In this blog, we are going to discuss about what is the SAML (Security Assertion Markup Language) and how it…
Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…
Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…
At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…
Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…
The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware -…
The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…
The most effective way to reduce application security risk is to implement a formal development process that includes security best…
While conducting mobile application security assessment of Windows Phone capturing application traffic will allow penetration tester to modify the traffic…
Our team identified a vulnerability in Google+ (Google Plus) service which can be used to perform malicious insecure URL redirection…