TestIstanbul 2019 – Interview with Santhosh Tuppad about Ethical Hacking
Who is black hat hacker exactly? What does he/she do? Imagine that someone (preferably a thief/burglar) gets into your home to steal/acquire your valuables without any authorization or permission. Now, this is a simple example where this can be called a “Crime”. Now, in the software...
A Guide to Securing Cascading Stylesheets
INTRODUCTION The goal of this CSS (Not XSS, but Cascading Style Sheet) Cheat Sheet is to inform Programmers, Testers, Security Analysts, Front-End Developers and anyone who is interested in Web Application Security to use these recommendations or requirements in order to achieve better security when authoring Cascading Style Sheets. Let's demonstrate this...
Social Engineering & Security Testing Thinking Exercises
10 exercises for our readers. #SE01 → Your enemy resides in a different country and you want to spy on all his activities on his computer More context: // He connects to the internet to check his email // He uses anti-virus that is a free edition // He is...