Insecure data storage is the second vulnerability in the OWASP Mobile Top 10 list. Insecure data storage comes straight after…
The improper platform usage vulnerability is the first vulnerability in the OWASP Mobile Top 10. This blog will provide some…
If you ever heard of web application security, you probably heard of OWASP. And if you heard of OWASP, you…
If you have ever built a website, chances are you took care of security. Securing web applications does have its…
Using nulled WordPress themes and plugins is bad. Why? Because sometimes (well, most of the time) nulled plugins or themes…
SQL Injection. Cross-Site Scripting. These are just two of web application security flaws that can be prevented by effectively filtering…
In a previous blog post where I covered Cross-Site Request Forgery and what potential impacts and consequences such an attack…
Your friend creates a website. You are curious and you ask him: "is it secure?", which, in your mind, probably…
How does a server know when a new header begins and the old one ends or when a line is…
Another day, another web application gets hacked. Most of the time web application hacks fly under the radar and are discovered…