Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

Category: Penetration Testing

Cyber Threats

      Penetration testing (also called pen testing) is the practice of testing a computer system, network, website or Web application to find vulnerabilities that an attacker could exploit. Another term used to decribe pen testing is ‘ethical hacking’. Many companies offer the service of testing your website to check the security measures it has in place. It is especially common for owners of ecommerce websites to demand such a service. Once their testing is

Network Security, Honeypots And Cryptography

    Network Security, Honeypots And Cryptography For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools used or even the methods employed. Given all

Creating A Secure Android App

      The Android operating system has lots of built-in security features, such as application sandboxing, protection against buffer and integer overflow attacks, and segregated memory areas for program instructions and data. As a result, simple Android apps that don’t perform any file system or networking operations can often be considered secure by default. If you are developing a more complex app, however, you are responsible for making it secure and to make sure the

Top
error: