Data Privacy Assessment-Key Areas
Data Privacy Assessments – Key Areas Area 1: Transparency When the user information is collected from individuals, are they made aware of the uses for that information? Are Individuals made aware of...
View ArticleWordPress 4.0.1 got released with many security updates
WordPress 4.0 was released 2 months back on 4th September, 2014 (Oh My Birthday 😉 ) and there were 8 security bug fix patched in security update in WordPress Version 4.0.1 on 20th November,2014. It has...
View ArticleHow to find WordPress version of a site
You want to know WordPress version of site which is not owned or administered by you or in simple word you want to know WordPress version without logging in to the site? First let’s see how we can find...
View ArticleHow to Generate Unique Secure Passwords You Remember
Our social life is growing. Day by day we are adding new sites. More and more services are going online. Along with this we all share the problem of remembering the passwords for various sites. Lot of...
View ArticleProtect your system from Ransomware Cryptolocker Malware
If you are a Windows user and open any url or email without verifying its authenticity, then you are at risk of getting your whole system data decrypted by a malware popularly known as “Ransomware”....
View ArticleBeware of WhatsApp Voice call spam message
We hear from long time that it is easy to breach human psychology as compare to robust software. Yes, WhatsApp Voice calling message floating around everyone’s whatsapp chat message is an example of...
View ArticleSQL Injection Authentication Bypass Cheat Sheet
This list can be used by penetration testers when testing for SQL injection authentication bypass. A penetration tester can use it manually or through burp in order to automate the process. The creator...
View ArticleAutomated bash script to test HTTP HEADER Response
With below code we can try to automate the different methods that a web server or a website allow. HTTP Methods that we can test here are: GET HEAD POST PUT TRACE CONNECT DELETE We have used JAFFA an...
View ArticleHiding sensitive header response for IIS server
The purpose of this blog post is to discuss how to remove unwanted HTTP response headers from the response. Typically we have 3 response headers which many people want to remove for security reason....
View ArticlePossible ways to hack mail account
It is very usual case now a days that mail accounts are getting compromised due to various reasons. I feel public awareness on Cyber Security is much needed. Specially in countries like India. Here are...
View Article