Sebagai analis keamanan aplikasi mobile banking, tentunya kita ingin mengetahui sampai sejauh mana keamanan aplikasi terhadap berbagai teknik serangan, termasuk Man-in-the-Middle (MiTM) attack berupa manipulasi transaksi HTTP. 227 more words
Tags » Penetration Test
Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest.
1,201 more words
“A PENTEST RECREATES THE ACTIONS CARRIED OUT BY AN ATTACKER IN ORDER TO IDENTIFY ANY VULNERABILITIES”
A corporate maturity assessment is likely your next strategic move because IT attacks such as Ransomware are on the rise. You may also think data breaches are less of a risk to your business, or, you may believe to have arranged all necessary measurements to prevent cyber attacks. 429 more words
In the coming age of autonomous cars, connected cars, and cars that can communicate with each other, the city’s infrastructure, our phones, and the entire internet of things, data security is going to be paramount. 580 more words