Posts

Your code is only as secure as the systems used to create it….

There is sometimes a perceived conflict between security and usability. This situation is…

If your code lacks consistency, is poorly laid out and undocumented, you’re adding…

Creating code that is capable of withstanding attack requires an understanding of attack…

Apple said it has fixed an undisclosed vulnerability in its HomeKit framework that…

Using a free tool called Spinner, researchers identified certificate pinning vulnerabilities in mobile…

TeamViewer says it has issued a hotfix to address a bug that allows…

A proof of concept attack developed by researchers target users of the development…

Researchers have found a variant of Ursnif Trojan they said is a “v3…