Data Breach : 5 Security Misconceptions
2018 has seen some of the most expensive data-breaches. A giant organisation like Facebook was affected by a massive breach
Continue ReadingRecommendations
2018 has seen some of the most expensive data-breaches. A giant organisation like Facebook was affected by a massive breach
Continue ReadingAnyone with an e-mail account, has at some point of time received phishing or scam e-mails. These range from Nigerian
Continue ReadingAn unvalidated redirect allows an attacker to exploit the trust a user has in a particular domain by using it
Continue ReadingHashing is the first step towards secure cryptographic storage of data before passing it to the database. It is advisable
Continue ReadingMany times application references an object (files) to generate web pages. A simple example is when a user requests his
Continue ReadingNote: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on
Continue ReadingUse when the parameter is being echoed: <%@ taglib uri=”http://java.sun.com/jsp/jstl/core” prefix=”c” %> <p>Welcome <c:out value=”${user.name}” /></p> Use while taking the
Continue ReadingWebsites often accept user input for the application to display on the screen. If the application is not careful enough
Continue ReadingNote: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on
Continue ReadingNote: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on
Continue Reading