Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…
Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set…
What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company.…
Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating…
As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…
Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…
Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in…
Here we will discuss Threat Advisory Report on WannaCry Ransomware (Critical Severity). 1. Introduction On Friday, May 12, countless organizations…
The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…
Mobile Vulnerability Database, or MVD, is a unique place to find out about vulnerabilities reported worldwide for Mobile Platforms. Introduction…