Mobile and Social – the Threats You Should Know About
(For more resources related to this topic, see here.)
A prediction of the future (and the lottery numbers for next week) scams
Security threats, such as...
Understanding the big picture
(For more resources related to this topic, see here.)
So we've got this thing for authentication and authorization. Let's see who is responsible and what...
Facebook unfriends Twitter. Cross-posted tweets on Facebook disappear temporarily.
Following Facebook’s move to restrict cross-posts from other platforms earlier this month via changes to its API platform, many users noticed their old Twitter...
Fundamentals
(For more resources related to this topic, see here.)
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment ( VA) and Penetrating Testing ( PT or PenTest )...
Rounding up…
(For more resources related to this topic, see here.)
We have now successfully learned how to secure our users' passwords using hashes; however, we should...
General Considerations
(For more resources related to this topic, see here.)
Building secure Node.js applications will require an understanding of the many different layers that it is...