Digital Signature Read

Digital Signature

Before we begin or discussion on the digital signature let us first understand what is Signature, what does it stand for etc.  . A Signature is a handwritten and often stylized  representation of someone’s  name, initials, nickname or even  a simple mark …

Apple iOS vulnerabilities Read

Introduction Apple iOS has successfully emerged as one of the most widely used Operating System today. It runs on Apple devices such as iPhone, iPad, iPod touch and Apple TV. Apple AppStore has the highest number of applications (500,000) with 25 billion …

Private Browsing Read

Private Browsing

While trying to read what “private browsing” means, I came across its page in Wikipedia. It has a very interesting definition. It reads as follows: Privacy mode or "private browsing" is a term that refers to privacy features in some web browsers. …

Hypertext Transfer Protocol Read

HTTP HTTP is a hypertext transfer protocol is provides a standard for web browsers and communicate with server. It is an application layer protocol designed within the framework of the Internet protocol suite. HTTP is also called a stateless protocol because each …

HTTPS (Hyper Text Transfer Protocol Secure) Read

Introduction Hypertext Transfer Protocol (HTTP) is a protocol where communication happens in clear text. To ensure authenticity, confidentiality and integrity of messages Netscape designed HTTPS protocol. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the …

Firewall 101 Read

Firewall 101

Introduction Today we are exposed to innumerable threats online. Firewalls act as the first line of defense for securing our network against these threats.  Firewall could be a program or a device or group of devices used to control the traffic flow. …

OWASP Mobile Security Project Read

What is the “Mobile Security Project”?The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, our goal is to classify mobile security …