by Renjith Gopalakrishnan | Sep 30, 2017 | Social Engineering, Vulnerability Assessment and Penetration Testing
Social Engineering – Attack Vectors Phishing The target/victim is manipulated with the appearance possessed by the attacker that he/she represents a legitimate source. The victim receives emails from the fraudulent but appeared to be a prominent source with the...
by Noel Mathew | Sep 24, 2017 | Android, Smart Phone, Vulnerability Assessment and Penetration Testing
Mobile Applications have become an essential part of our lives as our dependence on smartphones has grown. But many users are unaware of the security of their devices. A recent study on the state of application security that “84 percent of mobile app users...
by Renjith Gopalakrishnan | Sep 23, 2017 | Social Engineering, Vulnerability Assessment and Penetration Testing
Social Engineering – Attack Cycle Reconnaissance Attack vectors are determined by the information gathered. Information from the target/victim can be inferred and assembled in various ways that include potential and probable passwords, catalog and distinguish...
by Arun Thomas | Aug 1, 2017 | Point-of-Sale (POS) Systems, Vulnerability Assessment and Penetration Testing
The speed at which POS system is evolving is momentous. A feature-rich, compact Point-of-Sale system offers business owners and operators complete control over their business. At its most basic level, a POS system operates as a cash register that allows retailers ring...
Recent Comments