Security

July 2016

PIN Code Authentication Bypass

By | July 6th, 2016|Security testing|

While performing a Penetration Test for a web application, an important part is testing the Authentication process. Even if usually it is a standard authentication process or it issues a well-known authentication framework made for security purposes, we still can find vulnerabilities in the implementation of it. For example, applications may rely on client side data [...]

June 2016

Vulnerability Assessment vs. Penetration Testing

By | June 23rd, 2016|Security testing|

When developing a website or an application, security testing is one of the most important part, as having a secure and trustworthy software is what any user is looking for. When it comes to choosing the best approach in security testing, there are two widely used approaches: vulnerability assessment or penetration testing. The choice between them must [...]

When does your company need security testing

By | June 23rd, 2016|Security testing|

A general impression about security testing that most of the companies have is that it is a process of hacking a website after the developing parts is done and/or the application is launched. This idea still stands up because the cyber security field was poorly addressed, or even ignored by most of software development companies, even [...]