Determine the service life of your application : Destructive TestingIs assuring quality all about testing the happy flow of the application? What exactly is the service life of your application and how do…Feb 8, 2021Feb 8, 2021
Published inDigital DiplomacyThe Evil Twin that’s hampering your security online: Evil Twin AttacksWould you choose to be bored while waiting or connect to the available free wifi to surf the internet? If you are the second person, this…Aug 16, 20201Aug 16, 20201
Published inInfosec DailyTargetting User Accounts and websites with Forgot Password.Are login pages the only the way to enter our sites?Aug 13, 2020Aug 13, 2020
Published inDigital DiplomacyTricking the frontend and the backend: HTTP request smugglingWhen you can trick the front and the back of your application causing it to behave unexpectedly.Aug 11, 2020Aug 11, 2020
Published inInfosec DailyPenetration Testing Checklist I: How much load can your site handle?If all the functions are working right, the application can be considered as Quality Product right? Wrong!Aug 7, 2020Aug 7, 2020
Published inDigital DiplomacyTighten the security belt of your website: HTTP Security HeadersWith the enhancement in technology and security, modern browsers now provide something that is known as, HTTP Headers that can improve…Aug 6, 20201Aug 6, 20201
Published inDigital DiplomacyCan hackers hijack your clicks?- Clickjacking Attacks!The threat that’s hidden right in front of you! Not just flights but all your clicks could be hijacked too.Aug 3, 2020Aug 3, 2020
Published inDigital DiplomacyCan your identity, biometrics, and your privacy get hacked? — Identity Theft AwarenessWe believe in the myth that only traditional password systems can be hacked. But, the fact is, even your face and fingerprints are…Jul 31, 2020Jul 31, 2020
Published inDigital Diplomacy“Securing products in the hands of creators” — JavaScript Developers“ JavaScript is good for the most popular language because if it’s flexibility, but it just happens to be so powerful that keeping it…Jul 27, 2020Jul 27, 2020
Published inDigital DiplomacyWhat if the biggest cyber threat is working within your organization?When security breaches make headlines, they tend to be about some external attackers from another country or the failure of some…Jul 24, 2020Jul 24, 2020