Data Privacy

Best Practices – BYOD and Mobile Device Security

BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…

5 years ago

Best Practices to Harden Office 365

Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…

5 years ago

Security Advisory – Tecnimont Cyber Theft

Tecnimont Cyber Theft - Security Advisory   Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…

5 years ago

Microsoft Zero Day – VCard Vulnerability

In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction…

5 years ago

The Art of Communication, Interpretation & Validation: ChatBots

“Hello Alexa, may I have a strategy to test you? “   What is ChatBot? A computer program designed to…

5 years ago

Security Advisory- MEGA Chrome Extension Hijack

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company.…

6 years ago

Mobile Application Security Assessment – Proxying for Windows Phone

While conducting mobile application security assessment of Windows Phone capturing application traffic will allow penetration tester to modify the traffic…

10 years ago

Better Secure Than Sorry! Neglected, Assumed and Hence Vulnerable Menace: Password Attacks

On July 16, 1998, CERT reported an incident where an attacker had found 186,126 encrypted passwords. By the time they…

10 years ago