Aleph-Tav-Technologies-Life-Cycle-of-a-Cyber-Threat-1

Life Cycle of a Cyber Threat

Majority of organizations persist in using the conventional procedure like mercantile security products to prevent faulty websites and malicious software. In spite of the fact that it is effective against few threats, the approach fails to prevent advanced attacks and is unfit to provide awareness about tactics of the attack. Organizations should follow a threat […]

aleph_tav_technologies_androidapps_backdoor

Protect Your Android Apps from Backdoor

The Android operating system influences OS security controls to protect user data, system resources, device integrity against malware, and provides application isolation. Android devices which contains firmware is vulnerable through a debugging feature left inside the bootloader acts as a backdoor and bypasses the authentication procedures. A backdoor is a security risk because there are […]

Aleph-Tav-Technologies_ApSec_Vulnerabilities_HTTPVerbTampering3

HTTP verb tampering is a serious threat, oft-ignored

Application Security Threat Research Series – Part 2: HTTP Verb Tampering Anybody with a flourishing business goes paranoid every now and then that a begrudging party might unleash an attack with the motive of bringing down the reputation of their brand. While it isn’t always easy to stop meddlers, many companies fail to pay attention […]

Fixing OWASP Top Tep Vulnerabilities - IDOR - Aleph Tav Technologies

Insecure Direct Object Reference (IDOR) – A Gaping Hole

Application Security Threat Research Series – Part 1: IDOR This is an aerial shot of sheep leaving a grazing field in complete accord through a narrow gate while it looks like there isn’t even a fence in the first place (or perhaps a frail one that would not hold for long). The sheep are c onditioned to […]

Aleph Tav Technologies Android Application Vulnerabilities

8 Signs your Android app is about to be hacked.

Developing Android apps that make the cut as secure, reliable and robust is a goal that is getting increasingly dodgy, thanks to the myriad ways in which hackers are exploiting inherent platform vulnerabilities, code loopholes and API bugs. The Android development community is faced with new challenges as devices are perked up with futuristic technologies, […]

Aleph Tav Technologies Intrusion Detection and Threat Monitoring

Protect your web server from web application hacks

With a vulnerable web application, you are helping hackers by significantly reducing the time, cost and efforts needed to get into your corporate network. When Magento, the widely-preferred e-commerce CMS was hacked in mid-2015, many web stores did not realize that there was an ongoing attack until their bank statements showed up. The cyber-crime group behind […]

Aleph tav Technologies - Protect against ransomware

Ransomware – Is it the new blackmail?

Imagine you have to leave your home on account of an emergency. There’s no one but your faithful nanny to take care of your house and your baby in your absence. You place your trust in your nanny and leave for the emergency only to return and find yourself locked out of your house with […]

Application Security Posture Assessment at Aleph Tav Technologies

Avoid these Application Security Risks

The kind of risks that mismanaged security poses can no longer be fathomed merely by the numbers which most often fail to cover the real quantum of damages and their ripple effects. In a mad rush to keep up with time-to-market pressures, app developers may not think through data security and user privacy. This leaves […]

Rogue applications, Application Security Testing - Aleph Tav Technologies Pvt Ltd

Security Alert: Rogue Applications

Competitiveness in the mobile-based business environment is precariously balanced on originality and the protection of ideas from being duplicated, misused or mutilated. Mobile Applications happen to be both the intellectual property and the identity of a brand. This means they must be secured both from the purview of regulatory compliance and the threat of identity […]