Web Security

Either HTTPS or Get Booted out

In the coming July 2018, Chrome will come down heavily on websites that have not implemented Secure-socket Layer/Transport Security, which will be marked as insecure with a red triangle. So…

Read More

Crypto-Mining Malware is Catching Up

According to Check Point’s latest Global Threat Impact index, nearly 23 percent of organizations across the world is affected by the Coinhive – the Crypto-mining malware that drains CPU power…

Read More

Once Again, it’s Cryptomining Supply Chain Attack 

Security researcher Scott Helme discovered a third party accessibility plugin called ‘Browsealoud’. In the past 24 hours, it was found that several browsers were compromised. The plugin hides on the…

Read More

Penetration Testing – How it is Performed and Types

A penetration test, or pen-test, is an effort to measure the security of an IT infrastructure by safely attempting to exploit vulnerabilities. These vulnerabilities may exist in OSs, services, and…

Read More

Crypto-Miners Attack Thousands of Government Websites

More than 4000 government websites across the world has been attacked yet again, and this time again it’s the new player Cryptocurrency. The strain of malicious malware has made its way, as…

Read More

Six Popular Ways in Which Hackers Attack Your Website

Hackers and hacking have become so common that today you almost don’t need to explain what hacking is, even to most laymen. Hackers can hack a website or system or…

Read More

Web Site Security and Marketers Should be Cautious.

Edward Roberts, Director of Product Marketing at Distil Networks, says “Many marketers assume website security is not their problem. However, as the stewards of their organization’s external brand, marketers must understand how…

Read More

New Google Apps Script Vulnerability Provides Hackers New Opportunities

A new vulnerability in Google App Scripts has opened the door to new possibilities for cyber criminals. Researchers at cybersecurity firm Proofpoint have discovered a new way of exploiting Google…

Read More

Web Application Penetration Testing Checklist Overview

Penetration testing is the process of testing a software by trained security experts (aka penetration testers or ethical hackers) in order to find out its security vulnerabilities. The objective of…

Read More

Personal Data of Over 31 Million People Leaked Via Popular Virtual Keyboard App

A popular virtual keyboard app has caused leakage of personal data belonging to over 31 million customers. This data breach has happened after the app developer failed in securing the…

Read More

Page 1 of 3

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register