IMPINJ is an organization which connects billions of everyday items such as apparel, medical supplies and automobile parts to consumer and business applications such as inventory management, patient safety, and assets tracking. The impinj platform uses RFID to deliver timely information about these items to…
Author: isecurion

Information Security Monthly Newsletter-May 2018
The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security during the last week. Each new item is very briefly summarized and includes a reference on the web…
Invoice Plane V 1.5 Cross Site Scripting Vulnerability-CVE-2017-18217
ISECURION is actively involved to secure the open source applications, and dedicating our time, talent and resources for the greater good, it was never a severity or name based hunt for us, we involve in security testing of all type platforms in information security such…

Case Study – Penetration Testing Crypto Currency Exchange
Recently we have performed a pentest for a crypto currency exchange site and below are the complete case study of the engagement. Case Study – Penetration Testing Crypto Currency Exchange Introduction: This case study of a start-up company in India who have started Crypto currency exchange…

Security Controls Requirements for Aadhaar API providers
With the commencement of Aadhaar project of UIDAI to round up all the citizen of India from centralized data repository of large user database to provide a unique identification of the Indian residents. today i am writing this blog for Aadhaar based authentication service providers…

Wannacry Ransomware Prevention Methods for End Users & System Administrators
Wannacry Ransomware Prevention techniques for End Users & System & Security Administrators. Name of the Virus/Worm/Ransomware: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY Infected windows versions: xp, vista, windows 2000, windows 2007, windows 8 What it is: Wannacry Ransomware is systems appear to be a worm that…
IOT Communication Protocols
Today we are going to discuss on types of communication protocols used in IOT devices and also its security aspects. What is the internet of things..? Internet of Things is nothing but the device which is connected with internet and sharing or receiving the data…
Legal and Technical perspective towards Cryptocurrency in India-Bitcoin
Today we are going to discuss about the Legal and technical perspective towards Cryptocurrency Bitcoin in Indian Scenario, Bitcoin has always been a gray topic for Government agencies and Investors so here we will discuss about the present scenario and realm after demonetization and impacts…
SCADA 360° Threat Landscape
Industrial Control System, Supervisory Control and Data Acquisition ICS-SCADA are an important element of the Critical Infrastructure in oil, gas refineries, waste water treatment plant, nuclear factories. With the “Stuxnet” it is proven that cyber criminals, Nation State actors can create a war like scenario…
NESA-UAE IA Standards: The framework driving UAE’s Information Security
In the history of Information Security the most refined working framework for standardizing the evaluation of security was published in the 80’s in US by the name “Trusted Computer System Evaluation Criteria” aka the ”Orange Book”. Since then several information Security standards like IS027001, COBIT,…