Image
1.3 K
Views
8th August 2019 1311

HIPAA-Health Insurance Portability and Accountability Act

Digitalization has been invading Healthcare industry for a while. Since then, Hackers have targeted the healthcare industries to seize critical data such as Personally Identifiable Information (PII).

Image
2.1 K
Views
6th August 2019 2111

How your RF layer is exposed to serious cyberattacks?

RF remote controllers are used in most of the devices varying from remote control toy cars to heavy equipment’s used in mining operations and factory floor.

Image
4 K
Views
31st July 2019 3954

The security and privacy risks of face recognition authentication

Biometric Identification has changed the way people were identified. Since the Last decade, its growth is incredible and has transformed a lot of industries from military

Image
1.7 K
Views
9th July 2019 1747

Why Patch Management is Required for Business?

The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.

Image
1.4 K
Views
9th July 2019 1408

Remediation Verification Penetration Test

When organisations are performing penetration testing or secure code review, they will get a number of vulnerabilities to be remediated and will start fixing those during the next assessment.

Image
6.3 K
Views
8th July 2019 6255

Android Manifest File Analysis 101

Android Manifest file provides the system with necessary data like application’s configuration information, permissions, and app components. Android Manifest File can be obtained by extracting any APK File and also while doing assessment, you can use APKtool & Drozer for extracting the Manifest file from the application.

Image
9.3 K
Views
1st June 2019 9297

FTP Penetration Testing

Well, this blog will describe the possible ways to attack the FTP servers to compromise your files or the internal network of the organization, how the attacker would try to exploit the FTP, and best possible ways to defend the attack.

Image
2.2 K
Views
31st May 2019 2236

SIEM Integration

SIEM Integration is a comprehensive solution for capturing, retention, and delivery of security information and events, in real-time to SIEM applications.

Image
3.8 K
Views
30th May 2019 3760

Detection and Exploitation of XML External Entity Attack XXE

XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser

Image
2.1 K
Views
30th May 2019 2089

Security and Privacy in IoT

In todays world, each and every device is metamorphosing into digital and all these devices are being connected with other devices for aiding mankind.

Image
1.4 K
Views
29th May 2019 1357

Why Cloud Security is Essential?

Most of the personnel’s believe that cloud services are one hundred percentage secure as it is from industry giants, but the reality is being a cloud native won’t completely save you from external threats

Image
3.9 K
Views
29th May 2019 3894

Server Side Includes Injection

Server Side Includes (SSIs) are directives present on web applications, used to feed an HTML page of the application with dynamic contents based on user’s input.