Software testing events 2013 india


















Kalyan has expertise in establishing global delivery models and building large operational centers of excellence for customers. He also has a pending patent in the area of intelligent test scenario generation to accelerate software test life cycles. View all posts. Could you suggest What are the best career growth path for manual testers to move from functional testing to non functional testing. Your email address will not be published. By Cigniti Technologies. Listen on the go! Organizations need to transform their business models to keep riding the digital wave.

This mistake was found out by Bob Diachenko during a regular security audit. How to Prevent Database Hacking? An unprotected API end was the issue in this incident. Leaked data includes name, email, number, address gender, etc.

How to make your API secure? Everyone knows that the Adhaar card is the most important and powerful identification document in India. More than a billion of information stored in the government database is ready to be processed under high security and regulations.

However, in there was a major flaw that risked the huge data pool. According to reports published by major news portals, a small software patch has actually compromised the data security.

There was a threat to national security since Adhaar was emerging to be the most powerful. Talking about the patch it was an inexpensive one but was capable enough to jeopardize the system security. What made the whole situation frightening was that the Adhaar card was linked to the bank account, pan card, mobile number, and much personal information of an Indian citizen.

But series of news and proofs that came out might beg to differ. How to keep sensitive data secure? They used this private information to get into their bank accounts and transfer their money to their bank account. Not even the individuals tried to hack the details of some of their targeted customers.

Cyberattack on Union Bank of India Another shocking cyberattack that made everyone alert was done in July The attack was initiated when an employee opened an email attachment. This email attachment had a malware code. The email attachment forged a central bank email.

SWIFT is used for international transactions. The attack was initiated by the North Korean hacker group- Lazarus. This attack was done to get information on thorium-based reactors, an alternative to uranium.

Initially, National Power Corporation of India NPCI denied the hacking attack news but later they accepted that the hackers had hacked one of their systems. Indian journalists, activists spied on by Israeli spyware Pegasus saw another big cyber attack when Israeli spyware Pegasus was used to spy on academicians, lawyers, activists, and journalists in India.

Pegasus took advantage of loopholes in the servers. It allowed the government spies to hack the details of about 1, users. Pegasus allowed to hack and get access to everything on the phones of the user victims remotely.

Even, WhatsApp announced renovating its security features. Facebook database leak data of million users Another very prominent attack was on Facebook and Twitter user data. The personal information of around million users was broken to third parties. Though the attack took place around the geographies, it also included the data of many Indian users.

The Security of Indian Airlines data was compromised when the confidential information of its passengers like ticket information, passport details, and credit card information of more than 4. Though the airlines tried to convince their passengers that their credit card information was safe, they insisted they change their password.

LinkedIn is one of the biggest social networks where people connect with people of their related job profiles. This networking site accounts for million members across countries worldwide.

The company was perturbed when the data of million LinkedIn users were under a security breach. The data of these account holders were sold online. The attackers had sent these users fake job offering mail which forced them to click the link and instilling malicious software on their systems.

But this app appeared to be an enticing bait to hackers to lure their victims. Hackers used the CoWin app to misguided users into downloading fake apps. In January many incidents came up in light of fake Aarogya Setu apps created by hackers. The fake CoWIN app lured many users to download this fake app in an urge to get vaccinated. Security Testing and its Significance Hackers and criminals are getting smarter every day.

We will connect with you for our future events. What are the testing issues of most concern to organisations right now and in the future? SofTec 's agenda reflects the challenges organizations face today. This is India's most topical and up-to-date testing conference, which provides clear guidance to help with the challenges and issues faced in testing today, how best to address them and how to cope with changing conditions and the need to optimise every effort.

The focus of this event will be how best to address the problems and cope with changing conditions and the need to optimize every effort. The testing function in many organisations is evolving and sometimes the division of roles between testers, developers and users are becoming less rigid as new developments in software development and testing make testers out of developers and end users, and developers out of testers.

Taking a holistic view of testing involves seeing the product from the user's point of view, while bringing to bear the problem-solving skills of the tester. Network with other professionals who experience the same challenges, allowing for brainstorming, exchange of ideas with those who share the same interests and outlook as you.



0コメント

  • 1000 / 1000