Security Best Practices

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat…

5 years ago

Security Advisory – Typosquatting

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the…

5 years ago

Best Practices to Harden Office 365

Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…

5 years ago

Microsoft Zero Day – VCard Vulnerability

In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction…

5 years ago

The Art of Communication, Interpretation & Validation: ChatBots

“Hello Alexa, may I have a strategy to test you? “   What is ChatBot? A computer program designed to…

5 years ago

Blockchain Security – Part 1

Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…

5 years ago

Security Advisory- MEGA Chrome Extension Hijack

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company.…

6 years ago

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…

8 years ago