Blog

Buffer Overflow Attacks – All You Need to Know

Defining, Understanding and Preventing Buffer Overflow AttacksBuffer Overflows have been a critical and powerful attack vector used for decades by cybercriminals to exploit applications. Though not as common as attack methods such as XSS (cross site scripting) or SQL Injection, buffer overflow attacks can allow custom code execution in a system, typically after crashing system…
Read more

Managed vs Unmanaged Code – What are the Differences?

What is the Difference Between Managed and Unmanaged Code?When code runs in a common language runtime that has control over the execution of that code (e.g, in the Common Language Runtime[CLR]  of .NET or the Java Runtime Environment [JRE]), then that code is considered to be managed. Code that runs out of these environments are…
Read more

Open Web Application Security Project – OWASP Top 10 Vulnerabilities

What is The OWASP Top 10 Vulnerabilities?The OWASP Top 10 Vulnerabilities is a periodical report provided by the Open Web Application Security Project. They have released a top 10 vulnerabilities report in 2004, 2007, 2010, 2013 and will be releasing another in 2017. This is a collaborative effort between security professionals ranking the most pressing…
Read more

Manual Testing is a Vital Component of Securing an Application

Why Manual Testing is Vital for Your Application’s SecurityIn the world of Information Technology, maintaining adequate application security is just as important as developing a functional software application that fulfills its requirements. As both end-users and executives become more acutely aware of major cybersecurity threats surrounding applications, engineers are beginning to implement more security measures…
Read more