Secure coding

HTML5 Security: Cross Domain Messaging

In this article, we will discuss HTML5 Web Messaging (or Cross Domain Messaging) attack vectors and security implementations. Why is it important to understa

7 Reasons to Embrace Source Code Analysis

With the exponential rise in cybercrime in recent years, application security is starting to take center stage. Conventional methods such as antivirus soluti

WebSocket security issues

In this article, we will dive into the concept of WebSocket introduced in HTML 5, security issues around the WebSocket model, and the best practices that sho

Securing Your Java Code 3

For Part 2[pkadzone zone="main_top"] Sensitive Data Exposure A web application is vulnerable if it does not store sensitive information like password, bank

SCA, For a Secure SDLC

Today's cyberspace has become a dangerous place for individuals and businesses. Vulnerabilities are exploited using sophisticated malware and complex hacking

Securing Your Java Code 2

For Part 3 [pkadzone zone="main_top"] SQL Injection SQL injection occurs when a user sends malicious data to an interpreter as an SQL query. The a

Implementing Secure Software Development Program

Background: This article follows my earlier one: "Secure Software Development Life Cycle" (from now on referenced as S-SDLC), being one Implementation of th

Secure code review: A practical approach

This article is about different code review techniques and their application in the real world What you will learn What is secure code review and how to

Introduction to secure software development life cycle

The objective of this article is to introduce the user to Secure Software Development Life Cycle (will now on be referenced to as S-SDLC). There are multiple

X86 Assembly Language, Part 3.1

For part 2 of this series, please click here. Programming in a high-level language does not require a detailed knowledge of the system hardware. Assembly la