Do We Need New Rules To Set Passwords?

This guest article has been contributed by Anjali Rani. “Password must contain one uppercase letter”“Password must contain one numeric character”“Password must contain one special character” If you are a user of internet services like net banking, e-commerce or social media, you must be familiar with the statements above. These set of rules are meant to […]

Dangers of Social Engineering

When you think of the term “hacking” or hear about different cyber-attacks, the first image that may pop in your mind is probably a guy in a black hoodie, sitting in a dark room, typing away in his laptop. Well, that is not how it works in the real world. This is where social engineering […]

SQL Injection

SQL stands for Structured Query Language. To understand what SQL is, it is important to understand how information on the web is stored. A database is used to store data such that it is easy to access and manage data efficiently. There are two kinds of databases – Relational and Non-Relational. Relational database stores data […]

Cross-Site Scripting (XSS) Attack

XSS stands for Cross-Site Scripting. XSS attack refers to the injection of malicious scripts into a legitimate website or web application. It is similar to other web attacks such as SQL injection (Check out our article on SQL Injection), however it is more devastating since an XSS attack does not target the application concerned rather […]