It is important to implement a robust Vulnerability Management (VM) program with an aim to keep the IT infrastructure of the organization protected from existing and emerging security threa… Read More
Introduction to XML XML (Extensible Mark-up Language) is used to create user-defined tags, unlike HTML which consists of pre-defined tags. It is designed to describe data and focus on what… Read More
This blog highlights different insecure coding practices seen in JAVA EE applications. It includes most of the OWASP Top 10 Vulnerabilities, giving their root causes and mitigation techniq… Read More
Cross site scripting attack is one of the high-rated web attacks. In this blog, we will focus on the root cause of this attack in ASP.NET based applications. And why some existing controls f… Read More
Frameworks like Apache Cordova enables software programmers to build hybrid applications for mobile devices. The applications can be built using CSS3, HTML… Read More
A chatbot is an automated service that operates with rules and artificial intelligence to interact with users using a chat interface. Here are few examples of a chatbot: Weather bot: gi… Read More
It is a commonly seen practice to perform security testing of applications during the QA stage, after developing their code. In all such cases however as security bugs get uncovered at the l… Read More
Android applications are bundled in an “apk” format. All the android source code files are compiled and converted into a compressed “dex” file viz. classes.dex. In-or… Read More
Subscribe to Why Thinking Security At An Early Development Stage Is Extremely Vital For Mobile Apps!
Get updates delivered right to your inbox!