The Top 11 Code Signing Best Practices to Protect Your Customers and Keep Your Software Tamper-Free Want to protect your home from thieves? A security system is a popular option. However, it’s not very effective if you don’t install it properly, fail to activate it when you aren’t home, or use “123456” as the security code. The same ... Read More »
Stored XSS Attacks, Also Known as Persistent XSS Attacks, Are the Type With the Farthest Reach and Highest Potential Damage Recently, we took a closer look at one of the items on the OWASP Top 10 Vulnerability List – cross-site scripting (XSS). In that post, we covered the basics of XSS attacks and performed a quick overview on each of the ... Read More »
When phishing gets hyper-focused, it becomes more convincing. Learn how to spot a spear phishing attack before you “click here.” No matter what technology is available, deception is a critical skill for any bad actor. Whether you call them con artists, scammers, threat actors, or even hackers, the ability to manipulate others with messaging ... Read More »
ARP Spoofing Attacks Lets Hackers Impersonate Your PC and Steal All Your Traffic It’s a common trope in spy movies. You’re watching, popcorn in hand, when suddenly a character does something completely unexpected and unlike them. You’re in shock. You ask yourself “What just happened? I thought they were both good guys? Why did he ... Read More »