Hardware Security Module (HSM) security testing checklist
One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use […]
One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use […]
Introduction When an attacker compromises an end-point system in an organization, he needs some sort of confirmation that: his code […]
This write-up summarizes a workshop/humla conducted by Ashfaq Ansari on the basics of various kinds of attacks available for exploiting […]
Introduction A thick client is a computer application runs as an executable on the client’s system and connects to an […]
Introduction Is your server protected against port scanning? The general answer will be “Yes, I have a firewall which restricts […]
The Meaning XE which stands for XML Entity is a standard for representing sets of data. Meanwhile, Entities are more […]
During a recent engagement, we were asked to test the security level of an application white-listing solution deployed on the […]