Security
IT Security

RECENT POSTS

  • Kuldeep Singh

    Google Announces New Policies To Protect Your Data

    As part of Project Strobe, an initiative to review third-party developer access to its applications and services.
    Kuldeep Singh Oct 10, 2018
  • Mahesh Chand

    Top 10 Tips To Protect From Online Hacking

    Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will...
    Mahesh Chand Aug 23, 2018
  • Riya Joshi

    GitHub Enforces A New Password And Two Factor Authentication System

    GitHub, world’s largest community of developers for coding and web development, has introduced new security practices for its users.
    Riya Joshi Aug 06, 2018
  • Mahesh Chand

    Generating Public/Private Keys In C# And .NET

    How to generate public/private key in C#.
    Mahesh Chand Jul 09, 2018
  • Mahesh Chand

    Generating Symmetric Private Key In C# and .NET

    Generating Symmetric Private Key In C# and .NET
    Mahesh Chand Jul 07, 2018
  • Ajit Khodke

    Evolving Safely In The Heart Of The Digital World

    Over the last several months, the media has repeatedly reported on the exploitations of cybercriminals using their malware to shut down equipment and networks or take data hostage with a ransom dem...
    Ajit Khodke Apr 02, 2018
  • Harsh Patel

    Google May Show Alert On Your Website After March 15, 2018

    Digicert finishes acquisition of Symantec's SSL and related PKI solution business. Now the browser community distrusts Symantec SSL certificates and after 15th March 2018, your website with Sym...
    Harsh Patel Mar 22, 2018
  • Abhay Dixit

    Orbitz Reports Data Breach Which Affected 880,000 Credit Cards

    Recently, a travel booking website, Orbitz, has revealed that they have found a Data Breach exposing customers information.
    Abhay Dixit Mar 21, 2018
  • Sourabh Somani

    How To Enable HTTPS On Your Website For Free

    Here is a walk-through of the process so as to make you acquainted with the process of how to implement the SSL without spending a single cent.
    Sourabh Somani Mar 20, 2018
  • Abhay Dixit

    Volume 23 Of Microsoft Security Intelligence Report Released

    Recently, Microsoft has released volume 23 of its Security Intelligence Report.
    Abhay Dixit Mar 20, 2018
  • Abhay Dixit

    Google Reports Security Flaw In Microsoft Edge

    Google had found some security flaws in Microsoft Edge.
    Abhay Dixit Feb 20, 2018
  • Abhay Dixit

    Cryptocurrency Worth $170 Million Missing From BitGrail

    BitGrail has announced recently that its internal checks have found some unauthorized transactions which have led to the loss of 17M Nano, a form of cryptocurrency.
    Abhay Dixit Feb 12, 2018
  • Abhay Dixit

    $400 Million Stolen From Coincheck In A Security Breach

    The cryptocurrency exchange firm in Japan, Coincheck, has revealed the security breach resulting in a loss of $400 million.
    Abhay Dixit Jan 29, 2018
  • Pranav Mittal

    Millions Of Licenses Stolen From Uber Database

    Uber has disclosed that the information of over 57 million of Uber users and drivers accounts was stolen in October last year.
    Pranav Mittal Nov 22, 2017
  • Pranav Mittal

    CCleaner Gets Infected – 2.3 Million Users Affected

    In a recent incident of software security inspection, the Avast-owned CCleaner Security App was found to be infected with a malware backdoor installed in it.
    Pranav Mittal Sep 19, 2017
  • Pradeep Yadav

    Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
    Pradeep Yadav Sep 06, 2017
  • Pranav Mittal

    Kaspersky Announces Free Version Of Its Antivirus Software

    Kaspersky Lab has announced that it is launching a free version of its renowned antivirus software.
    Pranav Mittal Jul 27, 2017
  • Sahil Sharma

    LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
    Sahil Sharma Jun 29, 2017
  • Naveen Sharma

    The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part...
    Naveen Sharma Apr 20, 2017
  • Bryian Tan

    Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
    Bryian Tan Feb 21, 2017
  • Jaymin Dangi

    Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
    Jaymin Dangi Feb 14, 2017
  • Asma Khalid

    Cross Site Scripting (XSS) - A Client Side Web Security Attack

    This article will be focusing on cross site scripting attack and prevention in general.
    Asma Khalid Feb 10, 2017
  • Melissa Crooks

    Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
    Melissa Crooks Dec 27, 2016
  • Allen O

    Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
    Allen O'neill Nov 22, 2016
  • Serguei Tchesnokov

    Why Extend Your SIEM Solution With Network Configuration Monitoring Tools

    In this blog, you will learn why one should extend his SIEM Solution With Network Configuration Monitoring Tools.
    Serguei Tchesnokov Oct 14, 2016
  • View More