Entersoft Security in collaboration with IOT Forum India and TiE Bangalore conducted IOT Hackfest on 7th November 2017 at the TiE Bangalore office. The challenge (aimed at helping startups think about security proactively) lasted 24 hours, and had […]
Author: Entersoft Team
Entersoft to conduct IoT Hackfest in Bangalore
Entersoft Security in collaboration with IOT Forum India and TIE Bangalore is conducting IOT Hackfest on 7th November 2017 at TiE Bangalore as a part of IOT Next. Details of the event below: A study by AT&T indicates […]
Vulnerability: XSS in Image Name
We have frequently come across cross-site scripting vulnerability (more about XSS) in input fields where HTML special characters are not sanitized. However, these days most developers are aware of this vulnerability and diligently filter user-supplied […]
Interview with WandX
In our interview for this month, we venture into one of the most trending topics these days and try to understand a decentralized application built on the Ethereum blockchain – WandX. A brief chat with the […]
New Attack “XSSJacking” Combines Clickjacking, Pastejacking, and Self-XSS
XSSJacking is a new web-based attack that combines three other techniques — Clickjacking, Pastejacking, and Self-XSS — to steal data from users. XSSJacking can help attackers reach sensitive information for which they would normally need a […]
New Vulnerability: IoT Devices Compromised by “Rakos”
Have you been in situations in which you find your IoT devices getting overloaded with networking and computing tasks? If the answer is yes, the chances are high that your devices are Rakos’s latest victims. What […]
Demystifying ARP Spoofing
What is ARP Poisoning or ARP Spoofing attack? ARP spoofing attack is an attack in which an attacker sends falsified ARP (Address Resolution Protocol) messages over LAN. As a result, the attacker can link his […]
Entersoft Security Pack: FinTech
Banks now work hand in hand with companies in Fintech. Banks regularly partner with Fintech startups to implement innovative technologies such as Robo advice, Chatbots, KYC and Regtech, Blockchain, Wealth Management, Artificial Intelligence, Big Data […]
IoT Attack Surface Mapping
Simply put, IoT is the interface between the physical and digital world that allows one to gather information from – and control – everyday objects. When you have a random IoT object/device – a thermostat, a […]
New Vulnerability: Raspberry Pi Malware Mines Cryptocurrency
What is Raspberry Pi? Raspberry Pi is an open source, computer hardware and software company, project, and user community that designs and manufactures single-board microcontrollers and microcontroller kits for building digital devices and interactive objects […]