Internet Safety RecommendationsWhen you use the internet, you may be connected to thousands of other computers that you exchange information and data with, including…Oct 19, 2022Oct 19, 2022
IoT SecurityTo build a “smart home,” more and more of our household appliances, such as thermostats, coffee makers, outdoor lighting, door locks, and…Oct 17, 2022Oct 17, 2022
Cyber Security Awareness MonthStop phishing: Make a cybercriminal’s day miserable!Oct 13, 2022Oct 13, 2022
Securing IT Assets in Manufacturing IndustryManufacturing Industries poses a significant security risk. Endpoint security, firewalls, and corporate security rules are already in…Jun 1, 2022Jun 1, 2022
Cybersecurity Cockpit — A Pilot ViewYou might have seen a cockpit either in the real world or in the movies which offers visibility to the front and sides and also houses the…May 18, 2022May 18, 2022
Path Traversal or Remote Code Execution in Apache 2.4.49 and 2.4.50This document aims at explaining some recent vulnerabilities in Apache HTTP Server that lead to attacks like Path Traversal and Remote Code…Mar 22, 2022Mar 22, 2022
Log4j VulnerabilityOn December 9th, 2021, the world was made aware of the single, biggest, most critical vulnerability as CVE-2021–44228, affecting the java…Mar 17, 20221Mar 17, 20221
Build Your Own Captcha With PHPIn this you will learn how to build your own CAPTCHA Script with PHP to use in your project.May 25, 2021May 25, 2021