Cyber Security

Are you aware of all type of online scams prevalent nowadays?

Are you aware of all type of online scams prevalent nowadays? – MTvScan The general rule of thumb when working on the Internet is If you feel suspicious about any email at all, do not open it, and for sure don’t open any link provided inside it. Online phishing scams have been around a while and as we turn more towards Digital Technology for almost everything. Right from social interaction to banking and shopping online, Read more…

By admin, ago
Cyber Security

Is Cybersecurity Affecting International Relations?

History says nations have always been aware of their enemies. In the era where the world is shifting towards digitisation, these outright physical attacks are also moving towards digital wars. In other words, the nations are waging wars with the third world countries; which has started entering the realm of cyber warfare. A survey predicts, one-third of the human population on this globe is accessing an active internet connection, and this number is said to Read more…

By admin, ago
Security

WHAT DO YOU KNOW ABOUT BROKEN AUTHENTICATION AND SESSION BREACH?

As we are covering OWASP top 10 vulnerabilities, broken authentication is one of it. Broken Authentication itself suggests the breach in the authentication procedure of a web application. Session management is the rule which checks for the interactions amid a web application and end-users. A web session is actually a transactional chain of HTTP commands and responses made by the client to a server. HTTP/HTTPS is the protocol to communicate between the website and the Read more…

By admin, ago
Cyber Security

What are Injection Attacks and Their Types?

Several vulnerabilities are there from which you need to stay aware of, and the list of OWASP top 10 has mentioned the most dangerous ones. We are describing each vulnerability/attack people need to be cautious of. You can get to know about XXE attacks and LFI and RFI attacks as well. Now, we are giving answers on what are injection attacks, are there types of injection attacks, and if yes what are they? People usually Read more…

By admin, ago
Security

Know How to Prevent Your Application from an XXE (XML External Entity) Attack

What is an XXE (XML External Entity) attack? Any application that parses XML input can become prey for an XXE (XML External Entity) attack. An XML parser of a weak configuration is more vulnerable to such attack because it becomes open to threats when it processes the XML input having a reference to an external entity. An XXE attack can leak some confidential data, DOS (denial of service), port scanning of the machine having a Read more…

By admin, ago