
Secure Coding for Developers
Date:16-03-20 | Posted By Ujwal kumar
While there are new Platforms, Applications and Softwares coming up every single day, Security is top-of-mind for most people working with technology. Over the years, there has been increasing awareness about data breaches, Cyber attacks and what not. Developers now don’t just require to enhance their coding to obtain higher accuracy, optimization and speed, they need to work upon most crucial aspect, Security...
Read More
Google Dorks, Recon & OSINT
Date:29-01-20 | Posted By Ujwal kumar
Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use. These techniques are excellent in manual recon methodology to find crucial information about any organization, which might have been left out due to certain consequences...
Read More
Why Every Organization requires a Bug Bounty Program
Date:01-03-20 | Posted By Ujwal kumar
The threat to businesses from Cybercrime & Data breaches has never been greater and we see headlines almost every week pertaining to a breach of a company’s network or website. As Cisco Chairman John Chambers commented ‘There are two types of company, those who have been hacked and those who don’t know they have been hacked....
Read More