Wednesday, March 17, 2010

Hackers need your help first to succeed





Many of you may surprise to hear this but in most cyber security incidents it has been found that they succeeded because victims have helped them first. Today I am going to explain how a user may help cyber criminals.

Awareness: Social Engineering attacks are one example where attacker successfully executes attacks and      victim couldn’t prevent it because of lack of awareness of latest attack trends and their countermeasures.   Today knowledge should not limit to using a system; we all need to update our self with the latest security trends and must be aware how to use a system securely. 
Ignorance:  It is being said that “Real knowledge is to know the extent of one's ignorance” and attackers work on same principle to come inside your trusted boundary. Let me explain with one example, it is advisable that user should change their passwords after certain period of time. How many of us are following this? Similarly there are few set of guidelines that one should follow while using this sophisticated system.
Rely: It’s a human nature that we usually rely on someone very easily who care for us or who think about us and most of the times we judge people in day to day interactions but in an Internet platform these classic judgments methodology are one of the soft and useful weapon of cyber criminals. Phishing attack is one example which is executed by using two common human behaviors- Rely and Ignorance. Don't rely too much on labels, for too often they are trap.  

Finally, I would like to say that Awareness is not expensive so do not try Ignorance and must Rely on acquisition of knowledge.

Saturday, March 13, 2010

Application Security Consultant (ASC)-A Technical Dietitian






ASC job is to assess the application from security point of view but from developer eyes who they are actually?

From my experience I can say that a developer sees them only as “Fault Finder” and from developer perspective ASC is the one who raise question on developer capabilities. But what is an actual truth?

Let me explain in simple words, ASC just plays role of a technical dietitian whose job is to guide a developer how to make a healthy code- “A Secure Code”. I always say one thing to all developers, ASCs are not at opposite side of your table, they are at your side and with you only; for achieving one common objective- launch a healthy and secure code. One thing developer should always keep in mind that credit of successful application goes to developer only and vice versa is also true.
So always welcome your technical dietitian, they will only add value to your capabilities. Nothing else!!!

-A Change I Believe In................. 

A change.....................





From quite few days I was thinking to start writing and finally I have given green flag today.

This year I am going to complete half decade in this industry, more specifically in information security and consulting industry. In these years I have learned so many things and now reached at stage from where I can share my knowledge, experiences and thoughts with others. So with this purpose here I am coming with my first belief :

"Change!!!! ...I Believe In........"

Looks very simple but it’s very difficult to make it practical….every change comes with a challenge and consequently an experience.  

With this small thought I am starting my blogging journey,


All comments will be appreciated.