Insecure data storage is the second vulnerability in the OWASP Mobile Top 10 list. Insecure data storage comes straight after improper platform usage – such
Read moreOWASP Mobile Top 10 Part 1: Improper Platform Usage
The improper platform usage vulnerability is the first vulnerability in the OWASP Mobile Top 10. This blog will provide some insight into what it is
Read moreWhat is the OWASP Mobile Top 10?
If you ever heard of web application security, you probably heard of OWASP. And if you heard of OWASP, you probably heard about the OWASP
Read moreThe Basics of MySQL Security
If you have ever built a website, chances are you took care of security. Securing web applications does have its own caveats though – did
Read moreWordPress Malware: WP-VCD
Using nulled WordPress themes and plugins is bad. Why? Because sometimes (well, most of the time) nulled plugins or themes contain malicious code that looks
Read moreFiltering user input in web applications: the basics
SQL Injection. Cross-Site Scripting. These are just two of web application security flaws that can be prevented by effectively filtering user input. Web developers can
Read moreCSRF Tokens? What Tokens?
In a previous blog post where I covered Cross-Site Request Forgery and what potential impacts and consequences such an attack may have, I wrote that
Read moreBank-grade Security or Why Blocking Password Pasting is not a Good Security Strategy
Your friend creates a website. You are curious and you ask him: “is it secure?”, which, in your mind, probably means “did you secure your
Read moreCarriage Return Line Feed (CRLF) Injection Explained
How does a server know when a new header begins and the old one ends or when a line is terminated? Simple. In order to note
Read more