Skip to content

Tag Archives: Information-Security

Gestation period of “@” : In 1970’s, there weren’t more awareness about threats and malicious activities. cybersecurity which was formally known as computer security was gradually… Read More
Overview :Dark information is information that’s received via numerous laptop community operations however now no longer utilized in any way to derive insights or for… Read More
E-Mail service has become quite an important means of communication for organizations and the community. The use of E-Mail in business operations and different sectors… Read More
Overview :E-commerce is the evolution in technology, the buying and selling feature online not only have shown growth in the online business but also allows… Read More
In this article, let us know the major distinguishability between WAF(Web Application Firewall) and Firewall in a clean way.  Web Application Firewall(WAF) :A Web Application… Read More
Overview :A firewall is a firmware or software that is an essential part of a computer network’s security system. In simple terms, it acts as… Read More
In this article we will see  cybersecurity remedies and why it is so important. Due to the increasing number of ransomware and other cyber threats… Read More
In this article, we will understand one of the types of Cross-Site Scripting in-depth, i.e. Stored XSS. What is Stored Cross-Site Scripting? Stored Cross-Site Scripting… Read More
In this article, we will discuss one of the most seen vulnerabilities in web-based applications, which is — Reflected XSS. What is Cross-Site Scripting: Cross-Site… Read More
Introduction :DNS (Domain Name System) allows you to interact with devices on the Internet without having to remember long strings of numbers. Each computer on… Read More
Overview :Hacking is that the activity of characteristic weaknesses throughout a knowledge processing system and a network to require advantage of the security to comprehend… Read More
 Blind XSS Vulnerability Blind XSS is quite similar to stored Cross-Site Scripting attack where the input provided by the attacker is saved or stored by… Read More
In this article, we will discuss the overview of the Open Vulnerability Assessment System (Open VAS) and will also cover its working, and its features,… Read More
Overview :In popular media, the term “hacker” refers to someone who uses bugs and exploits to get into someone else’s security, or who uses his… Read More
In this article, we will be understanding one of the types of Cross-Site Scripting in-depth i.e DOM-based XSS. Let’s discuss it one by one as… Read More