DNS security best practices: Preventing DNS hijacking, poisoning and redirection
The importance of DNS The Domain Name System (DNS) is one of the fundamental protocols of the Internet. It provides a lookup service that converts domain names (like google.com) into IP addresses... Go on to the site to read the full article ... Read More
Introduction to Cryptography
The field of cryptology Cryptology — literally “the study of secrets” — is composed of cryptography (making codes) and cryptanalysis (breaking codes). However, many people use the term cryptography... Go on to the site to read the full article ... Read More
HTTP-based Vulnerabilities
Introduction to HTTP and HTML vulnerabilities Web applications are commonly targeted by cybercriminals. The combination of public exposure and potential access to sensitive data makes them easily... Go on to the site to read the full article ... Read More
Cross-Site Request Forgery (CSRF) Vulnerabilities
Introduction to cookies and user authentication Cross-site request forgery (CSRF) vulnerabilities are designed to take actions on a website on behalf of an authenticated user. Accomplishing this... Go on to the site to read the full article ... Read More
Cross-Site Scripting (XSS) Vulnerabilities
XSS: The most commonly exploited vulnerability Cross-site scripting (XSS) is one of the most common and well-known vulnerabilities contained within web applications. It consistently appears in the... Go on to the site to read the full article ... Read More
Cryptography-based Vulnerabilities in Applications
Introduction to cryptography Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. By using an encryption algorithm, it is possible to transform data in a... Go on to the site to read the full article ... Read More
SQL Injection Vulnerabilities
Databases and the structured query language A database is designed to store data in an understandable and easily accessible way. Data is organized into tables, rows and columns, making it easy to... Go on to the site to read the full article ... Read More
Credential Management Vulnerabilities
The importance of strong credential management Passwords are the most commonly-used method by which users authenticate to online accounts, computers and other systems. The reason for the massive... Go on to the site to read the full article ... Read More
Command Injection Vulnerabilities
What is a command injection vulnerability? Many applications are not designed to be wholly self-contained. They often access external systems as well, including databases, application programming... Go on to the site to read the full article ... Read More
Format String Vulnerabilities
C++ and strings The C++ programming language has a couple of different variable types designed to manage text data. These include C strings, which are defined as arrays of characters, and the C++... Go on to the site to read the full article ... Read More