Angular JS Security Fundamentals

AngularJS Vulnerability Assessment on Web ⦁ Introduction: In this era of digitization, technology has been changing at a rapid pace and businesses are always looking for adopting new and disruptive technologies. Most of these technologies are easy to use, expressive…

Android Security Risks

Scope of article Open source world loves Android operating system. It is surely a gift from google, that provides cutting edge and versatile mobile development platform. While there are tons of applications already running on multiple tablets and phones, little…

PCIDSS Compliance For Mobile Application

PCIDSS COMPLIANCE FOR MOBILE APPLICATION WHAT IS PCIDSS PCI DSS (Payment Card Industry Data Security Standards) standard developed in order to ensure the security of card data and to reduce card fraud. Companies that are PCI DSS compliant must obey…

How To Pentest Firewall

How to pen test a firewall externally Firewall is a device or software which is responsible for filtering traffic of network. It can be implemented between trusted zone (Corporate Network Area) and untrusted zone (Internet). All the communication between trusted…

How ISO 27001 Will Make Your Cloud Secure

How ISO 27001 will make your Cloud Secure? Having a Cloud environment is becoming simpler day by day. But Management, Expansion, Monitoring, Regulating, Controlling, Security of Cloud has become real worry in any Organization who as of now have a…

Fundamentals Of ISO 27001

What is the ISO 27001 standard? The ISO 27001 standard adopts a process approach for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an organization’s Information Security Management System (ISMS) It is aligned with other management systems And it supports…

E-commerce Website Pentesting Final

How to pentest e-commerce website Setting up an E-commerce system is a complex process. It is necessary to be protected and customer privacy at the top of your agenda as a Retailer. To maintain the integrity of the E-commerce system,…

CSRF For Banking Apps-Final Updated

CSRF Attack For Banking Apps Cross-site request forgery vulnerability is currently ranked Number 8 on the OWASP Top 10 vulnerabilities chart and is a very common application-layer vulnerability to exploit. It’s also known as a one-click attack, Session Riding and abbreviated as CSRF…