Entersoft Security Blog

Hacked and Secured! - The Hong Kong FinTech HackFest

Posted by Angad Gill on Jun 13, 2018 10:04:37 PM

Cyber security in FinTech is a growing concern, with no markets more directly impacted by its rise than banks, payments and Blockchain. Data from banks and other financial organisations is a premium target for hackers, offering clear incentives for their malicious attacks.

With this in mind, we launched the FinTech Hackfest - an event that saw white hat hackers from Entersoft, PwC and others, make Hong Kong Fintech products secure within 24 hours.

Read More

Topics: vulnerability, Security in Fintech, Hong Kong, Hacks and news, FinTech Security, cybersecurity, Application Security

Implementing Security in IoT

Posted by Entersoft Team on Nov 29, 2017 9:44:36 PM

 

The Internet of Things continues to connect an ever-increasing number of devices. We're heading towards a seamlessly connected world that will have 24 billion IoT devices by 2020. Connected devices are making headway into each and every aspect of our lives, including homes, offices, cars and even cities.

Read More

Topics: IOT Security, cyber security, Application Security, Application Security Guidelines

Vulnerability: XSS in Image Name

Posted by Entersoft Team on Oct 25, 2017 9:54:32 PM
We have frequently come across cross-site scripting vulnerability ( more about XSS ) in input fields where HTML special characters are not sanitized. However, these days most developers are aware of this vulnerability and diligently filter user-supplied inputs in forms and URLs.
Read More

Topics: Application Security, vulnerability, XSS, Cross site scripting

Race Condition Vulnerabilities in Web Applications

Posted by Entersoft Team on Sep 15, 2017 8:14:29 PM

Race conditions in software arise when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results; depending on the time at which the code is executed. For example, a multi-threaded program may spawn 2 threads that have access to the same location in memory.

Read More

Topics: Application Security, cyber security, Application Security Guidelines

Demystifying ARP Spoofing

Posted by Entersoft Team on Sep 11, 2017 10:14:18 PM

 

 What is ARP Poisoning or ARP Spoofing attack?

ARP spoofing attack is an attack in which an attacker sends falsified ARP (Address Resolution Protocol) messages over LAN. As a result, the attacker can link his MAC address with the IP address of a legitimate computer (or server) on the network.

Read More

Topics: cyber attack, cyber security, Application Security

New Attack "XSSJacking" Combines Clickjacking, Pastejacking, and Self-XSS

Posted by Entersoft Team on Aug 22, 2017 10:39:05 PM
Read More

Topics: cyber attack, cyber security, Application Security

New Vulnerability: IoT Devices Compromised by "Rakos"

Posted by Entersoft Team on Aug 8, 2017 10:41:03 PM
Have you been in situations in which you find your IoT devices getting overloaded with networking and computing tasks? If the answer is yes, the chances are high that your devices are Rakos’s latest victims.
Read More

Topics: Application Security, IOT Security, cyber attack, cyber security

Entersoft Security Pack: FinTech

Posted by Mohan Gandhi on Jul 25, 2017 5:39:07 PM
 
Banks now work hand in hand with companies in Fintech. Banks regularly partner with Fintech startups to implement innovative technologies such as Robo advice, Chatbots, KYC and Regtech, Blockchain, Wealth Management, Artificial Intelligence, Big Data and so on.
 
Read More

Topics: FinTech Security, Fintech Security standards, Application Security, cyber security

IoT Attack Surface Mapping

Posted by Entersoft Team on Jul 17, 2017 5:24:09 PM
Read More

Topics: IOT Security, Internet of things, Android App Security, cyber security, Application Security

New Vulnerability: Raspberry Pi Malware Mines Cryptocurrency

Posted by Entersoft Team on Jul 4, 2017 10:19:51 PM

What is Raspberry Pi?

Read More

Topics: Application Security, Hacks and news, cyber security