This article represents different scenarios related with XSS (cross-site scripting) and how to handle them appropriately using AngularJS features such…
Why two factor authentication? With the increase in password theft, phishing attacks and other hacking techniques, the conventional text based…
This article represents top 4 security vulnerabilities related coding practice to avoid while you are programming with Java language. Recently,…
The article presents an example on one of the top OWASP vulnerability related with authentication and session management. This is…
The article presents an example of "Security Misconfiguration" vulnerability that was found on Infosys career website. It could be noted…
The article represents concepts around OAuth based authentication with help of Google OAuth 2.0 Playground, Thanks to Google! Google OAuth 2.0…
Although there are several articles on the internet on OAuth including the pages on http://www.oauth.net , I was unable to…
The article represents one of the education model that could be used to regularly educate your IT organization/team about latest…
If you are a developer working on one or more cloud applications and want to know design and coding tips…
This article explores the recently released Samsung fingerprint scanning API also termed as "Pass API" in light of security for…