Ashiq JA

Ashiq JA is a Cyber Security Researcher and Writer passionate about Web Application Security, Security research using Machine Learning and Big Data, Deep web, technologies and Threat Analysis. He is currently working as a Security Consultant. He believes in knowledge sharing as the best source for information security awareness. Follow Ashiq JA on Twitter @AshiqJA to get the latest updates on infosec.
Ashiq JA

Anatomy of an APT attack: Step by step approach

This article will explore the technique, design and the inner workings of an APT (Advanced Persistent Threat) attack. It will also relate various stages of a

Challenges Faced By CISOs: Balancing Security versus Manpower

Cybersecurity is not about buying the latest security monitoring and automation tools to solve the day-to-day problems. Government and banking organizati

Hackers Selling Healthcare Data in the Black Market

With the drastic increase in Cyber Crime, the healthcare industry is a potential target for data hungry hackers. Patient safety may not directly relate to da

HTTP/2: Enforcing Strong Encryption as the De Facto Standard

HTTP Protocol, which serves as the communication channel for HTTP requests and responses on the Web, has received its first major revision since introduction

Insider vs. outsider threats: Identify and prevent

In my last article, we discussed on a step-by-step approach on APT attacks. The origin of any kind of cyber-attack is through an external or an internal sour

The importance of cyber hygiene in cyberspace

The drastic increase in the frequency of cyber attacks on financial systems and the healthcare industry (both large and small scale industries) have raised c

DNA cryptography and information security

What is cryptography? Cryptography is the science of study of secret writing. It helps in encrypting a plain text message to make it unreadable. It is a ver

Digital Dark Age: Information Explosion and Data Risks

"Old formats of documents that we've created or presentations may not be readable by the latest version of the software because backwards compatibility is n

Digital footprints and privacy concerns

"It is too difficult to give exact statistics on the amount of data people leave, but confirmed every time we perform an online action, we are contributing