 
                            May 20, 2015
ISO 27018: The Long-Awaited Cloud Privacy Standard
By Birgit Thorup Mullen
 
                            May 04, 2015
Rethinking & Repackaging iOS Apps: Part 2
By Carl Livitt
 
                            Apr 27, 2015
Security Should Be Application-Specific
By Bishop Fox
 
                            Apr 18, 2015
Vulnerable by Design: Understanding Server-Side Request Forgery
By Mike Brooks
 
                            Apr 15, 2015
AirDroid: How Much Do Your Apps Know?
By Matt Bryant
 
                            Apr 15, 2015
AirDroid Web Application Authentication Flaw
By Matt Bryant
 
                            Mar 17, 2015
Beyond Security Requirements: Secure Requirements
By Bishop Fox
 
                            Feb 24, 2015
Rethinking & Repackaging iOS Apps: Part 1
By Carl Livitt
 
                            Feb 13, 2015
Stand Your Cloud: A Series on Securing AWS
By Ruihai Fang
 
                            Sep 24, 2014
Tastic RFID Thief: Silent, But Deadly
By Francis Brown
 
                            Sep 16, 2014
In Heartbleed’s Wake: A Password Primer
By Christie Terrill
 
                            Aug 29, 2014
SearchDiggity: Avoid Bot Detection Issues by Leveraging Google, Bing, and Shodan APIs
By Francis Brown
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.