In this post, you will learn quick tips on security vulnerabilities related to Javascript based on analysis of how Javascript assets are…
OnePlus Store Website recently got discovered to be hacked as a result of which credit card details of more than…
Are you concerned about security vulnerabilities in your angular app? Have you been wondering whether one or more of your…
The following is a list of web application security vulnerabilities which made into the list of OWASP 2017 top 10…
This blog represents code sample and related details that can be used to hack into the system through unprotected APIs. The…
This article represents dummies notes on how could one go for SSO implementation using SAML. Please feel free to comment/suggest…
Why two factor authentication? With the increase in password theft, phishing attacks and other hacking techniques, the conventional text based…
The article represents one of the education model that could be used to regularly educate your IT organization/team about latest…
This article explores the recently released Samsung fingerprint scanning API also termed as "Pass API" in light of security for…
Off-late I have been doing an extensive research on application security to to come up with application security guidelines (minimum…
We all come across good security practices and make ourselves familiar with them to develop secured code. However, it may…
This is a series of articles to represent developer's point of view and learning from recent TARGET retail store security…
If you are planning to publish partner APIs for exposing your business services or data to your partners and customers,…
Gathering security requirements in relation with a project, sprint (if agile) is key to deliver secured applications. This is because…
Following are top 5 security attack related questions that you could ask while analyzing the each requirement in hand, the…
[adsenseyu2] Before we look into tips & techniques to design security for your Public APIs, lets understand what do we…