DNS security best practices: Preventing DNS hijacking, poisoning and redirection

| | dns
The importance of DNS The Domain Name System (DNS) is one of the fundamental protocols of the Internet. It provides a lookup service that converts domain names (like google.com) into IP addresses... Go on to the site to read the full article ... Read More

Introduction to Cryptography

The field of cryptology Cryptology — literally “the study of secrets” — is composed of cryptography (making codes) and cryptanalysis (breaking codes). However, many people use the term cryptography... Go on to the site to read the full article ... Read More
HTTP-based Vulnerabilities

HTTP-based Vulnerabilities

Introduction to HTTP and HTML vulnerabilities Web applications are commonly targeted by cybercriminals. The combination of public exposure and potential access to sensitive data makes them easily... Go on to the site to read the full article ... Read More

Cross-Site Request Forgery (CSRF) Vulnerabilities

Introduction to cookies and user authentication Cross-site request forgery (CSRF) vulnerabilities are designed to take actions on a website on behalf of an authenticated user. Accomplishing this... Go on to the site to read the full article ... Read More

Cross-Site Scripting (XSS) Vulnerabilities

XSS: The most commonly exploited vulnerability Cross-site scripting (XSS) is one of the most common and well-known vulnerabilities contained within web applications. It consistently appears in the... Go on to the site to read the full article ... Read More

Cryptography-based Vulnerabilities in Applications

Introduction to cryptography Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. By using an encryption algorithm, it is possible to transform data in a... Go on to the site to read the full article ... Read More
SQL Injection Vulnerabilities

SQL Injection Vulnerabilities

Databases and the structured query language A database is designed to store data in an understandable and easily accessible way. Data is organized into tables, rows and columns, making it easy to... Go on to the site to read the full article ... Read More

Credential Management Vulnerabilities

The importance of strong credential management Passwords are the most commonly-used method by which users authenticate to online accounts, computers and other systems. The reason for the massive... Go on to the site to read the full article ... Read More
Command Injection Vulnerabilities

Command Injection Vulnerabilities

What is a command injection vulnerability? Many applications are not designed to be wholly self-contained. They often access external systems as well, including databases, application programming... Go on to the site to read the full article ... Read More
Format String Vulnerabilities

Format String Vulnerabilities

C++ and strings The C++ programming language has a couple of different variable types designed to manage text data. These include C strings, which are defined as arrays of characters, and the C++... Go on to the site to read the full article ... Read More