Tags » Penetration Test

Manipulasi Transaksi Mobile Banking dengan Burp Suite

Sebagai analis keamanan aplikasi mobile banking, tentunya kita ingin mengetahui sampai sejauh mana keamanan aplikasi terhadap berbagai teknik serangan, termasuk Man-in-the-Middle (MiTM) attack berupa manipulasi transaksi HTTP. 227 more words

Analisis Keamanan Aplikasi Mobile

Hi, I’m the enemy: Different perspectives on a pentest

Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest.

“A PENTEST RECREATES THE ACTIONS CARRIED OUT BY AN ATTACKER IN ORDER TO IDENTIFY ANY VULNERABILITIES”

1,201 more words
Other

8 Reasons Why Your Business May Be The Next IT Victim

A corporate maturity assessment is likely your next strategic move because IT attacks such as Ransomware are on the rise. You may also think data breaches are less of a risk to your business, or, you may believe to have arranged all necessary measurements to prevent cyber attacks. 429 more words

Blog

Security AppScan

  1. Introduction:

IBM Security AppScan, previously known as IBM Rational AppScan, is a family of web security testing and monitoring tools from the Rational Software division of IBM. 3,552 more words

Penetration Test

The Car Hacker's Handbook digs into automotive data security

In the coming age of autonomous cars, connected cars, and cars that can communicate with each other, the city’s infrastructure, our phones, and the entire internet of things, data security is going to be paramount. 580 more words

Automotive

Penetration Testing

Also known as “pen testing” or “security testing” which is an attempts to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible. 145 more words

Security

Penetration Test

SCADA Penatration Test – Cipher Security is a unique Information Security provider. Fast, flexible and with light footprint, Cipher Security is a Commando Elite unit