Cyber Security

LDAP Injection

The amount of data stored in organisational databases has increased rapidly in recent years due to the rapid advancement of information technology. A high percentage of the data is sensitive, private and critical to those organisations, their clients, suppliers and partners.

Therefore, databases are usually installed behind internal firewalls, protected with intrusion detection mechanisms and accessed only by applications. To access a database, users have to connect to one of these applications and submit queries through them to the database. The threat to databases arises when these applications do not behave properly and construct these queries without sanitising user inputs first.

SQL injection

SQL injection

Although a common problem with web applications, this vulnerability can affect any application that communicates with a database management system via Structured Query Language.

A SQL injection occurs when the application fails to properly sanitize user-supplied input used in SQL queries. In this way an attacker can manipulate the SQL statement that is passed to the back-end database management system. This statement will run with the same permissions as the application that executed the query.

The main steps of a penetration testing

The main steps of a penetration testing

There are different technologies and challenges during the penetration testings and they range between new web applications to relatively outdated systems. Most of known vulnerabilities such as SQL injections, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), XML injections, Security Misconfiguration and Path Traversal are usually found during a penetration testing.

Apps that support multi-factor authentication

Apps that support multi-factor authentication

Multi-factor Authentication is definitely the latest cyber security method used by most online apps and services. Unfortunately, not all services offer this capability yet. We have therefore come up with a handy list of apps and other internet accounts that allow multi-factor authentication and are compatible with SAASPASS software.

2 factor authentication with SAASPASS

2 factor authentication with SAASPASS

Passwords are no longer the fool-proof security precaution they used to be. The sophisticated software criminal programmers use, means that it is now irresponsible to solely rely on passwords in today’s modern world. Multi-factor authentication adds another step to the login in process, effectively turning your smartphone into a digital key that can unlock the most important apps and services you use on the internet. From online shopping to scrolling through social media, you now can be assured in having the latest security technology available.

Protect Your Facebook Account From Being Hacked

Protect Your Facebook Account From Being Hacked

It's becoming increasingly common to see friends on Facebook announcing that they've been "hacked" and to ignore any messages or links sent by them. Indeed, the damage that can be caused by hackers can be really harmful and security for your social media sites should be of the utmost importance. Here are a few security tips we advise so you can be sure this unfortunate incident doesn't occur to you.