Skip to content
Divya Aradhya
About
Posts
Papers & Presentations
Categories
Application Security
Capture The Flag
Cloud Computing Security
Cybersecurity Compliance
Cybersecurity Strategic Planning
Database Security
Information Security
Management of Information Security
Network Security
Penetration Testing and Ethical Hacking
Web Security Management
Contact
Divya Aradhya
Information Security
Primary Menu
About
Posts
Papers & Presentations
Categories
Application Security
Capture The Flag
Cloud Computing Security
Cybersecurity Compliance
Cybersecurity Strategic Planning
Database Security
Information Security
Management of Information Security
Network Security
Penetration Testing and Ethical Hacking
Web Security Management
Contact
X
About
Posts
Papers & Presentations
Categories
Application Security
Capture The Flag
Cloud Computing Security
Cybersecurity Compliance
Cybersecurity Strategic Planning
Database Security
Information Security
Management of Information Security
Network Security
Penetration Testing and Ethical Hacking
Web Security Management
Contact
Category:
Web Security Management
Multiple Points of Presence (MPOP)
Vulnerabilities in E-Commerce and Social Networking sites
Galt House Hotel Credit Card Info Breach
Why is controlling the misbehavior of software as important as software behaving as expected during execution?
XSS Attack on Twitter
Security Architectures
Massive Brute-Force Attack on Alibaba
OWASP Top 10 Web Vulnerabilities: 2013
Critical Remote Access Vulnerability: Intel AMT backdoor
Web Analytics Tools – WebTrends and Google Analytics
Possible security issues with taking pictures on a smartphone and posting them on a social networking site
What are the security implications of having a social networking account compromised?
Google Removal from Search Policy
Web Service: RSS
Comparison of Privacy Policies of LinkedIn, Facebook, and Twitter
IBM z13:”World’s Most Powerful Mainframe”
Vulnerabilities of Web Applications – Business Scenario Analysis