May, 2018

  • 2 May

    Performing Testing Security in The Cloud Based Application

    Performing Testing Security in The Cloud Based Application

    Security In The Cloud: So how do you test for security in the cloud? Many options are available in both the manual and automated tools you have used with web applications, but there are other options as well. The tools listed here are discussed at SearchSecurity.com and are representative of …

  • 1 May

    Testing Web Applications

    Testing Web Applications

    Testing Web Applications: Since web applications are complex, the use of specialized software to analyze or test an application may be necessary. Some of these software packages are included here. Burp Suite Burp Suite is a Java-based application used to test and attack web application. Upon closer inspection the software …

April, 2018

  • 30 April

    U.S Public School Pays $10,000 to Hackers For Ransomware Attack To Unlock Files

    U.S Public School Pays $10,000 to Hackers For Ransomware Attack To Unlock Files

    U.S School Paid $10,000 to Hackers to Unlock Their Files: Hackers have infiltrated Massachusetts school district Leominster school computer system earlier this month has locked down with the computer system asking for $10,000 ransomware to be paid to get decrypt key. The school has paid the ransom to unlock their …

  • 29 April

    Closer Inspection of a Web Application

    Closer Inspection of a Web Application

    Web Application: Web application is designed to run on web servers and send their output over the Internet. Let’s examine the running of such applications in their environment. You can visualize a web application as consisting of not only a client and server but also layers. These layers are as …

  • 28 April

    Session Management Issues

    Session Management Issues

    Session Management Issues: A session represents the connection that a client has with the server application. The session information that is maintained between the client and the server is important and can give an attacker access to confidential information if compromised. Ideally, a session will have a unique identifier, encryption, …

  • 27 April

    NCA Shut Down Website And Begin Arrests Following Cyber Attack On 7 UK Banks

    NCA Shut Down Website And Begin Arrests Following Cyber Attack On 7 UK Banks

    Cyber Attack On 7 UK Banks: The seven most popular United Kingdom largest banks which includes: Santander, Royal Bank of Scotland and Tesco Bank were forced to shut down their complete system which occurred due to a cyber attack last year happened using a rented software that costs only £11, …

  • 26 April

    Yahoo Hit With $35 Million USD Fine Over 2014 Data Breach

    Yahoo Hit With $35 Million USD Fine Over 2014 Data Breach

    — The company hides the breach from the investors and customers.- Yahoo Hit With $35 Million Fine: Yahoo which is now called Altaba, has been given a huge fine due to the 2014 data breach issues, which affected around 500 Million users, which was actually hidden by the company until …

  • 26 April

    Georgia Government Computer Servers Targeted With Ransomware Attack

    Georgia Government Computer Servers Targeted With Ransomware Attack

    Ransomware Attack on Georgia Government Computer: A cyber attack has been occurred within the Dawson Country Georgia which is targeting the Government computer servers. According to the experts of the country IT analysts Will Stattuck, the Dawson Country servers which were attacked on the Monday afternoon, April 23rd. Shattuck also …

  • 25 April

    APT Group Cyber Attack to Hack Various Companies Web Servers Using Advanced Hacking Tools

    APT Group Cyber Attack to Hack Various Companies Web Servers Using Advanced Hacking Tools

    APT Group Cyber Attack Hacked Various Companies: A very well known group which is also called Energetic Bear / Crouching Yeti attacked different companies’ web servers with a strong vision on energy and industrial sectors around the Globe. This Cyber Group attacking various types of companies web servers around the …

  • 24 April

    Cyber Attack On Careem: Data of 14 Million Customers Were Stolen

    Cyber Attack On Careem: Data of 14 Million Were Customers Stolen

    Careem Victims of Cyber Attack Compromising 14 Million User’s Data: Careem, Uber’s main ride app competitor in the Middle East, was hit by a huge cyber attack that jeopardized the data of almost 14 million users, it is said on Monday. The company learned of the breach, in which they …