All Blog Posts (967)

Is it CISO responsibility to take care of secure cording

Is CISO responsible for secure cording or it should be handled by quality fuction.

Added by Ashish Chakraborty on August 6, 2012 at 6:09pm — 2 Comments

5 of the most famous and all time favourite white hat hackers!!!

White Hat Hackers

Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created…

Continue

Added by CISO Platform on July 16, 2012 at 10:30pm — No Comments

REST APIs and Next Generation Threats: Part 1

Some days back, when I was going through the record breaking statistics of Facebook and its social networking platform’s REST APIs,  I found phrases likePeople on Facebook install 20 million applications every day. More than 2.5 million websites have integrated with Facebook”. It…

Continue

Added by CISO Platform on July 11, 2012 at 1:00pm — No Comments

Anti-Virus… or Door for a hacker?

How hackers can break into your system through anti-virus?
 
Step 1: Hacker does remote identification of antivirus - Some company Inc is running an antivirus in its mail server. The antivirus checks for every incoming mail for possible virus infection. If the mail is clean, the antivirus passes it and the mail is then forwarded to recipient. Else the mail gets dropped or rejected. The first step of an attacker is to…
Continue

Added by CISO Platform on July 5, 2012 at 4:00pm — No Comments

How to have unique passwords for each website and yet remember them easily?

 

How to have unique passwords for each website and yet remember them easily

LinkedIn got hacked and we heard it. Techradar got hacked and we heard it once more. We all know it. But we don’t do it. We all know that we should have unique passwords for different websites but how do we remember hundreds of them. Here is something that I would suggest. Something simple, easy and it…

Continue

Added by bikash on June 29, 2012 at 12:30am — 4 Comments

5 Lessons from the LinkedIn Breach

The recent LinkedIn security breach wherein approximately 6.5M user account names and passwords were stolen and published online is not something new. Such incidents are quite common place. Though the exact cause of breach is not known we can definitely point out some obvious flaws like lack of sophisticated security control. In this entry I would like to provide…

Continue

Added by bikash on June 29, 2012 at 12:00am — No Comments

Building an Android Scale Incident Response Process

Building an Android Scale Incident Response Process

Added by pritha on November 30, 1999 at 12:00pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts