INDIAN ARMED FORCES CHIEFS ON OUR RELENTLESS AND FOCUSED PUBLISHING EFFORTS

The insightful articles, inspiring narrations and analytical perspectives presented by the Editorial Team, establish an alluring connect with the reader. My compliments and best wishes to SP Guide Publications.

— General Upendra Dwivedi, Indian Army Chief

"Over the past 60 years, the growth of SP Guide Publications has mirrored the rising stature of Indian Navy. Its well-researched and informative magazines on Defence and Aerospace sector have served to shape an educated opinion of our military personnel, policy makers and the public alike. I wish SP's Publication team continued success, fair winds and following seas in all future endeavour!"

— Admiral Dinesh Kumar Tripathi, Indian Navy Chief

Since, its inception in 1964, SP Guide Publications has consistently demonstrated commitment to high-quality journalism in the aerospace and defence sectors, earning a well-deserved reputation as Asia's largest media house in this domain. I wish SP Guide Publications continued success in its pursuit of excellence.

— Air Chief Marshal A.P. Singh, Indian Air Force Chief
       

Hacker slams Danske Bank for alleged security failure

Issue No. 22 | November 16-30, 2015Photo(s): By www.danskebank.com

Denmark’s Danske Bank has been named and shamed by a white hat hacker for allegedly leaking confidential customer data in the form of session cookies on its public website.

IT consultant Sijmen Ruwhof says, he found the vulnerability within minutes of exploring the HTML code deployed on the bank’s log-in screen.

In a blog post explaining the exploit, Ruwhof says that each time he attempted to log in, the site would randomly spit out the IP address and stored cookies of an actual Danske Bank customer.

“I’m shocked. I can’t believe this. It’s so obvious and in plain sight! How come that nobody at Danske Bank noticed this before?” he writes. “If the customer from the data that we’re seeing is logged in at the moment, and if I copy those cookies and import them into my browser, then I’m also logged in as that customer. That’s how cookies work, and thus that’s how to identify theft works.”

Ruwhof says he contacted Danske Bank to try to point out the flaw but failed to get beyond the switchboard. Instead he searched for the names of IT security staff on LinkedIn and posted his findings.

Within 24 hours the vulnerability was patched, but Ruwhof didn’t receive a formal response from the bank until two weeks later, when it wrote: “Thank you for reporting a potential security vulnerability on our website. We investigated your report immediately. However, the data you saw was not real customer sessions or data – just some debug information. Our developers corrected this later that day.”