Image
6.8 K
Views
28th May 2019 6824

CRLF Injection Attack

The term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.

Image
1.7 K
Views
27th May 2019 1721

WPA3-Wi-Fi Protected Access

Every generation of our technology assures new security promises but parallelly generates the room for new problems. The present world allows users to connect to powerful mainframes, but unfortunately also allows intruders to discover ways to gain access towards user information, tamper the passwords, and in manipulating the access rights.

Image
1.4 K
Views
21st May 2019 1427

Why Should we be aware about quantum computing ?

Computers are getting outdated now a days due to technological developments and rampant security threats.

Image
1.4 K
Views
16th May 2019 1414

Do you want to integrate the Threat Intelligence program into your daily security operations?

There is a huge amount of the increasing use of sophisticated malware, and often organisations fail to understand the real intent of such activities by a large group of hackers, nation-sponsored attacks, organized cybercrimes, cyber terrorists.

Image
3.5 K
Views
14th May 2019 3489

Cyber Security Products Vs Cyber Security Services

Information has become the most valuable asset in today’s trend. There are many protective methods that are followed by many countries and organizations for ensuring consistent workflow.

Image
5.5 K
Views
9th May 2019 5508

DNS Zone Transfer

In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.

Image
20.2 K
Views
4th May 2019 20165

Getting Started with Frida

Frida is a dynamic instrumentation toolkit. It is mainly created for testers, developers and reverse engineering enthusiasts. For mobile app security testers, Frida is like Swiss army knife.

Image
6.5 K
Views
4th May 2019 6462

Null Byte SQL Injection

Null Byte Injection is an exploitation technique which uses URL-encoded null byte characters to the user-supplied data. This injection process can alter the intended logic .

Image
3.5 K
Views
4th May 2019 3500

How to secure your Github repository?

GitHub is a hosting platform which helps developers to collaborate in building software’s. It helps the developers to manage source code management.

Image
2.1 K
Views
14th March 2019 2064

Drupal Core Remote Code Execution Vulnerability: CVE-2019-6340

Drupal is one of the most popular open source Content Management System (CMS) meant for developing, designing etc.

Image
1.9 K
Views
16th February 2019 1904

101 Techniques to secure your AI product

Nowadays, Artificial intelligence (AI) plays a pivotal role on daily activities to increased data volumes, advanced algorithms, and improvements in computing power and storage.

Image
3 K
Views
16th February 2019 2958

Future is Cryptocurrency Era

The prevalence of Barter system (giving solid cash for the purchased commodity) is still on-going, perhaps the reign of digital era. Contrary to this, there is another form of high level digital transaction