Open Web Application Security Project has come out with the top ten web application security risks for the year 2010. The following table makes a comparative analysis between OWASP Top 10 – 2007 & OWASP Top 10 – 2010
Securing VoIP – Part 1 – An Introduction To VoIP
Voice over internet protocol is the current trend and technology that people find it easy and economical to use for communication between each other both for personal as well as in corporate world. So what is VoIP exactly and what are the things that comprise a VoIP system and what are the pros and cons of it forms the current discussion . Continue reading “Securing VoIP – Part 1 – An Introduction To VoIP”
Is Anti-virus software needed for Linux?
Linux is considered a very safe OS. This is mainly because there are more Windows machines than Linux boxes. For hackers it makes more sense to attack a wider population to get better results. As a result Linux has been spared of widespread virus attacks. This does not mean Linux has bullet-proof safety against viruses. The following table lists some linux viruses which necessiates administrators to consider anti-virus measures to be implemented. Continue reading “Is Anti-virus software needed for Linux?”
Banks responsible for hacked customer accounts
A recent ruling by consumer court in Mumbai, India has held the bank responsible if it has not complied with regulations and the account holders money is fraudently transferred. Continue reading “Banks responsible for hacked customer accounts”
Tech Terminology Demystified – UTM
Unified Threat Management (UTM) is a comprehensive solution that has gained widespread currency as a primary network gateway defense solution for organizations.
SOA Security – Part 2 – Basics
In this article, we examine how security applies to Service Oriented Architecture (SOA). Continue reading “SOA Security – Part 2 – Basics”