Google introduces Open Source Website

Google has introduced Google Open Source Website , and opened doors to thousands of projects and million lines of code for the benefit of developers community.  The website showcases all google project initiatives, codes and release management and many more. It shows strong commitment from Google towards Open Source. Projects includes Cloud, Data Analytics, Database, Developer Tools, Games, Internet of Things,[…]

Read more

Application Security : SQL Injection attack

This 4th and concluding part of my series : Application Security.  Continued from previous Post SQL Injection Attack In present web application scenarios most applications are developed using database at the back-end. All storage are taken care by database layer and presentation layer is handled by Website. All database input/output operations are performed using SQL. Hackers can take advantage of this[…]

Read more

Application Security : Focus Area

In our previous posts we talked about type of Threats and discussed in details Top Threats for Web Application security. Today we shall talk about the points a developer should consider while security Applications. Focus Area Website Authentication Resource Authorization Input Validation & HTTP validation and encoding Parameter Handling Session Data Handling Sensitive Data Protection Web Services Exception Handling Web Config[…]

Read more

Application Security : Top Threats

Continue from my previous Post  : Threats and Risks The Open Web Application Security Project (OWASP) is non profit charitable community focused  on improving the web application security. OWASP is not associated with any commercial organization , to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies and other organizations worldwide OWASP has identified following top 10 Web Application Threats :[…]

Read more

Application Security : Threats & Risks

With the advent of Web technologies, we have extended the reach of our Applications to thousand of users. This has been tremendus achievement, but similarly there have been various incidents where site is hacked or application usage and data had been compromised.  What are these Threats, how to classify them, how to identify the risk and mitigate the risk. Let’s[…]

Read more