Title: CHKRootKit : Eliminate The enemy within Scope of article Last month we learnt about the technical components that form the rootkits. We also discussed…
Year: 2020
Benefits of OpenSSH
Title: Benefits of OpenSSH Scope of article SSH service is very widely used in the open source infrastructure setups. Due to its small footprint on…
Basics of Vulnerability Assessment and Penetration Testing
Basics of Vulnerability Assessment and Penetration testing As the number of web and mobile applications is increasing the cyber attacks are increasing everyday too. World…
Angular JS Security Fundamentals
AngularJS Vulnerability Assessment on Web ⦁ Introduction: In this era of digitization, technology has been changing at a rapid pace and businesses are always looking…
Android Security Risks
Scope of article Open source world loves Android operating system. It is surely a gift from google, that provides cutting edge and versatile mobile development…
PCIDSS Compliance For Mobile Application
PCIDSS COMPLIANCE FOR MOBILE APPLICATION WHAT IS PCIDSS PCI DSS (Payment Card Industry Data Security Standards) standard developed in order to ensure the security of…
How To Pentest Firewall
How to pen test a firewall externally Firewall is a device or software which is responsible for filtering traffic of network. It can be implemented…
How ISO 27001 Will Make Your Cloud Secure
How ISO 27001 will make your Cloud Secure? Having a Cloud environment is becoming simpler day by day. But Management, Expansion, Monitoring, Regulating, Controlling, Security…
Fundamentals Of ISO 27001
What is the ISO 27001 standard? The ISO 27001 standard adopts a process approach for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an organization’s…
Fundamentals Of HTTP Headers And Web Application Security
Fundamentals of HTTP Headers and Web Application Security The notorious targets for all sorts of cyber attacks can be zeroed down to the web applications….