Briskinfosec - Your Perfect Cybersecurity Partner

Stay Connected:

The Best CyberSecurity Blogs to Know in 2018| Briskinfosec
23rd September 2020 140

Security Challenges In RFID : It is Not as Difficult as You Think

RFID is a device which works basically on the electromagnetic waves. Its operating frequency varies from 135KHz - 5.8GHZ and these are closely coupled circuits.

23rd September 2020 169

The Modern Rules of Mobile App Security Best Practices

Before heading into the concept of “Mobile App Security Best Practices” let’s not forget the undeniable fact that thousands of mobile applications for both Android and iOS ...

23rd September 2020 169

Patch Management

The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.

23rd September 2020 142

Why You Might Be Failing at the Hardware Attack

Have you ever heard of stealing data from computer via hardware stuff? If you haven’t yet, I’ve got to reveal you that yes, something like that is indeed done.

23rd September 2020 109

Dumpster Diving-Your Unused Modem Hardware can Leak Your Critical Data

We will all be familiar with the attack surfaces in web,mobile,network and cloud technologies but haven’t you heard about the hardware

23rd September 2020 4681

Getting Started with Frida

Frida is a dynamic instrumentation toolkit. It is mainly created for testers, developers and reverse engineering enthusiasts. For mobile app security testers, Frida is like Swiss army knife.

23rd September 2020 251

How your RF layer is exposed to serious cyberattacks?

RF remote controllers are used in most of the devices varying from remote control toy cars to heavy equipment’s used in mining operations and factory floor.

23rd September 2020 341

Troubling Security issues in Controller Area Network

Controller Area Network (CAN) is the widely used In-vehicle networking. When seen from a normal point of view, CAN is really powerful in transmitting all the critical and non-critical

23rd September 2020 197

Guidelines to Secure Web Services and API End-Points

Web Service is a software service used to create a communication between 2 devices connected over a network through internet.

23rd September 2020 235

Chat-Bot Security: Secure or A Way for Intruder

A Chat-bot is more like an Artificial Intelligence (AI) program which is used to setup a conversation with the end user (human) in a preprogrammed human language

23rd September 2020 421

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.

23rd September 2020 2660

SQL Injection -Using Burp Suite

SQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL

23rd September 2020 1324

Server-Side Request Forgery-SSRF

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application

7th September 2020 12743

Host Header Attack

Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.

7th September 2020 1043

DNS Zone Transfer

In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.

7th September 2020 117

Best of IT defenses cannot protect you

An Organization can protect their digital assets, which are production systems, servers; several network devices and so on, by implementing firewalls

7th September 2020 388

Cyber Security Products Vs Cyber Security Services

Information has become the most valuable asset in today’s trend. There are many protective methods that are followed by many countries and organizations for ensuring consistent workflow.

7th September 2020 387

Layer Wise Analysis of Security in IOT

In this digital era, IoT devices plays a predominant role of helping humans to communicate with surrounding devices.

7th September 2020 199

WPA3-Wi-Fi Protected Access

Every generation of our technology assures new security promises but parallelly generates the room for new problems. The present world allows users to connect to powerful mainframes, but unfortunately also allows intruders to discover ways to gain access towards user information, tamper the passwords, and in manipulating the access rights.

7th September 2020 88

Detailed Insights On Ipv6 Implementation And Its Security Related Aspects

Internet Protocol (IP) is a system that allows hosts to identify and connect to other hosts online. Ipv4 was implemented in the early 80s.

7th September 2020 314

Robotics Process Automation

Robotic process automation is an improvement of business process automation that allows the organization to automate task, just like how the human interacts with the application and systems.