Fixing OWASP Top Tep Vulnerabilities - IDOR - Aleph Tav Technologies

Insecure Direct Object Reference (IDOR) – A Gaping Hole

Application Security Threat Research Series – Part 1: IDOR This is an aerial shot of sheep leaving a grazing field in complete accord through a narrow gate while it looks like there isn’t even a fence in the first place (or perhaps a frail one that would not hold for long). The sheep are c onditioned to […]

Aleph tav Technologies - Protect against ransomware

Ransomware – Is it the new blackmail?

Imagine you have to leave your home on account of an emergency. There’s no one but your faithful nanny to take care of your house and your baby in your absence. You place your trust in your nanny and leave for the emergency only to return and find yourself locked out of your house with […]

Ethical Hacking - Aleph Tav Technologies

Ethical Hacking- The Perfect Reality Check

A few months ago, a team of hackers namely Charlie Miller and Chris Valasek wrought havoc by infiltrating into the entertainment system of a Jeep Cherokee. While they were at it, everything in the automobile was under their control including the brakes and the steering. The driver in question was doomed as his fate lay […]

Rogue applications, Application Security Testing - Aleph Tav Technologies Pvt Ltd

Security Alert: Rogue Applications

Competitiveness in the mobile-based business environment is precariously balanced on originality and the protection of ideas from being duplicated, misused or mutilated. Mobile Applications happen to be both the intellectual property and the identity of a brand. This means they must be secured both from the purview of regulatory compliance and the threat of identity […]

Aleph Tav Technologies IoT Security Assessment

IoT Data security – the core mission of risk assessment for connected devices

Investing in an IoT system is a risk that needs to be bolstered by a systemic readiness review and attack-based status monitoring strategy.   The Internet of Things is driving transformations in major operational models by connecting assets, people, products and services, creating the possibility to make real-time decisions and deliver personalized outcomes. The technology […]

security assessment for startups

How Secure is your Start-up? Analyse your security posture

A nascent technology organization can often have a pretty long ‘to-do list’. A mad rush ensues in the early stages of inception when business development efforts take up highest priority and security often ends up as one of the very last items on the list. If there’s anything to deduce from the pattern of cyber […]