The Hand-y Etiquette of Modern All-Remote Culture
Ivan Novikov
by Ivan Novikov
1y ago
In today’s fast-paced digital world, remote work has become the new normal. With the rise of video conferencing platforms like Zoom and Microsoft Teams, we have adapted to an all-remote culture where communication is largely virtual. One aspect of this culture that has become increasingly important is the visibility of participants’ hands during video calls. Hands have become an integral part of the modern video call etiquette, as they serve as a clear indicator of a person’s attention and presence. Take, for instance, the common scenario of employees multitasking during virtual meetings. Cam ..read more
Visit website
What is threat modeling ❓ Definition, Methods, Example
Ivan Novikov
by Ivan Novikov
2y ago
Threat modeling is a method for upgrading the security of an application, system, or business process by distinguishing objections and weaknesses, just as carrying out countermeasures to stay away from or alleviate the impacts of structure dangers. Threat modeling supports recognizing the security prerequisites of a system or association — whatever is basic, touchy, or contains significant information. It’s a nitty-gritty and efficient strategy for recognizing possible dangers and shortcomings with the goal that the danger to IT assets is kept up with to a base. It likewise helps IT chiefs in ..read more
Visit website
What is an SSL certificate ❓ Meaning and Types
Ivan Novikov
by Ivan Novikov
2y ago
Introduction Website/application owners have tons of aspects to look into. However, ensuring end-to-end security ranks top as it is the most crucial factor that an end-user watches out for. Additionally, improved security bags higher ranking, and better SEO. SSL certificate is one of the many approaches permitting website/application owners to meet all the security-related requirements. What does it mean and what value does it bring to the table? Let’s figure all of it together. What is SSL and Where is it used? SSL standard is a successor of TLS. Technically, Secure Sockets Lay ..read more
Visit website
What is Cross Site Request Forgery CSRF | Example and Methods of protection
Ivan Novikov
by Ivan Novikov
2y ago
Organizations aspiring for all-around resource security against the damage-causing cyber vulnerabilities must upgrade their knowledge and get acquainted with all the existing types. CSRF is what is covered sizably in the post. What is CSRF Attack? A counterpart of XSS, CSRF is one of the multiples concerning cyber vulnerabilities wherein the authorized users are compelled to perpetrate something unaccepted or unauthorized action on the website that has authenticated them. By using two-factor login, password, and other means, a website authenticates the end-user and permits them acces ..read more
Visit website
Server side template injection — SSTI vulnerability ⚠️
Ivan Novikov
by Ivan Novikov
2y ago
Server side template injection — SSTI vulnerability ⚠️ Introduction There is hardly any software development or other linked elements that haven’t fallen into the trap of cyber vulnerabilities. Templates, used for HTML code management on the server-side, are amongst them. The attack targeting the server-side templates is known as SSTI (abbreviated). Let’s explore every aspect of it in detail. What is Server Side Template Injection? Most web app owners prefer using Twig, Mustache, and FreeMarker like template engines for the seamless embedding of dynamic & rich data in HTML parts of of ..read more
Visit website
What is XMPP ❓ — Extensible Messaging & Presence Protocol
Ivan Novikov
by Ivan Novikov
2y ago
What is XMPP ❓ — Extensible Messaging & Presence Protocol Introduction In the early 2000s, when the idea of chat applications was shaping, XMPP was allowing developers to construct interactive chat applications. Since its genesis, this protocol has come a long way and is now included in the tech stack (or framework) suggested for developing high-end chat apps like WhatsApp. More than two decades later too, this protocol hasn’t lost its sheen and significance in the abundance of the protocol. Why is it so? What makes XMPP time relevant? What are the key markers? Let’s know this protoco ..read more
Visit website
What is Cryptojacking Attack ❓ Definition and Prevention
Ivan Novikov
by Ivan Novikov
2y ago
Introduction A conceivable threat to cryptocurrency owners, cryptojacking is an attack using which threat attackers can mine cryptocurrency at the expenditure of the target’s resources and network health. If not managed properly at the premature stage, the consequences of this vulnerability can be too detrimental. If you are not aware of this threat’s existence, let us guide you thoroughly on this. In this article, we will cover what is cryptojacking attacks, what are general methods that attackers use, and a few real-word examples to make you aware about the severely of the matter. Crypt ..read more
Visit website
What is API Abuse ❓ Prevention measures.
Ivan Novikov
by Ivan Novikov
2y ago
APIs are paramount for constructing a steadfast and constant communication bridge that empowers devices to pass-on desired information seamlessly. Hackers adopt many ways to exploit the APIs and corrupt the targeted device. This API exploitation is a potential threat to API security and needs foremost attention while constructing utterly secured application development is the goal. What is API abuse? API abuse refers to the act of wrong-handling of APIs, gaining unsanctioned access, and modifying the key functions so that APIs can be used for adversarial processes like raiding a serv ..read more
Visit website
What is RAT Remote Access Trojan ❓ Detection and Removal
Ivan Novikov
by Ivan Novikov
2y ago
Introduction Humans live in the 21st century where a large portion of our exchanges are taken care of on the web. Thus, people, businesses and organizations are presented with new online protection dangers. A significant number of these digital dangers will break into your framework and challenge a person’s activities. One of the most hazardous digital dangers in our present reality is this malware type. In this piece, we’ll talk about this malware’s significance, how the digital danger can influence your framework, how to recognize it and how to ensure your frameworks against it. What is ..read more
Visit website
What is SAML authentication ❓ How does it work ❓
Ivan Novikov
by Ivan Novikov
2y ago
Enterprises using various business apps have a tough time maintaining data’s secrecy and access grants as per user roles throughout the infrastructure landscape. SAML (Security Assertion Markup Language) shows up as a great aid at this front. Let’s see what is it, how it works, what are its advantages, how it differs from SSO, what makes it similar to SSO, and how it helps in API access verification to ensure an astonishing security level. SAML — A Quick Overview SAML’s main work is to permit IdP (the identity details providers) to share the authentication-concerned credential w ..read more
Visit website

Follow Ivan Novikov on FeedSpot

Continue with Google
Continue with Apple
OR