It’s easy to lose track of things when so much information is shared. Data breaches, application distributed denial-of-services, security mishaps, and tips, there is so much that you might need to catch up on. That’s why we bring you the most viewed and trending security stories on topics that you care about.
This OWASP educative series on web and mobile applications breaks down vulnerabilities and simplify them to the basic level of their nature and implications with examples and illustrations. It’s the simplest way to understand how data breaches happen.
You know that it really matters when statistics show that there are more than one billion people buying online. In fact, that number is growing with internet and smartphone penetration across the globe. It has been estimated that the growth resonates across both B2B and B2C markets, opening gates for huge opportunities across sectors. But, why are so many business owners scared of hackers?
Many information security lapses happened this year. Records were lost, money was lost, higher management professionals quit, and budgets were reshuffled to improve application security. Here you will find all of it.
“Let’s assume the server to be a person. Denial of Service (DoS) is assaulting the person and not letting him communicate with anyone. Now imagine this person being assaulted and muzzled by 45, 000 people at once, that’s Distributed Denial of Service (DDoS).” And how do you avoid it?
With businesses increasingly depending on their websites amid fierce competition and highly motivated hackers, distributed denial-of-services risks are more than ever. On an average, application DDoS attack costs $5 an hour. We have more for you here.
When Frank launched the mobile app for Fishery of Randomland, it was named ‘iFish’, a project that he thought would take his business forward. Just like with any other city, people at Randomland were obsessed with smartphones. They loved the technology, its ease, and capabilities that apps provided. What went wrong?
The suspect in question is 17 years old, difficult to trace, takes subtle attack approaches, and has been single-handedly responsible for 81,158,074 attack attempts across the world. In 2013, it even topped the OWASP list of Top 10 vulnerabilities. What is it?
Founder & Chief Marketing Officer, Indusface
Venky has played multiple roles within Indusface for the past 6 years. Before this, as the CTO @ Indusface, Venky created the product/service offering and technology team from scratch and grew it from ideation to getting initial customers with a proven/validated business model poised for scale. Before joining Indusface, Venky had 10+ years of experience in the security industry and had held various mgmt/leadership roles in Product Development, Professional Services, and Sales @Entrust.