What Is Secure Coding?
A Lack Of Security Training Contributes To Growing Vulnerability Numbers The number of vulnerabilities that exist in production software is growing rapidly. In 2019 alone, over 22,000 new... Go on to the site to read the full article ... Read More
Fundamentals of Blockchain Security
Introduction The goal of blockchain is to create a fully decentralized, trustless digital ledger. This is an ambitious goal since most ledger systems in use today, such as those used to track bank... Go on to the site to read the full article ... Read More
Blockchain Security Overview
Introduction Despite being over a decade old, blockchain has only really taken off within the last few years. During this time, it has moved from a fad to the subject of serious research by a number... Go on to the site to read the full article ... Read More
Do you need a master’s degree in cybersecurity?
Introduction One of the greatest challenges in landing a job in any field is demonstrating that you possess the knowledge and experience required for the role. This is especially true in... Go on to the site to read the full article ... Read More
How to scan email headers for phishing and malicious content
Introduction Phishing emails are one of the most common attack vectors used by cybercriminals. They can be used to deliver a malicious payload or steal user credentials from their target.... Go on to the site to read the full article ... Read More
Integer Overflow and Underflow Vulnerabilities
Introduction to integer overflows and underflows Integer overflow and underflow vulnerabilities are considered the eighth most dangerous vulnerability in the Common Weakness Enumeration (CWE) Top 25... Go on to the site to read the full article ... Read More
Race Condition Vulnerabilities
Introduction to race conditions Race condition vulnerabilities are an artifact of parallel processing. The ability to run multiple different execution threads in parallel can create vulnerabilities... Go on to the site to read the full article ... Read More
Buffer Overflow Vulnerabilities
Introduction to buffer overflows Buffer overflows are considered the most dangerous vulnerability according to the CWE Top 25 list in 2019. They received a score of 75.56, almost 30 full points... Go on to the site to read the full article ... Read More
Introduction to the OWASP API Top Ten
The OWASP Project The Open Web Application Security Project (OWASP) is best known for its list of the top ten web application vulnerabilities. This list is updated every few years and is designed to... Go on to the site to read the full article ... Read More
What is NoSQL injection?
Introduction to injection Injection attacks are considered some of the most dangerous types of vulnerabilities in existence. According to the OWASP Top Ten List of web application vulnerabilities,... Go on to the site to read the full article ... Read More
