Case Study

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…

6 years ago

Beware Android Users – CLOAK AND DAGGER is here to exploit you

The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware -…

7 years ago

Buffer Overflow Attacks

Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in…

7 years ago

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…

8 years ago

Mobile Vulnerability Database (MVD)

Mobile Vulnerability Database, or MVD, is a unique place to find out about vulnerabilities reported worldwide for Mobile Platforms. Introduction…

8 years ago

Introduction to Secure Software Development Life Cycle

The most effective way to reduce application security risk is to implement a formal development process that includes security best…

8 years ago

External Penetration Testing – Case Study

ABSTRACT External Penetration Testing consists of a reviewing and assessing the vulnerabilities that could be exploited by external users/Hacker without…

9 years ago

Shell Shock – The Bash Vulnerability

BASH (Baurne Again Shell) Bash is the shell, or command language interpreter, that will appear in the GNU operating system.…

10 years ago

Android Malwares – An Overview

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to…

10 years ago