OAuth 2.0 is the industry-standard protocol for authorization.
Auth, a widely use term that can be a bit confused. We will show the meaning and how to work with both definitions as a system.
This is probably the most common vulnerability these days on Internet Web Apps. Consist in inject client-side scripts in web pages viewed by other users.
What is Cross-Site Scripting?
XSS occurs when an attacker is capable of injecting a
How to detect and prevent
The only way to detect flaws in your system is through deep testing. Fortunately, there’s a set of tools recommended by OWASP, that may help you on this task. W3AF (w3af is a Web Application Attack and Audit Framework), Web
In this post I intend to give some definitions related with Injection Flaws, what are they? and how you can determine if your system might be vulnerable to this kind of attacks.
In a second part, I will show you some examples and some t
This blog entry intends to bring an overview about security and an introduction of usual mistakes and some tips.
What does Web application security means?
There are several definitions for this questions, but we can shorten t