World Informatix

logo

Our Blog

The moment an organization uses privileged user accounts on any device or service, their device or networks are at risk to potentially get hacked. Anyone who can get into …

From : Jagriti Sahu, World Informatix Cyber Security. Adversary : Now a days as the technology is upgrading to serve mankind, it has many inherent flaws as well. …

By Manish Tanwar World Informatix Cyber Security Everyone who is in cyber security or relates to cyber world will look for better ways of security assurance. But there is no …

From: Shivakumar ST, World Informatix Cyber Security My First Exploitation – Open Audit(GPL version) SQL injection vulnerability To learn swimming,you have to get in to water. Searching Searching…Searching! …

File Integrity Checkers Recently I discussed my experience regarding web application testing, how to ease report writing, mitigation of common low impact vulnerabilities etc.  This article is based on the …