Authentication & Authorization

“OAuth” Related Vulnerabilities

What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows…

4 years ago

Best Practices to Harden Office 365

Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…

7 years ago

Blockchain Security – Part 1

Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…

7 years ago

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…

7 years ago

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

7 years ago

Beware Android Users – CLOAK AND DAGGER is here to exploit you

The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware -…

8 years ago

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…

10 years ago

Introduction to Secure Software Development Life Cycle

The most effective way to reduce application security risk is to implement a formal development process that includes security best…

10 years ago

Mobile Application Security Assessment – Proxying for Windows Phone

While conducting mobile application security assessment of Windows Phone capturing application traffic will allow penetration tester to modify the traffic…

11 years ago