![](https://sp-ao.shortpixel.ai/client/to_webp,q_glossy,ret_img,w_720,h_480/https://blog.entersoftsecurity.com/wp-content/uploads/2019/10/Hacks-720x480.png)
When it comes to cybersecurity, 2018 has not been a great year so far with the whole Facebook fiasco and numerous compromised ICOs. There are bigger hacks that generate noise and get a lot of […]
When it comes to cybersecurity, 2018 has not been a great year so far with the whole Facebook fiasco and numerous compromised ICOs. There are bigger hacks that generate noise and get a lot of […]
Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause […]
ICO attacks are new normal in 2018. On an average 10 ICOs get hacked every month. Successful ICOs are all about correct execution. Most founders do not factor in the required cyber security practices to launch tokens […]
The Internet of Things continues to connect an ever-increasing number of devices. We’re heading towards a seamlessly connected world that will have 24 billion IoT devices by 2020. Security in IoT Connected devices are making […]
Entersoft Security in collaboration with IOT Forum India and TiE Bangalore conducted IOT Hackfest on 7th November 2017 at the TiE Bangalore office. The challenge (aimed at helping startups think about security proactively) lasted 24 hours, and had […]
Entersoft Security in collaboration with IOT Forum India and TIE Bangalore is conducting IOT Hackfest on 7th November 2017 at TiE Bangalore as a part of IOT Next. Details of the event below: A study by AT&T indicates […]
We have frequently come across cross-site scripting vulnerability (more about XSS) in input fields where HTML special characters are not sanitized. However, these days most developers are aware of this vulnerability and diligently filter user-supplied […]
In our interview for this month, we venture into one of the most trending topics these days and try to understand a decentralized application built on the Ethereum blockchain – WandX. A brief chat with the […]
XSSJacking is a new web-based attack that combines three other techniques — Clickjacking, Pastejacking, and Self-XSS — to steal data from users. XSSJacking can help attackers reach sensitive information for which they would normally need a […]
Have you been in situations in which you find your IoT devices getting overloaded with networking and computing tasks? If the answer is yes, the chances are high that your devices are Rakos’s latest victims. What […]