Contact +91 9023 63 1234       sales@eCoreTechnoS.com      Live Chat



Startups Security

We protect online presence of Start-Ups by informing them of the vulnerabilities in their Web Portals via our specialized WAPT Techniques. The detailed reports also suggest where the vulnerabilities are and on top of it proposed suggestions to fix them via SSDLC processes.. Read More





LATEST FROM BLOG

  • SQL injection as the name suggests, it is a process in which SQL is getting injected with a code. SQL Server keeps all our data in its database. So what if we can inject a string of code and take out some information from the server. SQL injection is a code injection attack in which […]
  •   Cross Site scripting ranks third in the OWASP 2013. That means, it is very critical. XSS or Cross Site scripting is a Computer vulnerability or loopholes , commonly found in Web applications. If properly done, Attacker can inject client side script into Web pages those are on the Internet. It is very dangerous as these web pages are viewed by […]
  • IT user’s personal information such as passwords, credit card numbers, house address’, telephone number, id number etc. are mostly saved on their systems.When these system is not secured effectively from any unauthorised access, there is a high probability that a hacker might exploit that vulnerability and steal that information. Such vulnerability is ”Sensitive Data Exposure”. […]
  •   A few weeks ago, we wrote an article about how one can create a strong password.  Yet, many people still have no clue how important a secure password really is. Also, with news coverage about eBay’s corporate network being hacked and its database with users’ passwords being compromised, we feel it is necessary to […]
  • In today’s world, there are few things which are not been digitized yet. Even drugs are taking it to a next level: digital drugs, or cyber drugs, are now gaining popularity by teenagers and young adults. But how do these drugs work? To get to know how cyber drugs work, we have to go back […]
  • As technology becomes entwined with the real world, Security & Privacy concerns are on the rise. Internet of Things (IoT) facilitates Machine-to-Machine communication. It is a scenario in which objects have unique identifiers communicating without intervention of humans. ‘IoT’ describes a world where different objects and appliances talk silently to each other to make your […]
  • A few weeks ago, we wrote an article about how one can create a strong password.  Yet, many people still have no clue how important a secure password really is. Also, with news coverage about eBay’s corporate network being hacked and its database with users’ passwords being compromised, we feel it is necessary to – […]
  • Always thought that hackers have no interests in attacking your computer? Think again! In fact, as a lot of people are careless in protecting their computer from cyber attacks, it makes you and your system an interesting target for hackers. Here are a few tips listed to protect yourself from cyber attacks. Because… imagine what […]
  •   1. St. Joseph Health A three-day hacker attack against an onsite server at St. Joseph Health System in Bryan, Texas, exposed information on about 405,000 individuals. 2. Stanford Hospital A medical privacy breach led to the public posting on a commercial Web site of data for 20,000 emergency room patients at Stanford Hospital in […]
  • We all know how that moment feels when a password prompt pops up: too lazy to create a new one (I am speaking for myself too). Although there are a few who do create a new one for every online account they have, the majority amongst us doesn’t. However, creating a strong password for each […]