Web application filters and WAF: why using them? As cybersecurity issues increase, Web application filters and Web Application Firewalls are becoming more popular. These tools can be an excellent fir... 24.02 Applications
How HTTPS works and how to install it We’ve been hearing a lot of things about HTTPS during the past months, and the Heartbleed “bug” has its responsibility in that phenomenon. There was a... 23.01 Applications
Understanding web vulnerabilities in 5 min – Episode #10 – Unvalidated redirects and forwards This flaw is ranked #10 on the OWASP Top 10. It is the last one of the top 10, so it is not the most “important” but is doesn’t mean we can ignore it,... 26.11 Applications
What are the risks if my website gets hacked? Web attack types Web attacks can be divided into two basic categories Those related to technical flaws (control weaknesses, lack of rigor in the devel... 23.06 Applications
Understanding web vulnerabilities in 5 min – Episode #6 – Sensitive Data Exposure Still in our series of articles about web vulnerabilities, this 6th episode is about Sensitive Data Exposure.As usual, we won’t dive into the highly t... 15.05 Applications
10 ways to make your web application more secure We assume here that your hosting environment is already secure, whether managed by yourself or by a hosting provider.Let’s focus on the applications. ... 14.03 Applications