Security
IT Security

RECENT POSTS

  • Kuldeep Singh

    ZAP Version 2.8.0 Brings Heads Up Display (HUD)

    OWASP ZAP released a new version of its leading ZAP Project - V2.8.0 which brings a new Heads Up Display (HUD) interface.
    Kuldeep Singh Jul 03, 2019
  • Shweta Lodha

    Understanding Concepts - OpenId, OAuth And SAML

    This article discusses a topic that is very confusing, and many people have posted questions about their doubts on the terms related to Authorization, Authentication, and Security protocols.
    Shweta Lodha Apr 13, 2019
  • Deepak Garg

    Cookie - HttpOnly Attribute Is Not Set

    In this blog, we will discuss how a cookie becomes vulnerable when the HttpOnly attribute is not set especially when it contains sensitive information like SessionId.
    Deepak Garg Apr 09, 2019
  • Chandrakant Parmar

    Writing Secure Code Using C#

    Writing secure code is an important part of software development. .NET provides code access security mechanism that grants/denies access to resources within a method call. This article explains how...
    Chandrakant Parmar Mar 13, 2019
  • Rion Williams

    I Don’t Know Crap About Security (Or At Least I Didn’t)

    Recently, I was involved in a project where I got a chance to work on its security and frankly, I didn't know anything about security. In this write-up, I have shared how I went through it.
    Rion Williams Jan 21, 2019
  • Vivek Kumar

    Understanding JSON Web Tokens (JWT)

    In this article, we are going to understand about JSON Web Token which is known as JWT.
    Vivek Kumar Jan 09, 2019
  • Mahesh Chand

    Generating Symmetric Private Key In C# and .NET

    Generating Symmetric Private Key In C# and .NET. Major symmetric algorithms are AES, DES, RC2, Rijndael, and TripleDES. The GenerateKey and GenerateIV methods return the private secret key and init...
    Mahesh Chand Jan 08, 2019
  • Mahesh Chand

    Generating Public/Private Keys In C# And .NET

    How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvid...
    Mahesh Chand Jan 08, 2019
  • Sourabh Somani

    How To Enable HTTPS🔒 On Your Website For Free

    Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 1...
    Sourabh Somani Dec 08, 2018
  • Kuldeep Singh

    Google Announces New Policies To Protect Your Data

    As part of Project Strobe, an initiative to review third-party developer access to its applications and services.
    Kuldeep Singh Oct 10, 2018
  • Mahesh Chand

    Top 10 Tips To Protect From Online Hacking

    Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will...
    Mahesh Chand Aug 23, 2018
  • Riya Joshi

    GitHub Enforces A New Password And Two Factor Authentication System

    GitHub, world’s largest community of developers for coding and web development, has introduced new security practices for its users.
    Riya Joshi Aug 06, 2018
  • Ajit Khodke

    Evolving Safely In The Heart Of The Digital World

    Over the last several months, the media has repeatedly reported on the exploitations of cybercriminals using their malware to shut down equipment and networks or take data hostage with a ransom dem...
    Ajit Khodke Apr 02, 2018
  • Harsh Patel

    Google May Show Alert On Your Website After March 15, 2018

    Digicert finishes acquisition of Symantec's SSL and related PKI solution business. Now the browser community distrusts Symantec SSL certificates and after 15th March 2018, your website with Sym...
    Harsh Patel Mar 22, 2018
  • Abhay Dixit

    Volume 23 Of Microsoft Security Intelligence Report Released

    Recently, Microsoft has released volume 23 of its Security Intelligence Report.
    Abhay Dixit Mar 20, 2018
  • Pradeep Yadav

    Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
    Pradeep Yadav Sep 06, 2017
  • Pranav Mittal

    Kaspersky Announces Free Version Of Its Antivirus Software

    Kaspersky Lab has announced that it is launching a free version of its renowned antivirus software.
    Pranav Mittal Jul 27, 2017
  • Sahil Sharma

    LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
    Sahil Sharma Jun 29, 2017
  • Naveen Sharma

    The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part...
    Naveen Sharma Apr 20, 2017
  • Bryian Tan

    Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
    Bryian Tan Feb 21, 2017
  • Jaymin Dangi

    Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
    Jaymin Dangi Feb 14, 2017
  • Melissa Crooks

    Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
    Melissa Crooks Dec 27, 2016
  • Allen O

    Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
    Allen O'neill Nov 22, 2016
  • Serguei Tchesnokov

    Why Extend Your SIEM Solution With Network Configuration Monitoring Tools

    In this blog, you will learn why one should extend his SIEM Solution With Network Configuration Monitoring Tools.
    Serguei Tchesnokov Oct 14, 2016
  • Caner Ozden

    Known Wrongs In Securing Software

    In this article, you will learn about "known wrongs" in securing software.
    Caner Ozden Sep 24, 2016
  • View More