Social Media & Indian Cyber Law Read

In India, there has been a lot of controversy over the last few months over Section 66A of the Indian Cyberlaw being the amended Indian Information Technology Act, 2000 on different occasions. In Professor Ambikesh Mahapatra case, Professor Ambikesh Mahapatra was arrested …

Identify Web Application Vulnerabilities using OWASP ZAP Read

Introduction Today’s organizations are facing major problems with Web Application Vulnerabilities. Many of such Web app vulnerabilities resulted in compromise of systems, including financial damage, theft of credit cards, loss of confidential data and reputational damage. Sometimes you just need to browse …

Hijacking Bluetooth Headset Read

[Note: This demonstration is based on article “Bluetooth Reconnaissance – Watching over Invisible and Cloning Bluetooth Device”. Please go through it before moving forward] Well for this demonstration, we are using following devices and tools: Bluetooth Headset External Bluetooth Dongle Laptop with …

Automatic Request Filter in PHP Read

header.png Filtering plays a very important role when you are thinking about securing your application against malicious attacks. Security is a very important aspect while developing a web application. There are several kinds of attacks that could be used to break into …

Cloning Bluetooth Device Read

header.png [Note: This demonstration is based on article “Bluetooth Reconnaissance – Watching over Invisible”. Please go through it before moving forward] Well in the previous section we saw that how to find the devices which are in visible as well as in …

Information Rights Management (IRM) Read

IRM.png Introduction Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides “in” or “outside” the corporate boundaries. This happens as the permissions embedded inside …

Loggingin MySQL Read

Loggingin MySQL

mysql-logos.gif Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas in database. What you will learn: In this article I am going to talk about how …