What is Backporting And How It Is Done?
Backporting is a technique used to apply a security fix to a older version of the software component using the parts of the newer version of same software component. In some cases the environment may not […]
Backporting is a technique used to apply a security fix to a older version of the software component using the parts of the newer version of same software component. In some cases the environment may not […]
Description: When applications through detailed error messages or printstacktrace during the execution of a program then that application is considered to be vulnerable to system information leak. Impact: An adversary could take advantage of system […]
Description: Hardcoded password is nothing but a plaintext password used in the application source code as it is one of the easiest ways to use password for authentication as required to connect and communicate with […]
The reliance on technology is boosting up. The threats are also going accordingly. What else may we face in the run? Well, there are different types of cyber attack that can break your device security […]
SSL is secure socket layer, also normalized as TLS known as Transport Layer Security and it is mainly used for secure transmission of data between the client and server and in this article we are […]
Description: If applications do not enforce Http Strict Transport Security then there is a chance that sensitive data could be transmitted in clear text and those having access to the network can sniff and steal […]
Besides personal computer, smartphone has taken the place where almost anything can be done. Smartphone technology is getting so advanced that we do not need PC or laptop with us to get our official or […]
Here we will talk about basic network security appliances. These appliances keep an eye on the traffic and alerts the administrator is anything wrong is detected. These devices play an important role in achieving network […]
Now we are going to discuss the methods through which we can ensure our network security. These methods can be either software or hardware based depending on the need and type of network. These methods […]
A wireless medium is vulnerable to various threats. Here we will discuss different kinds of threats and techniques to overcome them. There are the following Wireless Network Threats – WAR driving – WAR driving is […]
Copyright © 2020 Gotowebsecurity