Ax Sharma

Contributor

Ax Sharma is an experienced security researcher, engineer and tech columnist. He holds the British Government endorsement as an Exceptional Talent ("a recognized leader") in digital technology. Ax's articles, expert opinions and analyses have frequently featured on leading media outlets like Fortune, CIO, The Register and TechRepublic. His expertise lies in software development, vulnerability research, and web app security. Through responsible disclosure, Ax has previously exposed serious bugs and security vulnerabilities impacting major national and global organisations. In his spare time, Ax loves exploiting vulnerabilities ethically and writing about technology.

Windows code-signing attacks explained (and how to defend against them)

Homomorphic encryption: Deriving analytics and insights from encrypted data

Homomorphic encryption: Deriving analytics and insights from encrypted data

Homomorphic encryption allows safe outsourcing of storage of computation on sensitive data to the cloud, but there are trade-offs with performance, protection and utility.

4 best practices to avoid vulnerabilities in open-source code

4 best practices to avoid vulnerabilities in open-source code

Open-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems.

RDP hijacking attacks explained, and how to mitigate them

RDP hijacking attacks explained, and how to mitigate them

Attackers take advantage of a Windows Remote Desktop Protocol feature to take over previously disconnected sessions and appear as a legitimate user to gain system access and control,

5 best practices to secure single sign-on systems

5 best practices to secure single sign-on systems

Don't assume that SSO is inherently secure. Follow these recommendations to prevent unauthorized access due to authentication flaws.

John the Ripper explained: An essential password cracker for your hacker toolkit

John the Ripper explained: An essential password cracker for your hacker toolkit

One of the oldest password cracking and testing tools, John the Ripper is still an essential pen testing tool.

Lessons learned from the ANPR data leak that shook Britain

Lessons learned from the ANPR data leak that shook Britain

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?

PrintDemon vulnerability explained: Its risks and how to mitigate

PrintDemon vulnerability explained: Its risks and how to mitigate

Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.

Load More