null

Blog

OWASP Top 10 Security Risks – Part V

Posted by NetGenetics on Jun 9th 2019

Using Components with Known VulnerabilitiesThese days, even simple websites such as personal blogs have a lot of dependencies.We can all agree that failing to update every piece of software on the bac … read more

OWASP Top 10 Security Risks – Part IV

Posted by NetGenetics on Jun 6th 2019

Cross Site Scripting (XSS) is a widespread vulnerability that affects many web applications. XSS attacks consist of injecting malicious client-side scripts into a website and using the website as a pr … read more

OWASP Top 10 Security Risks – Part III

Posted by NetGenetics on Jun 5th 2019

Broken Access ControlIn website security, access control means to put a limit on what sections or pages visitors can reach, depending on their needs.For example, if you own an ecommerce store, you pro … read more

OWASP Top 10 Security Risks – Part II

Posted by NetGenetics on May 20th 2019

The OWASP Top 10 list consists of the 10 most seen application vulnerabilities: InjectionBroken AuthenticationSensitive data exposureXML External Entities (XXE)Broken Access controlSecurity misconfig … read more

OWASP Top 10 Security Risks – Part I

Posted by NetGenetics on May 20th 2019

OWASP stands for the Open Web Application Security Project, an online community that produces articles, methodologies, documentation, tools, and technologies in the field of web application security.O … read more

What Role Does Cybersecurity Play In Your Physical Security?

Posted by NetGenetics on May 11th 2019

Today, very few organizations depend solely on one kind of security measure to secure their organization and cover their assets. Most companies employ security systems that feature physical … read more

What is physical security?

Posted by NetGenetics on May 11th 2019

Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution … read more

Why Organizations Should Still Care About BYOD

Posted by NetGenetics on May 11th 2019

The conversation on bring your own device (BYOD) in the workplace has been going on for a while and it’s obviously more a given in some sectors than in others. Opinions among security experts on wheth … read more

Social Engineering Simulation Testing Tips

Posted by NetGenetics on May 11th 2019

Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practi … read more

How to secure your computer from Hackers

Posted by NetGenetics on Apr 29th 2019

When the glossy sheen of the World Wide Web started to dull – sometime in the mid-to-late 1990s – computer users were beginning to witness the downside of connectivity, and they did not like what they … read more