Application Security

Javascript Security Vulnerabilities Examples (DarwinBox)

In this post, you will learn quick tips on security vulnerabilities related to Javascript based on analysis of how Javascript assets are…

6 years ago

Security Lessons from OnePlus Hacking & Credit Card being Stolen

OnePlus Store Website recently got discovered to be hacked as a result of which credit card details of more than…

7 years ago

Angular – Top 10 Security Best Practices vis-a-vis Security Risks

Are you concerned about security vulnerabilities in your angular app? Have you been wondering whether one or more of your…

7 years ago

OWASP 2017 Top 10 Web App Security Vulnerabilities

The following is a list of web application security vulnerabilities which made into the list of OWASP 2017 top 10…

7 years ago

Application Security – Use NPM Request Package for APIs Access

This blog represents code sample and related details that can be used to hack into the system through unprotected APIs. The…

7 years ago

Dummies Notes – How SAML-based SSO Authentication Works?

This article represents dummies notes on how could one go for SSO implementation using SAML. Please feel free to comment/suggest…

10 years ago

Authentication using One Time Password (OTP) technique – Part 1

Why two factor authentication? With the increase in password theft, phishing attacks and other hacking techniques, the conventional text based…

10 years ago

Tips for Setting up Application Security Education/Training Plan

The article represents one of the education model that could be used to regularly educate your IT organization/team about latest…

11 years ago

Samsung Fingerprint Scanning API & Mobile Wallet Security?

This article explores the recently released Samsung fingerprint scanning API also termed as "Pass API" in light of security for…

11 years ago

Top 4 Security Books Developers Would Want to Keep Handy

Off-late I have been doing an extensive research on application security to to come up with application security guidelines (minimum…

11 years ago

Top 5 Bad Application Security Practices

We all come across good security practices and make ourselves familiar with them to develop secured code. However, it may…

11 years ago

Developer Analysis of Hacker’s Attack on Target Stores – Page 1

This is a series of articles to represent developer's point of view and learning from recent TARGET retail store security…

11 years ago

Top 7 Secured Practices for Securing Your Partner APIs

If you are planning to publish partner APIs for exposing your business services or data to your partners and customers,…

11 years ago

Tips for Gathering Security Requirements of your Web Application Project

Gathering security requirements in relation with a project, sprint (if agile) is key to deliver secured applications. This is because…

11 years ago

Top 7 Security Attack Questions While Analyzing Every Requirement

Following are top 5 security attack related questions that you could ask while analyzing the each requirement in hand, the…

11 years ago

Tips for Designing Security for Your Public APIs

[adsenseyu2] Before we look into tips & techniques to design security for your Public APIs, lets understand what do we…

11 years ago