IT Security


  • ZAP Version 2.8.0 Brings Heads Up Display (HUD)

    OWASP ZAP released a new version of its leading ZAP Project - V2.8.0 which brings a new Heads Up Display (HUD) interface.
  • Understanding Concepts - OpenId, OAuth And SAML

    This article discusses a topic that is very confusing, and many people have posted questions about their doubts on the terms related to Authorization, Authentication, and Security protocols.
  • Cookie - HttpOnly Attribute Is Not Set

    In this blog, we will discuss how a cookie becomes vulnerable when the HttpOnly attribute is not set especially when it contains sensitive information like SessionId.
  • Writing Secure Code Using C#

    Writing secure code is an important part of software development. .NET provides code access security mechanism that grants/denies access to resources within a method call. This article explains how to
  • I Don’t Know Crap About Security (Or At Least I Didn’t)

    Recently, I was involved in a project where I got a chance to work on its security and frankly, I didn't know anything about security. In this write-up, I have shared how I went through it.
  • Understanding JSON Web Tokens (JWT)

    In this article, we are going to understand about JSON Web Token which is known as JWT.
  • Generating Symmetric Private Key In C# and .NET

    Generating Symmetric Private Key In C# and .NET. Major symmetric algorithms are AES, DES, RC2, Rijndael, and TripleDES. The GenerateKey and GenerateIV methods return the private secret key and initial
  • Generating Public/Private Keys In C# And .NET

    How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
  • How To Enable HTTPS🔒 On Your Website For Free

    Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 10 m
  • Google Announces New Policies To Protect Your Data

    As part of Project Strobe, an initiative to review third-party developer access to its applications and services.
  • Top 10 Tips To Protect From Online Hacking

    Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will mo
  • GitHub Enforces A New Password And Two Factor Authentication System

    GitHub, world’s largest community of developers for coding and web development, has introduced new security practices for its users.
  • Evolving Safely In The Heart Of The Digital World

    Over the last several months, the media has repeatedly reported on the exploitations of cybercriminals using their malware to shut down equipment and networks or take data hostage with a ransom demand
  • Google May Show Alert On Your Website After March 15, 2018

    Digicert finishes acquisition of Symantec's SSL and related PKI solution business. Now the browser community distrusts Symantec SSL certificates and after 15th March 2018, your website with Symant
  • Volume 23 Of Microsoft Security Intelligence Report Released

    Recently, Microsoft has released volume 23 of its Security Intelligence Report.
  • Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Securi
  • Kaspersky Announces Free Version Of Its Antivirus Software

    Kaspersky Lab has announced that it is launching a free version of its renowned antivirus software.
  • LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult to
  • The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part of
  • Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
  • Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
  • Cross Site Scripting (XSS) - A Client Side Web Security Attack

    This article will be focusing on cross site scripting attack and prevention in general.
  • Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
  • Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
  • Why Extend Your SIEM Solution With Network Configuration Monitoring Tools

    In this blog, you will learn why one should extend his SIEM Solution With Network Configuration Monitoring Tools.
  • View More