Entersoft hosted the Brisbane Hackfest earlier this month, as a practical, ethical hacking event to test digital assets of participating companies for vulnerabilities and fix them immediately with the help of our expert cybersecurity team. The 2-day program was organised in collaboration with AustCyber, Advance QLD and OCQE at The Precinct, Brisbane, Queensland.
Segasec and Entersoft to strengthen their partnership in India
Tel Aviv, February 13, 2019 – India is among the top four nations targeted by phishing attacks according to a recent research. Consequently, the Reserve Bank of India (RBI) lately regulated that all Indian banks need to have in place a robust cybersecurity framework. This should include a Cyber Crisis Management Plan (CCMP) that addresses early detection, fast response, recovery and containment including protection against customer facing phishing attacks.
Cyber security in FinTech is a growing concern, with no markets more directly impacted by its rise than banks, payments and Blockchain. Data from banks and other financial organisations is a premium target for hackers, offering clear incentives for their malicious attacks.
With this in mind, we launched the FinTech Hackfest - an event that saw white hat hackers from Entersoft, PwC and others, make Hong Kong Fintech products secure within 24 hours.
The Internet of Things continues to connect an ever-increasing number of devices. We're heading towards a seamlessly connected world that will have 24 billion IoT devices by 2020. Connected devices are making headway into each and every aspect of our lives, including homes, offices, cars and even cities.
Race conditions in software arise when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results; depending on the time at which the code is executed. For example, a multi-threaded program may spawn 2 threads that have access to the same location in memory.
What is ARP Poisoning or ARP Spoofing attack?
ARP spoofing attack is an attack in which an attacker sends falsified ARP (Address Resolution Protocol) messages over LAN. As a result, the attacker can link his MAC address with the IP address of a legitimate computer (or server) on the network.