by Julio Del Cid | Apr 11, 2019 | Cybersecurity
Incorrect security configuration Security is essential for any web-based application and an incorrect security configuration may cause loss of confidential data. In web application security, there are some important components involved such as application servers,...
by Julio Del Cid | Apr 11, 2019 | Application layer threats and solutions
Unprotected sensitive data at rest Many IOS application can be involved in storing and unveiling intimate data. Some of these applications handle sensitive information, for instance, personal credentials or financial information and most of these applications use the...
by Julio Del Cid | Apr 11, 2019 | Application layer threats and solutions
AWOL (Android Wake On LAN) Androids In android smart devices, the percentage of losing data is higher than any other smart devices and most of the people are not able to restore their intimate data. Solution There are some solutions to save the informative...
by Julio Del Cid | Apr 11, 2019 | Security Threats and Network attacks
Browser Exploit Against SSL/TLS (BEAST) The BEAST attack can easily compromise block cipher due to reason that using older versions of Secure Socket Layer protocol or Transport Layer Security protocol. Hackers can target intimate information by using a...
by Julio Del Cid | Apr 11, 2019 | Security Threats and Network attacks
The SSL certificate vulnerabilities could be caused by certificate name mismatch, internal names, and missing fields of the certificate. The detailed introduction of each is as follows: Certificate name mismatch The SSL certificate vulnerabilities could be...