sameersingh1526

sameersingh1526

Member since Aug 18, 2017
Articles: 16
Location: n/a
Followers
sameersingh1526 don't have any followers yet
Sponsor
Latest
0
checked

submitted 1 week ago, Monday, September 11, 2017, 23:12:23 by sameersingh1526 in Computers

ARP spoofing attack is an attack in which an attacker sends falsified ARP (Address Resolution Protocol) messages over LAN.

rated 0 times  0  0 - comments: 0 - hits: 15 - blog.entersoftsecurity.com

Demystifying ARP Spoofing
0
checked

submitted 4 weeks ago, Wednesday, August 23, 2017, 22:49:02 by sameersingh1526 in Computers

XSSJacking is a new web-based attack that combines three other techniques — Clickjacking, Pastejacking, and Self-XSS — to steal data from users.

rated 0 times  0  0 - comments: 0 - hits: 34 - blog.entersoftsecurity.com

New Attack
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:40:30 by sameersingh1526 in Computers

29 Stats, Quotes, Factlets - Cybersecurity Market in India, A push towards digital economy (otherwise known as demonetization) by the Indian government is changing the way businesses and governments are run in the...

rated 0 times  0  0 - comments: 0 - hits: 38 - blog.entersoftsecurity.com

29 Stats, Quotes, Factlets - Cybersecurity Market in India
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:38:19 by sameersingh1526 in Computers

OWASP has merged 2013-A4: Insecure Direct Object References and 2013-A7: Missing Function Level Access Control back into 2017- A4: Broken Access Control.

rated 0 times  0  0 - comments: 0 - hits: 44 - blog.entersoftsecurity.com

OWASP 2013 Vs. OWASP 2017
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:36:05 by sameersingh1526 in Computers

It is natural behaviour for most attackers targeting an application to perform extensive research about the application, its services and categories of users accessing the application. The research usually starts with...

rated 0 times  0  0 - comments: 0 - hits: 38 - blog.entersoftsecurity.com

Entersoft Vulnerability Overview: Insufficient Attack Protection
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:34:15 by sameersingh1526 in Computers

It is a piece of code/software which infects any computer with user intervention and encrypts all the system information.

rated 0 times  0  0 - comments: 0 - hits: 39 - blog.entersoftsecurity.com

Petya Ransomeware: An Overview
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:31:32 by sameersingh1526 in Computers

A new malware called Linux.MulDrop.14 is targeting Raspberry Pi computers. In a separate posting, the site examines two different Pi-based trojans including Linux.MulDrop.14.

rated 0 times  0  0 - comments: 0 - hits: 38 - blog.entersoftsecurity.com

New Vulnerability: Raspberry Pi Malware Mines Cryptocurrency
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:29:19 by sameersingh1526 in Computers

IoT is definitely not limited to just the security of the device. It is a common misconception. IoT has an elaborate range of applications facing the device.

rated 0 times  0  0 - comments: 0 - hits: 37 - blog.entersoftsecurity.com

IoT Attack Surface Mapping
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:26:42 by sameersingh1526 in Computers

Banks partner with Fintech startups to implement technologies such as Robo advice, Chatbots, KYC and Regtech, Blockchain, Artificial Intelligence, Big Data.

rated 0 times  0  0 - comments: 0 - hits: 37 - blog.entersoftsecurity.com

Entersoft Security Pack: FinTech
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:23:34 by sameersingh1526 in Computers

Rakos is a Linux Malware written in Go language that targets both consumer devices and servers.

rated 0 times  0  0 - comments: 0 - hits: 38 - blog.entersoftsecurity.com

New Vulnerability: IoT Devices Compromised by
0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:19:05 by sameersingh1526 in Computers

As the number of IoT devices that are connected in the realm of cyber space exceeds the global population in 2017, consumers and vulnerabilities in Internet of Things are spread across different verticals.

rated 0 times  0  0 - comments: 0 - hits: 66 - entersoftsecurity.com

0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:17:19 by sameersingh1526 in Computers

FinTech Security is our Forte. Entersoft is an award winning app security company in FinTech space. 20+ fintech companies trust us for their app security needs

rated 0 times  0  0 - comments: 0 - hits: 38 - entersoftsecurity.com

0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:13:56 by sameersingh1526 in Computers

Code review is probably the single-most effective technique for identifying security flaws. When used together with automated tools and manual penetration testing, code review can significantly increase the cost...

rated 0 times  0  0 - comments: 0 - hits: 35 - entersoftsecurity.com

0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:11:47 by sameersingh1526 in Computers

Cloud penetration testing | Our certified white hat hacker team can test any cloud platform. Whether you have a Public Cloud, Private cloud, Hybrid cloud it doesn't matter to us. We perform AWS Penetration testing,...

rated 0 times  0  0 - comments: 0 - hits: 35 - entersoftsecurity.com

0
checked

submitted 1 month ago, Friday, August 18, 2017, 04:07:51 by sameersingh1526 in Computers

Mobile application security testing that you can trust! App security testing that is beyond penetration testing. Award winning android and iOS app penetration testing solution. We start with Threat modeling for your...

rated 0 times  0  0 - comments: 0 - hits: 40 - entersoftsecurity.com

1
checked

submitted 1 month ago, Friday, August 18, 2017, 03:54:58 by sameersingh1526 in Computers

Web application security testing that you can trust! Web application security simplified. Entersoft provides reliable and pragmatic security assessments for your web apps. Best VAPT for your website.

rated 1 times  1  0 - comments: 0 - hits: 35 - entersoftsecurity.com