IT Security


  • Pranav Mittal

    Millions Of Licenses Stolen From Uber Database

    Uber has disclosed that the information of over 57 million of Uber users and drivers accounts was stolen in October last year.
    Pranav Mittal Nov 22, 2017
  • Pranav Mittal

    CCleaner Gets Infected – 2.3 Million Users Affected

    In a recent incident of software security inspection, the Avast-owned CCleaner Security App was found to be infected with a malware backdoor installed in it.
    Pranav Mittal Sep 19, 2017
  • Pradeep Yadav

    Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
    Pradeep Yadav Sep 06, 2017
  • Pranav Mittal

    Kaspersky Announces Free Version Of Its Antivirus Software

    Kaspersky Lab has announced that it is launching a free version of its renowned antivirus software.
    Pranav Mittal Jul 27, 2017
  • Sahil Sharma

    LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
    Sahil Sharma Jun 29, 2017
  • Naveen Sharma

    The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part...
    Naveen Sharma Apr 20, 2017
  • Bryian Tan

    Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
    Bryian Tan Feb 21, 2017
  • Jaymin Dangi

    Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
    Jaymin Dangi Feb 14, 2017
  • Asma Khalid

    Cross Site Scripting (XSS) - A Client Side Web Security Attack

    This article will be focusing on cross site scripting attack and prevention in general.
    Asma Khalid Feb 10, 2017
  • Melissa Crooks

    Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
    Melissa Crooks Dec 27, 2016
  • Allen O

    Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
    Allen O'neill Nov 22, 2016
  • Serguei Tchesnokov

    Why Extend Your SIEM Solution With Network Configuration Monitoring Tools

    In this blog, you will learn why one should extend his SIEM Solution With Network Configuration Monitoring Tools.
    Serguei Tchesnokov Oct 14, 2016
  • Caner Ozden

    Known Wrongs In Securing Software

    In this article, you will learn about "known wrongs" in securing software.
    Caner Ozden Sep 24, 2016
  • Gareth Bradley

    Encrypting App.config For Multiple Machines

    Here, I will teach you how you can encrypt usernames and passwords in your App.config files, using aspnet_regiis.exe, and deploy them to multiple machines easily.
    Gareth Bradley Sep 23, 2016
  • Allen O

    What About Data Privacy

    What developers need to know about data privacy law...
    Allen O'neill Aug 23, 2016
  • Santosh Kumar Adidawarpu

    Sensitive Data Exposure And Its Securing Techniques

    In this article you will learn about sensitive data exposure and its securing techniques.
  • Santosh Kumar Adidawarpu

    Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism

    In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
  • Santosh Kumar Adidawarpu

    Missing Function Level Access Control And Its Prevention Mechanism

    In this article, you will learn about missing function level access control and its prevention mechanism.
  • Santosh Kumar Adidawarpu

    Approaches To Security Misconfiguration

    In this article, you will learn about the approaches to security misconfiguration.
  • Santosh Kumar Adidawarpu

    Secure Your Application's Config File

    In this article you will learn how to secure your Config Application’s Config File.
  • Bhuvanesh Mohankumar

    Check your Firewall Port Details

    In this blog you will learn how to Check your Firewall Port Details.
  • Varun Bansal

    File Hash Comparison With MD5 And SHA1

    In this article you will learn about File Hash Comparison with MD5 and SHA1.
    Varun Bansal Apr 03, 2016
  • Pruthwiraj Jagadale

    SSL Certificate Based Authentication In Web API Project

    In this article you will learn SSL Certificate based Authentication in Web API Project
  • Jasminder Singh

    Setting HTTPS On Your Website

    In this article we will try to learn how we can apply https on our website in a test environment.
    Jasminder Singh Mar 05, 2016
  • Venkatesh Kumar

    Microsoft acquires PhoneFactor

    Microsoft announced today that it has bought PhoneFactor, a provider of multi-factor authentication.
    Venkatesh Kumar Feb 21, 2016
  • View More