Cross-Site Scripting or an XSS attack is a way in which the attacker can potentially steal session cookies and impersonating their victim and gain access to their information. Not only…
cyber security
-
-
Organisations that prioritise security must keep vulnerability management as a top priority to establish a clear approach for identifying issues affecting their systems. Vulnerability scanning is a major component of…
-
A social engineering assessment is a very important process to understand an organisation’s security exposure. As human beings tend to make errors and are considered the weakest link in any…
-
A build review evaluates the configuration of a device, operating system and its settings against certain industry standards. It plays an important role in creating a strong security posture for…
-
Do you ever connect your phone to the computer and get a notification that asks you whether you trust the device or not? Many of us may blindly click on…
-
Do you ever come across notifications and pop-ups asking you to update your software? I am sure you do. Most people try to avoid these updates and postpone them. However,…
-
White Box Testing is a software testing technique where we test the design, internal structure and software coding to validate the flow of input-output and to improve the software usability,…
-
A SQL injection is a cyber attack that can destroy a company database. It is one of the most common website hacking techniques in which your sensitive data is exposed…
-
What is a VPN? A Virtual Private Network or VPN is an high security connection since it allows one to transfer data in a more private environment. You can connect…
-
DDoS or Distributed Denial of Service is a malicious attempt to disrupt the targeted server’s normal traffic flow. It is an attack on the cybersecurity of a service or network.…