Database Configuration Audit for Security and Comp ...
Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases to produce and store a prioritized…
Read MorePA DSS V 3.2 to SUNSET by 2022 ...
About PA DSS The Payment Application Data Security Standard (PA-DSS), formerly referred to as the Payment Application Best Practices (PABP), is the global security standard…
Read MorePRIVACY Now To Be a Fundamental Right in INDIA ...
Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT Act Amendment 2008, and therefore…
Read MoreZooming Security Vulnerabilities [Part – 2] ...
Securely Hosting Zoom Meetings This blog article will cover security best practices in setting up Zoom meetings securely! 1. Ensure the Host can manage Screen…
Read MoreZooming Security Vulnerabilities [Part – 1] ...
Diving into Zoom Security Vulnerabilities [Part – 1] Introduction – Zoom is a popular web-based video conferencing application available to be installed on computer systems…
Read MoreZero Knowledge Proof ...
Introduction Looking for something exciting and a secure way to protect your secrets? Zero-Knowledge Protocol has the potential to increase privacy and security in the…
Read MoreBest Practices – BYOD and Mobile Device Secu ...
BYOD (Bring Your Own Device) BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…
Read MoreSecurity Advisory – Email Phishing ...
In today’s era, email is still used as one of the primary ways to communicate, which is not only restricted to our everyday work…
Read MoreBest Practices to Harden Office 365 ...
1. Password Policy It is always recommended to use a strong password policy to help secure the data and service access. In Office 365 for…
Read MoreSecurity Advisory – Tecnimont Cyber Theft ...
Background: Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at least 50 operating companies in the engineering…
Read MoreCategories
- Android Security (8)
- Authentication & Authorization (12)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (4)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (3)
- Containerization Security (1)
- Corporate Training (4)
- Cyber Attack (9)
- Data Breaches (11)
- Data Leakage (14)
- Data Privacy (15)
- Email Phishing (2)
- Encryption & Cryptography (10)
- Ethical Hacking (11)
- General (1)
- iOS Security (2)
- IOT Security (2)
- Java Security (2)
- Mobile Application Security (11)
- Mobile Device Management (6)
- Network Pentesting (5)
- Password Security (2)
- Patch Management (3)
- Ransomware Attack (4)
- Reverse Engineering (3)
- Secure SDLC (3)
- Security Advisory (24)
- Security Best Practices (19)
- Security Hardening (19)
- Social Engineering Attack (4)
- Social Networking Security (4)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (2)
- Unix/Linux Security (1)
- Viruses & Malware (9)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (16)
- Web Application Security (6)
- Windows Mobile Security (1)
- Zero Day Attack (5)