For many businesses, it’s not until after they suffer from a security breach that web security becomes a priority. An effective web security approach must be defensive and proactive. Let’s…
penetration testing
-
-
Baiting is a form of social engineering that relies on the greed or curiosity of the victim. It’s similar to phishing attacks in many ways. However, what makes it different…
-
A network intrusion attack is an unauthorised attack on a digital network that can occur in various ways. It often involves stealing valuable network resources and jeopardising the security of…
-
Cross-site Scripting or XSS is a website security vulnerability that allows a hacker to compromise a user’s interaction with a vulnerable application. XSS attack is a client-side attack where the…
-
What is Tailgating? Tailgating is a social engineering attack. In simple words, tailgating is when an unauthorised person gets access to a restricted area by following an authorised person. People…
-
A build review evaluates the configuration of a device, operating system and its settings against certain industry standards. It plays an important role in creating a strong security posture for…
-
Do you ever connect your phone to the computer and get a notification that asks you whether you trust the device or not? Many of us may blindly click on…
-
Do you ever come across notifications and pop-ups asking you to update your software? I am sure you do. Most people try to avoid these updates and postpone them. However,…
-
Penetration testing is a technique in which an ethical hacker exploits a company’s systems to check its level of security. The company can deploy relative measures after an evaluation of…
-
White Box Testing is a software testing technique where we test the design, internal structure and software coding to validate the flow of input-output and to improve the software usability,…