This Vulnerability in phpMyAdmin Lets An Attacker Perform DROP TABLE With A Single Click!
Most of you are familiar about Cross Site Request Forgery (CSRF) vulnerability, it is one of the most common vulnerabilities;…
Most of you are familiar about Cross Site Request Forgery (CSRF) vulnerability, it is one of the most common vulnerabilities;…
Firewall is software / hardware which blocks/ allows network traffic based on pre defined rules. A firewall is helpful to…
remove website data from chrome
I was scrolling through Twitter and I thought I should be spending more time on testing thick clients. I decided…
It’s normal now to hear stories about data breaches. Some of them involve publicly exposed Databases, S3 buckets etc. The…
Privacy matters to most of us! That applies for crypto world too. Bitcoin transactions don’t directly link to a person,…
I am not sure if this issue persists in new versions of Sony Bravia, but in older versions of Sony…
More than 99 Countries, Thousands of companies and networks have been hit by a ransomware known as WannaCry. It is one of the…
We live in an era, where cyber security is a momentous issue. Cyber crimes are becoming the new normal nowadays.so…
Hello, friends! Greetings for the day. As we have been talking about pushing up digital security in our previous articles how…