Facebook pays $725 million to settle lawsuit over Cambridge Analytica data breach
Meta Platforms, the parent company of Facebook, Instagram, and WhatsApp, has agreed to pay $725 million to settle a lengthy class-action lawsuit filed in 2018. application used by Cambridge Analytica to access users’ personal information without consent for political advertising purposes. The proposed settlement, first reported by Reuters last week, is the latest penalty the […]
The Era of Cyber Threat Information Sharing
We have spent 40 years protecting ourselves as individuals. We tried to trick and outsmart the cybercriminals, but when all our efforts failed, we thought of working with our peers to outnumber them. Cybercriminals don’t remake themselves every time. They have limited resources and limited budgets. So they use playbooks to attack a lot of […]
Why is Robust API Security Important in Ecommerce?
API attacks are on the rise. One of their main targets is e-commerce businesses like yours. APIs are an integral part of how e-commerce businesses accelerate their growth in the digital world. E-commerce platforms use APIs at every customer touchpoint, from browsing products to processing deliveries. As the following diagram shows, API usage is on […]
South Delhi businessman duped of over Rs 50 lakh through missed calls, cops say no OTP was shared
A South Delhi-based businessman was duped of more than Rs 50 lakh by unknown fraudsters through missed calls, the police said Tuesday, adding that the businessman had not shared his OTP or personal details with the accused. According to the man’s complaint, he received a series of missed calls from an unknown number. He even […]
24% of Technology applications contain high-risk security vulnerabilities
With a higher percentage of applications arguably processed than other industries, technology companies can benefit from implementing improved secure coding training and practices for their development teams. In fact, Veracode revealed that 24% of applications in the technology sector contain vulnerabilities considered high-risk. “Expanding software security intuition by providing developers with hands-on experience of what […]
Android Application Penetration Testing – Part 1
[et_pb_section admin_label=”section”] [et_pb_row admin_label=”row”] [et_pb_column type=”4_4″] [et_pb_text admin_label=”Text”] After web applications more concern area is mobile application penetration test Let’s start with some basics- Basic architecture for android device Linux kernel For hardware, we always required drivers as software so that those hardware can smoothly work. We choose Linux kernel because it has Security […]