Understanding XML External Entitiy Attacks
Oct 15, 2021
For the last four years, security researchers have reported a tremendous increase in security breaches. About 20-30,000 websites get hacked every day. There are several ways websites get hacked, XML External...
How to Secure Apps with Firebase Security Rules
Oct 1, 2021
Firebase is among the most popular online databases. In this guide, we will learn how we can secure Firebase apps using various rules.
How Password Hashing Occurs
Sep 22, 2021
Nowadays, many people store a lot of sensitive information on their phones, laptops, and other gadgets.
Understanding Cross-site Request Forgery Attacks
Aug 28, 2021
Cross-site request forgery (CSRF) is the third massive security vulnerability in web applications after Cross-site scripting (XSS) and SQL injection (SQLi).
Cryptanalysis of Data after A Ransomware Attack
Aug 23, 2021
Cryptanalysis is a technique that has been majorly applied to helping find weaknesses in cryptographic algorithms and improve on them to make encryption robust to threats. Cryptanalysis can, however, be used to...