Have you ever received WhatsApp messages or emails offering massive discounts on popular e-commerce platforms? If so, making the mistake of clicking on them may make you a victim of phishing attacks. But what is it and how can you identify them to protect yourself?Continue reading “Phishing Attacks & Safety Tips | Web Security”
Talk about instant messengers and the first app that comes to our mind is WhatsApp. It’s no surprise though with WhatsApp’s immense popularity. In this article, we discuss why Telegram X, with over 10,000,000 installs on the Google Play Store is gaining popularity and why you should switch to it.
There you are on a Sunday afternoon, chopping trees punching sheep and building mud huts, a few hours later you’ve been condemned to death by hunger games or something. Oh, the things we do for entertainment. If only the Romans with their bloody murder arenas could have seen us now. Perhaps they would have realized that maybe it would have been more beneficial to maintain a sustainable population of able-bodied men for that encroaching barbarian horde. If only they had picked up a game console instead of crazy uncle Frank’s issue of mutilation monthly when they were still young and impressionable.
This article has been contributed by Aditya BhadraContinue reading “Games are Weird”
Consider this – whenever you think of the term “hacking” or hear about different cyber-attacks, the first image that may pop in your mind is probably a guy in a black hoodie, sitting in a dark room, typing away in his laptop. Well, that is not how it works in the real world. This is where social engineering comes into the picture. Social engineering is nothing new though, it dates back to the infamous Trojan Horse that leads to the fall of Troy, but is often overlooked due to lack of awareness.Continue reading “Dangers of Social Engineering | Web Security”
SQL stands for Structured Query Language. To understand what SQL Injection is, it is important to understand how information on the web is stored. A database is used to store data such that it is easy to access and manage data efficiently. There are two kinds of databases – Relational and Non-Relational. Relational database stores data in the form of rows and columns while non-relational database store data mainly in four fashions – Key-value, Graph, Column, and Document.Continue reading “SQL Injection & Prevention | Web Security”
XSS, an acronym derived from Cross ‘X’ Site Scripting, refers to the injection of malicious scripts into a legitimate website or web application. It is similar to other web attacks such as SQL injection, however, it is more devastating since an XSS attack does not target the application concerned rather it puts the users of the application at risk.Continue reading “XSS Attacks (Cross-Site Scripting) | Web Security”