There are many ways to validates an email address, so let's have a look and talk about which method is best.
As SQL is still the most common vulnerability in the OWASP Top 10, let's take a quick look at how this vulnerability is still exploitable.
Git is a great Version Control System, we all probably use it everyday without thinking what else it can be used for apart from version control. With some plugins, a few extra commands and the use of one or two tools, it can improve your development skills and general day-to-day working life.
SQL Injection is a very common critical vulnerability and for years it has been listed in the OWASP Top 10. Many developers are aware of it and know how to prevent it. But with the rise of NoSQL databases are you familiar with potential NoSQL injection vulnerabilities?
All developers start off as a Junior. Here are some common pitfalls that Junior Developers fall into and how you can avoid them.
In our last blog we spoke about how using a simple passphrase is more secure than using a complex unfriendly password. This blog will expand on this concept and introduce a few more things we can do to make user accounts even more secure.
In part one of our look into passwords we look into Password Policies! There is loads of conflicting information out there and it’s difficult to find the balance between security and usability.
A quick Google search for ‘data breach’ returns countless results. Just recently our sister company,... View Article »