Information Security Monthly Newsletter – Dec 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We…

Android Mobile Application Penetration Testing

Android is a mobile operating system developed by Google, designed mainly for the touchscreen devices like smartphones and tablets. Android operating system was originally released on 23rd September 2008. There are total 11 version of android operating system available till date from Gingerbread to Pie….

Information Security Monthly Newsletter – Nov 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We…

Information Security Monthly Newsletter – Oct 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We…

Information Security Monthly Newsletter – Sep 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We…

Information Security Monthly Newsletter – Aug 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We…

Best Practices for Securing Crypto Currency exchange

In our last blog on crypto we discussed on a case study related to penetration testing of crypto exchange. Today we are going to discuss on best security practices for securing crypto exchange sites. Web Application Level 1) Implement Two factor authentication at login and…

Information Security Monthly Newsletter – July 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We…

Information Security Monthly Newsletter – June 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security during the last week. Each new item is very briefly summarized and includes a reference on the web…

Regular Expressions for Pentesters

What is a Regular Expressions ? Regular Expression is pattern which is used to match character combinations in a strings. Also known as regex or regexp. Programming Languages that support Regular Expressions ? Java Awk JavaScript Perl Python Php and more Benefits of using Regular…