To Start With Whenever you are connecting to a site via HTTPS, the complete session is encrypted and all the application data is sent over
Background This is the third article on Secure SDLC (S-SDLC) and the second on the implementation of Secure SDLC. So far we have covered an
1. Introduction Social media’s history precedes the 21th century and ever since then malevolent people have attempted to infiltrate the computers of innocent people using
Objective: The objective of this article is to introduce the user to Secure Software Development Life Cycle (will now on be referenced to as S-SDLC).
Introduction Social media has assumed a fundamental role in today’s society. It is a technology with the highest penetration level, as billions of people are
Information security and penetration testing is not limited to find the vulnerabilities on the website and network; it is an interesting profession that covers every
This article aims to provide a general list of security issues that should be considered when you are auditing a Linux system or when you
Cyber attacks through the perspective of the armed attack notion A cyber attack cannot rise to the level of an armed attack as prescribed in
Blackberry is known for its email and security rather than a company which produces fancy mobile phones. This is one of the reasons why Blackberry
Introduction Among the series of problems with regard to the legal regulation of cyber attacks is how the self-defense doctrine applies to them. In itself,
Introduction Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on
While taking a knowledge management course in school, one thing that struck me was the common theme among classmates of, “…as long as the knowledge
The number of annual security incidents caused by insider threats is increasing. In The CERT Guide to Insider Threats, Capelli et al write, “Insider threats
Large corporations have been employing two-factor authentication and multi-factor authentication for years to protect against customer identity theft, fraud, data theft, phishing and other cybercrimes.
This article is focused on the sport football (or soccer in the USA). Nevertheless, the same technology and security measures can be applied in virtually
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way.
Introduction Technology is invading our lives. Every day we perform a multitude of operations using computing devices; we check out bank account balance, we pay
Introduction Identity theft occurs when a person uses the identity of another person with the intent to obtain benefits illegally. The victim of the identity
Going through Infosec articles provides us with useful insights into today’s real world scenarios. This article can be treated as an extension of the previously