This blog will walk you through some lessons for conference speakers who speak remotely no matter whether you’re a first-time speaker or an expert.
OWASP Mobile Top 10 Part 2: Insecure Data Storage
Insecure data storage is the second vulnerability in the OWASP Mobile Top 10 list. Insecure data storage comes straight.
OWASP Mobile Top 10 Part 1: Improper Platform Usage
The improper platform usage vulnerability is the first vulnerability in the OWASP Mobile Top 10. This blog will provide.
What is the OWASP Mobile Top 10?
If you ever heard of web application security, you probably heard of OWASP. And if you heard of OWASP,.
The Basics of MySQL Security
If you have ever built a website, chances are you took care of security. Securing web applications does have.
Build Stuff 2019 Retrospective
It’s November. For some developers it’s just an ordinary month – for some of them it means maintenance of.
Cleaning a mechanical keyboard: Corsair Vengeance K70
You noticed your keyboard has dirt, some keys are stuck, some keys are not registering properly …or maybe you.
WordPress Malware: WP-VCD
Using nulled WordPress themes and plugins is bad. Why? Because sometimes (well, most of the time) nulled plugins or.
Filtering user input in web applications: the basics
SQL Injection. Cross-Site Scripting. These are just two of web application security flaws that can be prevented by effectively.