Cookies are small text files that some websites put on user’s computer to store a variety of information about the user and user preferences. Continue reading “Tech Demystified – Cookies”
Securing VoIP – Part 2 – Technology
Security risks involved in VoIP implementation include denial of service (DoS), service theft, unauthorized call monitoring, call routing manipulation, identity theft and impersonation, among others. Continue reading “Securing VoIP – Part 2 – Technology”
IE, Firefox, Safari & iPhone taken down at Pwn2Own
At the CanSecWest security conference held earlier this year, IE, Firefox, Safari & iPhone were taken down within minutes. The fully patched systems went down to remote exploits which only goes to show how insecure internet facing systems are.
Continue reading “IE, Firefox, Safari & iPhone taken down at Pwn2Own”
SOA Security – Part 3
This final part of the article on SOA security deals about technology involved in securing WSOA (Web SOA) Continue reading “SOA Security – Part 3”
Know the ‘lock’ icon on your browser
Most of us know that a website is secure if there is a ‘lock’ icon in the browser frame. Let us find out what this lock means and how it enables us to know whether a site is secure. Continue reading “Know the ‘lock’ icon on your browser”
An overview of the new Internet Protocol-IPv6
Since 1981, TCP/IP has been built on version 4 of the Internet Protocol. IPv4 was created when the giant, world-wide Internet we take for granted today was just a small experimental network. Considering how much the Internet has grown and changed over the course of two decades, IPv4 has done its job admirably. At the same time, it has been apparent for many years that certain limitations in this venerable protocol would hold back the future growth of both Internet size and services if not addressed. Continue reading “An overview of the new Internet Protocol-IPv6”
OWASP releases ‘Top Ten’ for 2010
Open Web Application Security Project has come out with the top ten web application security risks for the year 2010. The following table makes a comparative analysis between OWASP Top 10 – 2007 & OWASP Top 10 – 2010
Securing VoIP – Part 1 – An Introduction To VoIP
Voice over internet protocol is the current trend and technology that people find it easy and economical to use for communication between each other both for personal as well as in corporate world. So what is VoIP exactly and what are the things that comprise a VoIP system and what are the pros and cons of it forms the current discussion . Continue reading “Securing VoIP – Part 1 – An Introduction To VoIP”
Is Anti-virus software needed for Linux?
Linux is considered a very safe OS. This is mainly because there are more Windows machines than Linux boxes. For hackers it makes more sense to attack a wider population to get better results. As a result Linux has been spared of widespread virus attacks. This does not mean Linux has bullet-proof safety against viruses. The following table lists some linux viruses which necessiates administrators to consider anti-virus measures to be implemented. Continue reading “Is Anti-virus software needed for Linux?”
Banks responsible for hacked customer accounts
A recent ruling by consumer court in Mumbai, India has held the bank responsible if it has not complied with regulations and the account holders money is fraudently transferred. Continue reading “Banks responsible for hacked customer accounts”