• Sandeep Mishra

    Nature Of Security Flaws

    In this article, you will learn about the nature of security flaws.
    Sandeep Mishra Aug 19, 2020
  • Kuldeep Singh

    Microsoft Released July 2020 Security Update

    July 2020 Security Update addresses CVE-2020-1350, which is a Critical Remote Code Execution (RCE) vulnerability.
    Kuldeep Singh Jul 15, 2020
  • Jamil Ahmed

    Creating A Certificate Using OpenSSL On Windows For SSL/TLS Communication

    This article describes a step-by-step procedure from scratch on how to generate a server-side X509 certificate on Windows 7 for SSL/TLS TCP communication using OpenSSL.
    Jamil Ahmed Jul 02, 2020
  • Kuldeep Singh

    A New Jailbreak Unlocks Apple’s Just-Released iOS 13.5

    A new jailbreak published by Unc0ver can unlock all versions of iOS from 11 to 13.5.
    Kuldeep Singh May 26, 2020
  • Himanshu Upreti

    Identity Provider for API Security Mechanism

    This blog gives an overview of achieving authentication and authorization using identity providers for quick and easy integration. It focuses development rather than security, as it is done by a th...
    Himanshu Upreti May 08, 2020
  • Kuldeep Singh

    ZAP Version 2.8.0 Brings Heads Up Display (HUD)

    OWASP ZAP released a new version of its leading ZAP Project - V2.8.0 which brings a new Heads Up Display (HUD) interface.
    Kuldeep Singh Jul 03, 2019
  • Shweta Lodha

    Understanding Concepts - OpenId, OAuth And SAML

    This article discusses a topic that is very confusing, and many people have posted questions about their doubts on the terms related to Authorization, Authentication, and Security protocols.
    Shweta Lodha Apr 13, 2019
  • Deepak Garg

    Cookie - HttpOnly Attribute Is Not Set

    In this blog, we will discuss how a cookie becomes vulnerable when the HttpOnly attribute is not set especially when it contains sensitive information like SessionId.
    Deepak Garg Apr 09, 2019
  • Chandrakant Parmar

    Writing Secure Code Using C#

    Writing secure code is an important part of software development. .NET provides code access security mechanism that grants/denies access to resources within a method call. This article explains how...
    Chandrakant Parmar Mar 13, 2019
  • Rion Williams

    I Don’t Know Crap About Security (Or At Least I Didn’t)

    Recently, I was involved in a project where I got a chance to work on its security and frankly, I didn't know anything about security. In this write-up, I have shared how I went through it.
    Rion Williams Jan 21, 2019
  • Vivek Kumar

    Understanding JSON Web Tokens (JWT)

    In this article, we are going to understand about JSON Web Token which is known as JWT.
    Vivek Kumar Jan 09, 2019
  • Mahesh Chand

    Generating Symmetric Private Key In C# and .NET

    Generating Symmetric Private Key In C# and .NET. Major symmetric algorithms are AES, DES, RC2, Rijndael, and TripleDES. The GenerateKey and GenerateIV methods return the private secret key and init...
    Mahesh Chand Jan 08, 2019
  • Mahesh Chand

    Generating Public/Private Keys In C# And .NET

    How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvid...
    Mahesh Chand Jan 08, 2019
  • Kuldeep Singh

    Google Announces New Policies To Protect Your Data

    As part of Project Strobe, an initiative to review third-party developer access to its applications and services.
    Kuldeep Singh Oct 10, 2018
  • Riya Joshi

    GitHub Enforces A New Password And Two Factor Authentication System

    GitHub, world’s largest community of developers for coding and web development, has introduced new security practices for its users.
    Riya Joshi Aug 06, 2018
  • Ajit Khodke

    Evolving Safely In The Heart Of The Digital World

    Over the last several months, the media has repeatedly reported on the exploitations of cybercriminals using their malware to shut down equipment and networks or take data hostage with a ransom dem...
    Ajit Khodke Apr 02, 2018
  • Harsh Patel

    Google May Show Alert On Your Website After March 15, 2018

    Digicert finishes acquisition of Symantec's SSL and related PKI solution business. Now the browser community distrusts Symantec SSL certificates and after 15th March 2018, your website with Sym...
    Harsh Patel Mar 22, 2018
  • Abhay Dixit

    Volume 23 Of Microsoft Security Intelligence Report Released

    Recently, Microsoft has released volume 23 of its Security Intelligence Report.
    Abhay Dixit Mar 20, 2018
  • Pradeep Yadav

    Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
    Pradeep Yadav Sep 06, 2017
  • Pranav Mittal

    Kaspersky Announces Free Version Of Its Antivirus Software

    Kaspersky Lab has announced that it is launching a free version of its renowned antivirus software.
    Pranav Mittal Jul 27, 2017
  • Sahil Sharma

    LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
    Sahil Sharma Jun 29, 2017
  • Naveen Sharma

    The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part...
    Naveen Sharma Apr 20, 2017
  • Bryian Tan

    Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
    Bryian Tan Feb 21, 2017
  • Jaymin Dangi

    Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
    Jaymin Dangi Feb 14, 2017
  • Melissa Crooks

    Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
    Melissa Crooks Dec 27, 2016