Pakistani Ethical Hacker Reveals How He Exposed Android Vulnerabilities

Hackers are often viewed as modern-day pirates. While mostly true due to the security hazards they create, ethical hackers actually are very helpful in actually improving security standards. Most of these security experts perform these actions simply for the benefit of the community. Rafay Baloch is one such ethical hacker.   Baloch, also known as

Read More »

The Web AppSec How-To: The Defenders’ Toolbox

The modern organization has a wide range of security solutions to pick from for their specific development needs. But picking the right Application Security solution can become quite confusing and overwhelming for CISOs and AppSec experts. Implementing the wrong or unsuitable choice can eventually lead to serious damage from breaches, not far off from having no solution in place.

Read More »

Secure SDLC

What exactly is the SDLC? Organizations developing applications have in-place a process by which each application is designed, developed, tested, and deployed. This sequence of stages that define these processes  is called the software development lifecycle, often referred to as the SDLC. An organization’s SDLC helps shape the way their apps are built and defines the

Read More »

Spoofing Attack

What is a Spoofing Attack? A spoofing attack is when an attacker or malicious program successfully acts on another person’s (or program’s) behalf by impersonating data.   takes place when the attacker pretends to be someone else (or another computer, device, etc.) on a network in order to trick other computers, devices or people into performing

Read More »

21 AppSec & Security Gurus You Should Be Following On Twitter

 Are you an AppSec Tweeter?    Whether you’re a newbie or an old-timer in the world of application security, Twitter is a great place to listen in and connect with some of the best and brightest in the industry. To help, we’ve compiled a list of some of our favorite tweeters to add to your own

Read More »

All You Need to Know About Shellshock & What You Can Do About It

So, what happens when a core component of Mac, Linux and other Unix-based operating systems is found to be highly vulnerable and easily exploitable?  Last week, we found out: On September 24th, the world was first introduced to a family of bugs in the Bash shell, being referred to both as ‘Shellshock’ and ‘Bashdoor’. Here’s

Read More »