What is an SQL Injection and how do you fix it?
SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case scenario it allows the attacker…
SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case scenario it allows the attacker…
Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity. That’s why over the past few months we’ve been maniacally…
Activating 2-step verification or Two-factor authentication on a service means that you have to identify yourself twice in order to access your account – often…
The best way to prevent getting hacked is to try to get hacked. Paradoxical as this may sound, evidence shows it is true. The worst…
WordPress is a great Content Management System, it’s easy to use, maintain and there is an ocean of plugins and themes from developers worldwide. What…
Thanks to all the hackers who participated in the h1-702 2018 CTF! For the first time ever, we had both web and mobile challenges. Six…
Comparing White Hat to Black Hat hacking is kind of like comparing the good guys to the bad guys. White Hat hackers look for vulnerabilities…
“Crowdsourced security testing is rapidly approaching critical mass, and ongoing adoption and uptake by buyers is expected to be rapid…” – Gartner Emerging Technology Analysis:…
A clean WordPress installation is not much fun, but plugins and themes can have security issues that should not be ignored. In this blog post,…
Headquartered in India – restaurant discovery, online ordering and table reservations platform Zomato currently operates in 24 countries; including the United States, Australia, United Kingdom,…
WordPress is amazing, we can’t argue with that. It’s efficient, powerful, and functional. However, given that it is the most popular Content Management System (CMS)…
Secrecy has been a trademark of security culture for decades. Companies like cloud-based log management and analytics company Sumo Logic are choosing transparency. Subject to…