by Julio Del Cid | Sep 18, 2018 | Application layer threats and solutions
SSL certificate vulnerabilities Certificate name mismatch The SSL certificate mismatch means that the domain name of the website does not match the domain name which has been mentioned in the SSL certificate. It is essential that website domain name must match with...
by Julio Del Cid | Sep 11, 2018 | Cross-Site Scripting Attack, Cybersecurity, Denial-of-Service Attacks, Malware Attack, Man-in-the-Middle (MITM) Attack, Phishing Attack, SQL Injection
When cybercriminals or attackers flood the traffic on the server and not giving time to respond to the request, it is called Denial-of-Service attack. In this attack, it is hard to manage the servers because sometimes an attack can be done by number of systems at the...
by Julio Del Cid | Sep 11, 2018 | Cross-Site Scripting Attack, Cybersecurity, Malware Attack, Man-in-the-Middle (MITM) Attack, Phishing Attack, SQL Injection
Malware is software which is designed to target the intimate information such as credentials, payment details and so on. Any business, person and government can be affected by malware attacks. Ransomeware is an example of malware software which tries to encrypt all...
by Julio Del Cid | Sep 11, 2018 | Cross-Site Scripting Attack, Cybersecurity, Man-in-the-Middle (MITM) Attack, Phishing Attack, SQL Injection
Man-in-the-middle is a type of cybersecurity attack in which a bogus or malicious person slides into a conversation between two parties without knowing them. The attacker will pretend as sender and receiver for both the parties and gets the access to the confidential...
by Julio Del Cid | Sep 11, 2018 | App development, Cross-Site Scripting Attack, Cybersecurity, Phishing Attack, SQL Injection
Cross-Site Scripting is similar like SQL injection where an attacker finds the vulnerable website to target the confidential data like user login details, credentials or financial information. On the other hand, in Cross-Site Scripting, the attacker will attack the...