Authentication & Authorization

Best Practices to Harden Office 365

Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…

5 years ago

Blockchain Security – Part 1

Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…

5 years ago

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…

5 years ago

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

6 years ago

Beware Android Users – CLOAK AND DAGGER is here to exploit you

The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware -…

7 years ago

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…

8 years ago

Introduction to Secure Software Development Life Cycle

The most effective way to reduce application security risk is to implement a formal development process that includes security best…

8 years ago

Mobile Application Security Assessment – Proxying for Windows Phone

While conducting mobile application security assessment of Windows Phone capturing application traffic will allow penetration tester to modify the traffic…

10 years ago

Insecure URL redirection in Google+

Our team identified a vulnerability in Google+ (Google Plus) service which can be used to perform malicious insecure URL redirection…

11 years ago