RECENT POSTS

  • Kuldeep Singh

    Google Announces New Policies To Protect Your Data

    As part of Project Strobe, an initiative to review third-party developer access to its applications and services.
    Kuldeep Singh Oct 10, 2018
  • Riya Joshi

    GitHub Enforces A New Password And Two Factor Authentication System

    GitHub, world’s largest community of developers for coding and web development, has introduced new security practices for its users.
    Riya Joshi Aug 06, 2018
  • Ajit Khodke

    Evolving Safely In The Heart Of The Digital World

    Over the last several months, the media has repeatedly reported on the exploitations of cybercriminals using their malware to shut down equipment and networks or take data hostage with a ransom dem...
    Ajit Khodke Apr 02, 2018
  • Harsh Patel

    Google May Show Alert On Your Website After March 15, 2018

    Digicert finishes acquisition of Symantec's SSL and related PKI solution business. Now the browser community distrusts Symantec SSL certificates and after 15th March 2018, your website with Sym...
    Harsh Patel Mar 22, 2018
  • Abhay Dixit

    Volume 23 Of Microsoft Security Intelligence Report Released

    Recently, Microsoft has released volume 23 of its Security Intelligence Report.
    Abhay Dixit Mar 20, 2018
  • Pradeep Yadav

    Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
    Pradeep Yadav Sep 06, 2017
  • Pranav Mittal

    Kaspersky Announces Free Version Of Its Antivirus Software

    Kaspersky Lab has announced that it is launching a free version of its renowned antivirus software.
    Pranav Mittal Jul 27, 2017
  • Sahil Sharma

    LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
    Sahil Sharma Jun 29, 2017
  • Naveen Sharma

    The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part...
    Naveen Sharma Apr 20, 2017
  • Bryian Tan

    Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
    Bryian Tan Feb 21, 2017
  • Jaymin Dangi

    Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
    Jaymin Dangi Feb 14, 2017
  • Melissa Crooks

    Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
    Melissa Crooks Dec 27, 2016
  • Allen O

    Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
    Allen O'neill Nov 22, 2016
  • Serguei Tchesnokov

    Why Extend Your SIEM Solution With Network Configuration Monitoring Tools

    In this blog, you will learn why one should extend his SIEM Solution With Network Configuration Monitoring Tools.
    Serguei Tchesnokov Oct 14, 2016
  • Caner Ozden

    Known Wrongs In Securing Software

    In this article, you will learn about "known wrongs" in securing software.
    Caner Ozden Sep 24, 2016
  • Gareth Bradley

    Encrypting App.config For Multiple Machines

    Here, I will teach you how you can encrypt usernames and passwords in your App.config files, using aspnet_regiis.exe, and deploy them to multiple machines easily.
    Gareth Bradley Sep 23, 2016
  • Allen O

    What About Data Privacy

    What developers need to know about data privacy law...
    Allen O'neill Aug 23, 2016
  • Santosh Kumar Adidawarpu

    Sensitive Data Exposure And Its Securing Techniques

    In this article you will learn about sensitive data exposure and its securing techniques.
  • Santosh Kumar Adidawarpu

    Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism

    In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
  • Santosh Kumar Adidawarpu

    Missing Function Level Access Control And Its Prevention Mechanism

    In this article, you will learn about missing function level access control and its prevention mechanism.
  • Santosh Kumar Adidawarpu

    Approaches To Security Misconfiguration

    In this article, you will learn about the approaches to security misconfiguration.
  • Santosh Kumar Adidawarpu

    Secure Your Application's Config File

    In this article you will learn how to secure your Config Application’s Config File.
  • Bhuvanesh Mohankumar

    Check your Firewall Port Details

    In this blog you will learn how to Check your Firewall Port Details.
  • Varun Bansal

    File Hash Comparison With MD5 And SHA1

    In this article you will learn about File Hash Comparison with MD5 and SHA1.
    Varun Bansal Apr 03, 2016
  • Pruthwiraj Jagadale

    SSL Certificate Based Authentication In Web API Project

    In this article you will learn SSL Certificate based Authentication in Web API Project