Anaytics, Application Security, Automation Testing
Kibana Tool Kibana is a dashboarding tool that works veritably nearly with Elasticsearch. Kibana is used for various use cases, like system monitoring & application observations. In a traditional monitoring system, we will monitor system performance, application logs, and so on. Kibana core ships with the classics: histograms, line graphs, pie charts, sunbursts, and more. […]
Application Security, Technology, Testing
A company that handles the transactions between two parties (i.e. merchant and customer) is called payment processor. The payment is accomplished by passing on the payment information, like a credit card/debit card, from the customer to the merchant’s preferred bank account. There are several payment processing companies functioning in India like; PayPal, CC Avenue, and […]
Application Security, Technology
Do you think your web application is sheltered and safe? Think again! 2016 was a year which saw a portion of the most exceedingly awful digital assaults whether it be the 32 lakh Indian bank debit/credit cards data traded off or Mark Zuckerberg himself getting his Twitter and Pinterest accounts hacked. Cyber Attacks are continuously […]
Application Security, Technology
Ransomware is malicious software that blocks access to data until the ransom is paid. An advanced type of ransomware encrypts the files on the system. Since it restricts the user from accessing their records, it can be termed as Denial Of Service attack. To get back the access to files or to get the data decrypted, […]
Application Security, Technology
Being in the middle of the second quarter of 2017, we can already find a number of reports regarding web attacks, also known as cyber-attacks or cyber threats. Due to a constant rate of increase of reports regarding web attacks, it is essential for people all over the world to be aware of the imminent […]
Application Security, Product Engineering, Software development
Have you witnessed a scenario where a trusted site gets injected with a malicious script attack? Well, commonly people refer this as a “‘Cross Site Scripting’ attack. The XSS scripts injected into a site can leak out sensitive data and information including cookies, session tokens, and auth tokens. The vulnerability of the XSS attack is […]
Recently, cyber attacks have been on a rise, and it appears that every other day due to these attacks, businesses are being held to pay ransom to protect themselves or go out of business. There are businesses who have shut shop and then there are businesses which have paid ransom to secure themselves, however that doesn’t […]
Application Security, Grails, Technology
Some applications require to store and show last login of the user which is quite common. With this feature a user can verify the last login date and time upon successful login. I would like to explain this through a use case – One of the administrative application on Grails required to hold last login […]
Application Security, Technology
This blog discusses the utility and benefits of using a Host-based Intrusion Detection System (HIDS) tool: OSSEC in your environment. A host-based intrusion detection system provides real-time visibility into what activities are taking place on the servers, which adds to the additional security. There are various tools available in the market for this purpose: IBM […]