Importance of Biometrics in Cybersecurity ...
Introduction Cybersecurity refers to safeguarding the systems, networks, and applications against digital attacks intended to gain access to, alter, or delete sensitive data, extort money…
Read MoreCode Injection Vulnerabilities ...
Introduction to Code Injection Vulnerabilities Code injection is an attack where the attacker tries to inject a code that can be interpreted and executed by…
Read MoreIncreased use of Multi-factor Authentication ...
What is Multi-Factor Authentication (MFA)? Multi-Factor Authentication (MFA) refers to an authentication method that necessitates the user to provide more than one verification factor for…
Read MoreAntivirus Evasion – Part 1 ...
1. Antivirus – The Basics Antivirus software helps to protect against various computer infections by detecting malicious software, often referred to as malware, on your…
Read MoreASSET SECURITY ...
When we think of asset security, at the first glance it looks pretty simple. After all, what is the big deal about tracking a few…
Read MoreIntroduction to Information Security Management Sy ...
What is an Information Security Management System ? An Information Security Management System (ISMS) is a set of policies and procedures for managing organizational confidential…
Read MoreBetter Secure Than Sorry! Neglected, Assumed and H ...
On July 16, 1998, CERT reported an incident where an attacker had found 186,126 encrypted passwords. By the time they were discovered, they had already…
Read MoreHacking Google account through Locked Android Devi ...
Hacking Google account through Locked Android Devices Varutra revealed an issue in the text message notification implementation of Google’s Android operating system which may lead…
Read MoreCategories
- Android Security (17)
- Authentication & Authorization (21)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (5)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (11)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (25)
- Data Breaches (27)
- Data Leakage (24)
- Data Privacy (26)
- Email Phishing (7)
- Encryption & Cryptography (13)
- Ethical Hacking (15)
- General (14)
- Governance Risk & Compliance (6)
- iOS Security (2)
- IOT Security (5)
- Java Security (2)
- Mobile Application Security (18)
- Mobile Device Management (10)
- Network Pentesting (8)
- News (47)
- Password Security (8)
- Past Events (6)
- Patch Management (3)
- Ransomware Attack (10)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (29)
- Security Best Practices (33)
- Security Hardening (31)
- Social Engineering Attack (9)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (3)
- Unix/Linux Security (1)
- Upcoming Events (1)
- Viruses & Malware (14)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (32)
- Windows Mobile Security (1)
- Zero Day Attack (7)