As the name indicates, Security comes in between the Dev and Operations. The security is aligned with the entire process to reduce the risk in the initial phase of the Dev cycle. DevSecOps involves creating a 'Security as Code' culture with ongoing, flexible collaboration between release engineers and security teams.
A buffer overflow takes place when more data is put into a fixed-length buffer than the buffer can handle. The extra information, which has to go somewhere, can overflow into adjacent memory space, corrupting or overwriting the data held in that space.
Kamal Kishore Seepana, currently working as Manager- Information Security in Sony India Software centre comes with 10+ years of rich experience. He has excelled himself in various fields of InfoSec ranging from Governance, IT/IS Risk Management, Compliance, ISMS Implementation, ITGC audits, DLP implementation, Vulnerability assessment, Penetration Testing, System architecture design and review.
Two-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.
A cookie is a small piece of data that a server sends to the user's web browser. The browser may store it and send it back with the next request to the same server. Cookies let us get around the statelessness of the HTTP protocol by storing data at the client-side. Usually the cookies are set using Set-cookie in the HTTP header.
A Penetration testing tool built using Machine Learning concept.The notable feature is the tool has the self-learning capability with very less time as it has adopted the advanced machine learning model called A3C.
Social engineering strikes again and this time its via QR code.QRLjacking or Quick Response Code Login
jacking is a simple social engineering attack vector capable of session hijacking affecting all the applications
that rely on "Login with QR code" feature as a secure way to login into accounts.
Biohacking is managing own biology with medical, nutritional and electronic techniques which can include
use of smart drugs(nootropics), non-toxic substances and different cybernetic devices. This can be any
form like experimenting with DNA or injecting new stuff in body (like microchip, camera, NFC, etc.).
People who experiment on their own body called themselves biohacker and are also known as Grinder.
The invention of the blockchain for bitcoin made it the first digital currency to solve the double spending
problem without the need of a trusted authority or central server. The bitcoin design has been the inspiration
for other applications.