It would seem that such a trivial problem as SQL injection is no longer a problem, but unfortunately this vulnerability is still relevant and is in the top of the OWASP Top-10 list. To understand how this problem can be avoided, we first look at why it is so dangerous and what the consequences of it can be.
Continue reading »Security
Two of the most common attacks against web sites and web application are XSS (Cross-site Scripting) and CSRF (Cross-Site Request Forgery). Both kind of attacks are exploited regulary and even big companies have been vulnerable to them.
Continue reading »A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application — either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
Continue reading »