Blog

My Blogs

Disney Plus accounts hacked within hours of its awaited launch

  Disney Plus accounts hacked within hours of its awaited launch January 1, 2020   With the recent launch of Disney Plus, attackers wasted no time with hacking into thousands of user accounts. The video-on-demand streaming service was first announced in April 2019. It launched in three countries – the US, Canada, and the Netherlands, on …

Disney Plus accounts hacked within hours of its awaited launch Read More »

DDoS trends to watch for in 2020

  DDoS trends to watch for in 2020 January 1, 2020   Multi-vector DDoS attacks are once again on the rise after a long period of decline. The attacks rose 30% in Q3 2019 when compared to its previous quarter. Whenever multiple systems intentionally flood a targeted system or server with illegitimate traffic, it is recognized as …

DDoS trends to watch for in 2020 Read More »

Android Security Bulletin Dec 2019

  Android Security Bulletin Dec 2019: Critical flaws in Android OS January 1, 2020   Google has recently released its December edition of Android Security Bulletin. In this edition, Google revealed its findings – the presence of vulnerabilities in the Android operating system. The bulletin highlights three system vulnerabilities with a critical rating. While one of …

Android Security Bulletin Dec 2019 Read More »

HIPAA: All that you should know

  HIPAA: All that you should know January 1, 2020 The Health Insurance Portability and Accountability Act (HIPAA) regularizes standards for sensitive data protection of patients. The healthcare organizations dealing with PHI – Protected Health Information must comply with HIPAA for their physical, internal processes, and network security measures. Organizations providing services like payment, treatment, …

HIPAA: All that you should know Read More »

Programmers thinking like hackers:Is this the new norm for AppSec

  Programmers thinking like hackers:Is this the new norm for AppSec January 7, 2020|Secure Applications Programming is a five-step task. It involves identification and defining the problem, planning a solution, coding, testing, and documenting the report. Every programmer must go through these steps and analyze security standards. A code written for a specific problem should …

Programmers thinking like hackers:Is this the new norm for AppSec Read More »