Insecure data storage is the second vulnerability in the OWASP Mobile Top 10 list. Insecure data storage comes straight after improper platform usage – such
Read moreOWASP Mobile Top 10 Part 1: Improper Platform Usage
The improper platform usage vulnerability is the first vulnerability in the OWASP Mobile Top 10. This blog will provide some insight into what it is
Read moreWhat is the OWASP Mobile Top 10?
If you ever heard of web application security, you probably heard of OWASP. And if you heard of OWASP, you probably heard about the OWASP
Read moreCSRF Tokens? What Tokens?
In a previous blog post where I covered Cross-Site Request Forgery and what potential impacts and consequences such an attack may have, I wrote that
Read more2017 OWASP Top 10 for PHP Developers Part 10: Insufficient Logging & Monitoring
Another day, another web application gets hacked. Most of the time web application hacks fly under the radar and are discovered years after the data breach
Read more2017 OWASP Top 10 for PHP Developers Part 9: Using Components with Known Vulnerabilities
Attacks on today’s web are an unsurprising reality – websites are hacked daily, data is being stolen and leaked left, right and centre. In many (though
Read more2017 OWASP Top 10 for PHP Developers Part 8: Insecure Deserialization
When developing a web application, web developers sometimes need to first turn data into a proper format so that it can be processed. Occasionally, converting
Read more2017 OWASP Top 10 for PHP Developers Part 7: Cross-Site Scripting (XSS)
We have all seen search forms, haven’t we? Take a look at mine: The above search form is pretty basic – when a search query
Read more2017 OWASP Top 10 for PHP Developers Part 6: Security Misconfiguration
Web applications can be susceptible to all sorts of vulnerabilities: a web application can be vulnerable to at least one of the 2017 OWASP Top
Read more