Title: Cyber Attacks Explained: Botnet Army Scope of article This month we are going to learn about yet another dangerous type of attack which is prevailing even in the modern computer systems. The attacks covered so far in the previous Read more…
Title: Cyber Attacks Explained: Authentication Attacks Scope of article In the previous article, we dealt with man in the middle attack whereby a hacker can steal information by intercepting network traffic. This month we are going to learn about authentication Read more…
ISO 27001 and SOC 2 COMPARISON Background There is an increased need for service organizations to provide assurance, trust and transparency over their controls to enterprises that outsource functions or processes to them (service organizations). SOC2 report – Relates to Read more…
Title: CHKRootKit : Eliminate The enemy within Scope of article Last month we learnt about the technical components that form the rootkits. We also discussed why and how the rootkits are dangerous and glanced at a few detection options. This Read more…
Title: Benefits of OpenSSH Scope of article SSH service is very widely used in the open source infrastructure setups. Due to its small footprint on network, as well as ease of installation and maintenance, SSH replaces many remote shells in Read more…
Basics of Vulnerability Assessment and Penetration testing As the number of web and mobile applications is increasing the cyber attacks are increasing everyday too. World statistics shows that more than 70% of the applications either have vulnerabilities which could be Read more…
AngularJS Vulnerability Assessment on Web ⦁ Introduction: In this era of digitization, technology has been changing at a rapid pace and businesses are always looking for adopting new and disruptive technologies. Most of these technologies are easy to use, expressive Read more…
Scope of article Open source world loves Android operating system. It is surely a gift from google, that provides cutting edge and versatile mobile development platform. While there are tons of applications already running on multiple tablets and phones, little Read more…
PCIDSS COMPLIANCE FOR MOBILE APPLICATION WHAT IS PCIDSS PCI DSS (Payment Card Industry Data Security Standards) standard developed in order to ensure the security of card data and to reduce card fraud. Companies that are PCI DSS compliant must obey Read more…
How to pen test a firewall externally Firewall is a device or software which is responsible for filtering traffic of network. It can be implemented between trusted zone (Corporate Network Area) and untrusted zone (Internet). All the communication between trusted Read more…