Skip to content
Divya Aradhya
  • About
  • Posts
  • Papers & Presentations
  • Categories
    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Management of Information Security
    • Network Security
    • Penetration Testing and Ethical Hacking
    • Web Security Management
  • Contact

Divya Aradhya

Information Security

  • About
  • Posts
  • Papers & Presentations
  • Categories
    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Management of Information Security
    • Network Security
    • Penetration Testing and Ethical Hacking
    • Web Security Management
  • Contact
X
  • About
  • Posts
  • Papers & Presentations
  • Categories
    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Management of Information Security
    • Network Security
    • Penetration Testing and Ethical Hacking
    • Web Security Management
  • Contact

Category: Web Security Management

  • Multiple Points of Presence (MPOP)
  • Vulnerabilities in E-Commerce and Social Networking sites
  • Galt House Hotel Credit Card Info Breach
  • Why is controlling the misbehavior of software as important as software behaving as expected during execution?
  • XSS Attack on Twitter
  • Security Architectures
  • Massive Brute-Force Attack on Alibaba
  • OWASP Top 10 Web Vulnerabilities: 2013
  • Critical Remote Access Vulnerability: Intel AMT backdoor
  • Web Analytics Tools – WebTrends and Google Analytics
  • Possible security issues with taking pictures on a smartphone and posting them on a social networking site
  • What are the security implications of having a social networking account compromised?
  • Google Removal from Search Policy
  • Web Service: RSS
  • Comparison of Privacy Policies of LinkedIn, Facebook, and Twitter
  • IBM z13:”World’s Most Powerful Mainframe”
  • Vulnerabilities of Web Applications – Business Scenario Analysis
  • Recent Posts

    • CVSS Demystified: Part 1
    • Ukraine: DDoS attacks on government and bank websites
    • Expectations from Authority
    • Why is it important to train personnel in security if it is not part of their job routine?
    • The Case for Manual Security Code Review

    Categories

    • Application Security
    • Capture The Flag
    • Cloud Computing Security
    • Cybersecurity Compliance
    • Cybersecurity Strategic Planning
    • Database Security
    • Information Security
    • Leadership
    • Management of Information Security
    • Network Security
    • News
    • Penetration Testing and Ethical Hacking
    • Web Security Management

    Archives

    • May 2022
    • February 2022
    • April 2021
    • March 2019
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • May 2014
    ©2023 Divya Aradhya