In the age of digital love, where the search for a partner or meaningful connection often begins with the swipe of a finger, security and privacy on dating apps have become paramount concerns….
Read moreWhile many people are somewhat confused about “2-factor authentication (2FA)”, which is also known as 2-factor verification, it’s a really easy concept to understand. Think of your bank’s debit card: you insert the…
Read moreEven though news about another celebrity’s hacked cloud storage – from Jennifer Lawrence to Hilary Clinton – appear regularly, many people think their personal information is not attractive to cyber criminals. However, practice…
Read moreOWASP API security (https://www.owasp.org/index.php/OWASP_API_Security_Project) is an open source project which is aimed at preventing organizations from deploying potentially vulnerable APIs. APIs expose micro services to consumers, making it important to focus on how…
Read moreMyBB is one of the most widely used open source, intuitive, extensible, and incredibly Forum software out there. The software is recognized for its security as well as it is the most secure…
Read moreThere are plenty of ways to make your password secure, but most people just don’t bother. It is much easier to set a password that is easy to remember, but hackers rely on…
Read moreUnvalidated data Never trust anything you get from a Web browser. The browser is completely outside of your control, and it’s easy to fake values like the HTTP referrer. It’s also easy to…
Read more1) National Vulnerability Database https://nvd.nist.gov/ NVD i.e. National Vulnerability Database is a product of NIST (National Institute of Standards and Technology) Computer Security Division which is sponsored by DHS(Dept. of Homeland Security’s). The…
Read more1. Always Use the max key size supported by AP for encryption – If the key size is large enough, then it takes more time to crack the key by the attacker. Also…
Read moreToday we’ll discuss about the hijack method used in banking sector i.e. botnets to steal money or some sensitive information from the user. What are these botnets used for? They are used for…
Read moreAs we all knows, Security is the most discussing topic in today’s time and is obviously everyone’s need. Everyone has so many bank accounts, credit cards, paypal account, social accounts etc and sometimes…
Read more