Privacy & Security
Internet security & privacy articles and tutorials on how to protect yourself from viruses, phishing emails and other scams, the latest security threats and new developments in online security,
Security threats to our smart devices are endless. We look at 10 of the best security apps to protect your computers, phones and tablets.
With more and more of our lives moving online its more important than ever to be vigilant and use best online security practices. These top tips will help you stay safe online.
SSL certificates are used within web servers to encrypt the traffic between the server and client, providing extra security for users accessing your application. Let’s Encrypt provides an easy way to obtain and install trusted certificates for free.
Social Engineering is something we are all exposed to every day, from watching the daily news to advertisements. Social Engineering is psychological manipulation. How can a target be manipulated to do something they normally would not do. This can be as simple as manipulating someone to use your product over another or even buy something that they don't really need, through to divulging sensitive information, such as passwords, or transferring money.
Cross-site scripting is another prevalent form of attack on a web application, and in this tutorial, we are going to find out what a cross-site scripting attack is any why they are so successful as well as how to mitigate these risks.
SQL Injection is an extremely prevalent and dangerous risk to any web application and is so easy to perform. A SQLi attack can lead to sensitive information being leaked directly from the database, malware being served, data integrity compromised and so on.
Parameter tampering is a method by which malicious hackers attempt to compromise your application through manipulating parameters in the URL string. This can cause applications to perform in ways the programmer did not intend, especially if invalid data is encountered.
Internal Implementation Disclosure is the process whereby your web application leaks information about the software being run, the server technology and operating system to a malicious hacker.