAC -¬†hash-based message authentication codes




Hardware authentication devices


Google Titan Security Key

Password managers



Hacking passwords



Security conference



SIM swapping

Story of Ross - lost million dollars

SIM Card Swapping Scams | NBC 6

Time in video: 00:36

Cell phone suddenly shows no service I freaked out. One minute robbed Ross's investment accounts added up to a million dollars, the next zero I was devastated, I mean I don't have it, was about 90% of my net worth Ross worked at Apple in the early days. He started saving 30 years ago, but in a matter of minutes hackers recently stole his retirement.

Top vulnerabilities (2012)

According to the security vendor Cenzic, the top vulnerabilities in March 2012 include:

  • 37%¬†¬† ¬†Cross-site scripting
  • 16%¬†¬† ¬†SQL injection
  • 5%¬†¬† ¬†Path disclosure
  • 5%¬†¬† ¬†Denial-of-service attack
  • 4%¬†¬† ¬†Arbitrary code execution
  • 4%¬†¬† ¬†Memory corruption
  • 4%¬†¬† ¬†Cross-site request forgery
  • 3%¬†¬† ¬†Data breach¬†(information disclosure)
  • 3%¬†¬† ¬†Arbitrary¬†file inclusion
  • 2%¬†¬† ¬†Local file inclusion
  • 1%¬†¬† ¬†Remote file inclusion
  • 1%¬†¬† ¬†Buffer overflow
  • 15%¬†¬† ¬†Other, including¬†code injection¬†(PHP/JavaScript), etc.

Source: Web application security

OWASP Top 10 web application security risks (2017)

According to the OWASP Top 10 - 2017, the ten most critical web application security risks include:

  1. Injection
  2. Broken authentication
  3. Sensitive data exposure
  4. XML external entities (XXE)
  5. Broken access control
  6. Security misconfiguration
  7. Cross-site scripting (XSS)
  8. Insecure deserialization
  9. Using components with known vulnerabilities
  10. Insufficient logging and monitoring

Source: Web application security


Alternative titles

  1. Dirask security - protect account with yubikey
Donate to Dirask
Our content is created by volunteers - like Wikipedia. If you think, the things we do are good, donate us. Thanks!
Join to our subscribers to be up to date with content, news and offers.

Dirask - my favourite posts

Native Advertising
Get your tech brand or product in front of software developers.
For more information Contact us
Dirask - we help you to
solve coding problems.
Ask question.

‚̧ԳŹūüíĽ ūüôā