C4n u und3r574nd wh47 15 wr1773n h3r3?
(Can you understand what is written here?)
If you are a gamer or take interest in geeky topics, chances are you have seen such notations. This kind of modified spelling is no coincidence, it is known as leet (“1337”) or eleet or leetspeak and has a very interesting origin.
Continue reading “What are Leet, Leetspeak & 1337 | Geeky Facts”
Have you ever received WhatsApp messages or emails offering massive discounts on popular e-commerce platforms? If so, making the mistake of clicking on them may make you a victim of phishing attacks. But what is it and how can you identify them to protect yourself?
Continue reading “Phishing Attacks & Safety Tips | Web Security”
Consider this – whenever you think of the term “hacking” or hear about different cyber-attacks, the first image that may pop in your mind is probably a guy in a black hoodie, sitting in a dark room, typing away in his laptop. Well, that is not how it works in the real world. This is where social engineering comes into the picture. Social engineering is nothing new though, it dates back to the infamous Trojan Horse that leads to the fall of Troy, but is often overlooked due to lack of awareness.
Continue reading “Dangers of Social Engineering | Web Security”
SQL stands for Structured Query Language. To understand what SQL Injection is, it is important to understand how information on the web is stored. A database is used to store data such that it is easy to access and manage data efficiently. There are two kinds of databases – Relational and Non-Relational. Relational database stores data in the form of rows and columns while non-relational database store data mainly in four fashions – Key-value, Graph, Column, and Document.
Continue reading “SQL Injection & Prevention | Web Security”
XSS, an acronym derived from Cross ‘X’ Site Scripting, refers to the injection of malicious scripts into a legitimate website or web application. It is similar to other web attacks such as SQL injection, however, it is more devastating since an XSS attack does not target the application concerned rather it puts the users of the application at risk.
Continue reading “XSS Attacks (Cross-Site Scripting) | Web Security”