Latest Linux vulnerabilities will make you feel insecure
In last two years major security bugs have been found and patched which might had affected innumerous users and servers. On 28th October 2014, HD Moore, Chief Research Officer of Rapid7 shared about...
View ArticleRisk Identification Process – Burning Challenges
Risk Identification Process – Burning Challenges Risk identification is one of the most important factor which decides the fate of Risk Management in an Enterprise or organization. Some of the key...
View ArticleKeypoints for Auditing a Data Center
Auditing a Data Centre – Key points Data centres house the data, applications and access critical to the success of many businesses. Our data centre must be secure and resilient in order to keep our...
View ArticleWhat and from where to start learning Reverse Engineering
Making an application using n number of options of programming languages using various algorithms and concepts is not as tougher as to find out the equivalent code (or same same code) from executable...
View ArticleData Privacy Assessment-Key Areas
Data Privacy Assessments – Key Areas Area 1: Transparency When the user information is collected from individuals, are they made aware of the uses for that information? Are Individuals made aware of...
View ArticleWordPress 4.0.1 got released with many security updates
WordPress 4.0 was released 2 months back on 4th September, 2014 (Oh My Birthday 😉 ) and there were 8 security bug fix patched in security update in WordPress Version 4.0.1 on 20th November,2014. It has...
View ArticleHow to find WordPress version of a site
You want to know WordPress version of site which is not owned or administered by you or in simple word you want to know WordPress version without logging in to the site? First let’s see how we can find...
View ArticleHow to Generate Unique Secure Passwords You Remember
Our social life is growing. Day by day we are adding new sites. More and more services are going online. Along with this we all share the problem of remembering the passwords for various sites. Lot of...
View ArticleProtect your system from Ransomware Cryptolocker Malware
If you are a Windows user and open any url or email without verifying its authenticity, then you are at risk of getting your whole system data decrypted by a malware popularly known as “Ransomware”....
View ArticleBeware of WhatsApp Voice call spam message
We hear from long time that it is easy to breach human psychology as compare to robust software. Yes, WhatsApp Voice calling message floating around everyone’s whatsapp chat message is an example of...
View ArticleSQL Injection Authentication Bypass Cheat Sheet
This list can be used by penetration testers when testing for SQL injection authentication bypass. A penetration tester can use it manually or through burp in order to automate the process. The creator...
View ArticleAutomated bash script to test HTTP HEADER Response
With below code we can try to automate the different methods that a web server or a website allow. HTTP Methods that we can test here are: GET HEAD POST PUT TRACE CONNECT DELETE We have used JAFFA an...
View ArticleHiding sensitive header response for IIS server
The purpose of this blog post is to discuss how to remove unwanted HTTP response headers from the response. Typically we have 3 response headers which many people want to remove for security reason....
View ArticlePossible ways to hack mail account
It is very usual case now a days that mail accounts are getting compromised due to various reasons. I feel public awareness on Cyber Security is much needed. Specially in countries like India. Here are...
View Article
More Pages to Explore .....