Posts By Bhagyeshwari Chauhan

2017 has been the year of cyber attacks. From the infamous Petya ransomware attack, the havoc wreaking WannaCry attack and the Magecart payment stealing scam, the number of data breaches and information theft is escalating more than before. On one hand, while companies and financial institutions are worse at keeping sensitive information safe, hackers are developing unprecedented techniques to conduct…

When it comes to empowering retailers and brands, Magento is one of the most widely used e-commerce platforms. However, with great power comes greater responsibility of adhering to security practices for safe e-commerce businesses. On the contrary, Magento is one of the highest targeted e-commerce platforms for credit card fraud and user credential theft, with a staggering 62% of stores…

3 Most Common Vulnerabilities found in Joomla

Award winning CMS Joomla is a popular choice for many businesses. Owing to its large user base, this CMS regularly encounters a wide-range of security related issues. In this article, we discuss 3 of the most common vulnerabilities encountered in various Joomla versions in the  past. 1. SQL Injection Vulnerability Recently, Joomla 3.7 became victim to an SQL Injection Vulnerability: CVE-2017-8917. Easily…

Third in line for the world's most popular Content Management System after juggernaut Wordpress and Joomla, Drupal is a sought after CMS powering websites including MTV, Popular Science, Sony Music, Harvard and MIT. Like every other CMS, Drupal has been at the center of notoriety a few times due to impending vulnerabilities in it. Listed below are the 5 most critical…

4-times-hack-sshut-companies-getastra.com

The recent outbreak of the WannaCry ransomeware and the havoc it created globally is a grim reminder of the susceptible state of our online security systems. Such events have shown that no-one is immune to cyber crimes -  not large corporations, small businesses, startups, government agencies or even your most benign looking single user. According to IBM, 62% of all cyber-attacks…

In an age when we are constantly developing innovative solutions to brace against sophisticated cyber attacks, we often underestimate the havoc that can be unleashed by the benign-looking, more elementary attack forms. They may not make big headlines as the high-profile cyber attacks, but they can be disastrous as well. Local File Execution (LFI) and Remote File Execution (RFI) are similar…

As another grim reminder of the susceptible state of our cyber security systems, a massive ransomware has struck computers worldwide. What started as an attack on the servers of Russia's biggest oil company and disrupting of operations at Ukrainian banks, the Petya Ransomware has now also spread to computers in Romania, the Netherlands, Norway, France, Spain, Britain, and Australia. The most…

A variety of web applications employs database systems for the provision of backend functionality. A widely used language used to query, operate, and administer database systems is Structured Query Language (SQL). Owing to its rampant use in web applications globally, SQL-powered databases are easy and frequent targets for cyber-criminal acts, the severity of which depends solely on the intricacies of…

Clickjacking - All You Need to Know

Often stated as one of the most overlooked of all web vulnerabilities, clickjacking aka UI redress attack refers to a type of attack that tricks users into unwarily clicking on nefarious links set up by the attacker. On clicking these links, the attacker is able to gather confidential information, compromise the user’s privacy, or make a user perform actions online…

5 Vulnerabilities 75% Websites Have

Internet Security for online businesses and applications is an ever pressing issue. While organizations are regularly updating their defense mechanisms against rising cyber-attacks, cyber criminals are constantly finding new hack techniques to break into firewalls and steal sensitive information. 2016 witnessed a steep rise in cyber-crime attacks, all the while with no exception of insider threats getting prominent each year. Enlisted below are…

Close