Anatomy Of Control Enviroment Read

Background Information security leaders today are under intense pressure, charged with protecting their organization’s Information assets – Information, customer data, intellectual property etc. Most Chief Information Security Officers (CISOs) are now getting more attention from senior executives than two years ago.  With …

Fighting the Advanced Threats Read

Knowing how to manage incidents is a critical element for every security environment. The incident analysis begins with the forensic and terminates with the report given to the Incident Manager. The task involves digital forensic investigators, malware analysts and network operators. Only …

Understanding Governance Read

What is Governance? Governance is the system by which an organization is directed and controlled. It consists of a set of responsibilities that give strategic guidance to management to run the organization smoothly. Its core principles are driven by maintaining organization vision, …

Indian Evidence Act and Digital Evidence Read

The Indian Evidence Act, 1872 contains set of rules and regulations regarding admissibility of evidence in the Indian Courts of law. Indian Evidence Act was passed by the British Parliament in 1872 setting up a path-breaking judicial measure by changing traditional legal …

WordPress Security Read

WordPress Security

Introduction You must have heard the name WordPress as it has become popular term across the social media world. I am not going deep into explaining what WordPress is but here is a short introduction to WordPress – It is a free …

Exploiting Redirect Page Vulnerability Read

“If it ain’t broke, don’t fix it” is a wide spread phrase. Web developers usually develop applications based on this criteria and often forgets about security. This article discusses about such a security issue often neglected by developers. When creating protected parts …

Fatcat V2 Auto [S]ql-Injector Read

Fatcat is open source web application pen tester tool freely available for download. Fatcat SQL injection is developed for reducing the processes of while exploiting SQL injection vulnerability and exploiting SQL injection profoundly. Features of Fatcat V2 It support normal SQL injection …

What If? Read

What If?

1,791 numbers of cases registered in India in 2011 under the Information Technology Act and concerning provisions. (Source NCRB database). Many more must have been registered in 2012 (Stats are yet to be declared) and much more go unnoticed due many reasons. …

IronWASP Series Part – 1 Read

Hello there, I am Lava, the author of IronWASP. This article is the first in the series of articles that I will be doing on IronWASP. In this article I will cover the introduction to IronWASP and explain how you can scan …