Entersoft Security Blog

What Happened at the IoT Hackfest

Posted by Angad Gill on Nov 27, 2017 9:52:26 PM

 

Entersoft Security in collaboration with IOT Forum India and TiE Bangalore conducted IOT Hackfest on 7th November 2017 at the TiE Bangalore office.

Read More

Topics: Events, IOT Security, cyber security, Security Guidelines

Entersoft to conduct IoT Hackfest in Bangalore

Posted by Mohan Gandhi on Nov 6, 2017 9:08:41 PM
Entersoft Security in collaboration with IOT Forum India and TIE Bangalore is conducting IOT Hackfest on 7th November 2017 at TiE Bangalore as a part of IOT Next

 

Read More

Topics: IOT Security, Hacks and news, Events

Vulnerability: XSS in Image Name

Posted by Entersoft Team on Oct 25, 2017 9:54:32 PM
We have frequently come across cross-site scripting vulnerability ( more about XSS ) in input fields where HTML special characters are not sanitized. However, these days most developers are aware of this vulnerability and diligently filter user-supplied inputs in forms and URLs.
Read More

Topics: Application Security, vulnerability, XSS, Cross site scripting

Interview with WandX

Posted by Angad Gill on Oct 24, 2017 2:48:07 AM

In our interview for this month, we venture into one of the most trending topics these days  and try to understand a decentralized application built on the Ethereum blockchain - WandX. A brief chat with the CEO, Abhinav Ramesh to discuss cryptocurrency based assets, FinTech in India, ICO hacks and P2P trading. 

Read More

Topics: bitcoin, ethereum, blockchain, cryptocurrency, cryptoassets, P2P, FinTech Security

Race Condition Vulnerabilities in Web Applications

Posted by Entersoft Team on Sep 15, 2017 8:14:29 PM

Race conditions in software arise when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results; depending on the time at which the code is executed. For example, a multi-threaded program may spawn 2 threads that have access to the same location in memory.

Read More

Topics: Application Security, cyber security, Application Security Guidelines

Demystifying ARP Spoofing

Posted by Entersoft Team on Sep 11, 2017 10:14:18 PM

 

 What is ARP Poisoning or ARP Spoofing attack?

ARP spoofing attack is an attack in which an attacker sends falsified ARP (Address Resolution Protocol) messages over LAN. As a result, the attacker can link his MAC address with the IP address of a legitimate computer (or server) on the network.

Read More

Topics: cyber attack, cyber security, Application Security

New Attack "XSSJacking" Combines Clickjacking, Pastejacking, and Self-XSS

Posted by Entersoft Team on Aug 22, 2017 10:39:05 PM
Read More

Topics: cyber attack, cyber security, Application Security

New Vulnerability: IoT Devices Compromised by "Rakos"

Posted by Entersoft Team on Aug 8, 2017 10:41:03 PM
Have you been in situations in which you find your IoT devices getting overloaded with networking and computing tasks? If the answer is yes, the chances are high that your devices are Rakos’s latest victims.
Read More

Topics: Application Security, IOT Security, cyber attack, cyber security

Entersoft Security Pack: FinTech

Posted by Mohan Gandhi on Jul 25, 2017 5:39:07 PM
 
Banks now work hand in hand with companies in Fintech. Banks regularly partner with Fintech startups to implement innovative technologies such as Robo advice, Chatbots, KYC and Regtech, Blockchain, Wealth Management, Artificial Intelligence, Big Data and so on.
 
Read More

Topics: FinTech Security, Fintech Security standards, Application Security, cyber security

IoT Attack Surface Mapping

Posted by Entersoft Team on Jul 17, 2017 5:24:09 PM
Read More

Topics: IOT Security, Internet of things, Android App Security, cyber security, Application Security