Secure coding


21 articles

Secure Coding

What are buffer overflow attacks and how are they thwarted?

What are buffer overflow attacks and how are they thwarted?

Secure Coding

What are buffer overflow attacks and how are they thwarted?

Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities

Rene Holt06 Dec 2021


Secure Coding

Is bug hunting a viable career choice?

Is bug hunting a viable career choice?

Secure Coding

Is bug hunting a viable career choice?

With earnings of top ethical hackers surpassing hundreds of thousands of dollars, some would say yes

Amer Owaida26 Feb 2020


Secure Coding

IT forensic tools: How to find the right one for each incident

IT forensic tools: How to find the right one for each incident

Secure Coding

IT forensic tools: How to find the right one for each incident

Some online resources that will help you find the most suitable IT forensic tools for each case

Lucas Paus03 Oct 2018


Secure Coding

Programmer's Day: Resources to audit your code

Programmer's Day: Resources to audit your code

Secure Coding

Programmer's Day: Resources to audit your code

Taking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code

Cecilia Pastorino13 Sep 2018


Secure Coding

Can cramming code with bugs make it more secure? Some think so

Can cramming code with bugs make it more secure? Some think so

Secure Coding

Can cramming code with bugs make it more secure? Some think so

Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable

Tomáš Foltýn13 Aug 2018


Secure Coding

Five tips for pentesters in iOS

Five tips for pentesters in iOS

Secure Coding

Five tips for pentesters in iOS

Recommendations for pentesters looking for security flaws in iOS applications made by developers

Denise Giusto Bilić05 Jul 2018


Secure Coding

Open source code is ubiquitous and so are many vulnerabilities

Open source code is ubiquitous and so are many vulnerabilities

Secure Coding

Open source code is ubiquitous and so are many vulnerabilities

One-third of audited codebases that contain Apache Struts suffer from the same vulnerability that facilitated the Equifax hack a year ago

Tomáš Foltýn18 May 2018


Secure Coding

How well can bug hunting pay?

How well can bug hunting pay?

Secure Coding

How well can bug hunting pay?

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

Tomáš Foltýn25 Jan 2018


Secure Coding

Black Hat: Hacking the firmware, the next frontier

Black Hat: Hacking the firmware, the next frontier

Secure Coding

Black Hat: Hacking the firmware, the next frontier

Trick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that.

Cameron Camp28 Jul 2017