Application Security

Things You Must Know To Protect Your E-commerce Application

Introduction to Web Application Security Several times in a year does your personal or work computer ask you to update its security features despite the worldwide spending on information security standing around $80 billion in 2015. World Wide Web has become a vulnerable place, the more it saw a lot of sophistications and developments...

by Yoosuf
Tag: penetration testing
07-Jan-2016

Application Security, Technology

Abusing Password reset functionality to steal user data (Part–3)

We saw different implementations of a password reset functionality to ensure application security along with their best practices in the first and the second blogs of the series. In this final blog of the series, we will discuss the concept of Multi-Factor Authentication (One Time Passwords i.e. OTP) for the implementation of a reset...

by Nikhit Kumar
Tag: penetration testing
17-Nov-2015

Application Security

Experience at X0RC0NF, 2015 – A security conference

Being a technology focused company, TO THE NEW has always made its presence felt in major conferences around the world. This time, it was X0RC0NF in Cochin, India. I was invited to present my talk there and attend the conference as a speaker. The topic of my talk was "Anatomizing online payment systems: hack to shop", majorly focusing on...

by Abhinav Mishra
Tag: penetration testing
19-Oct-2015

Application Security, Technology

An essence of Application Security in Financial Sector

Digital innovation has been evolving and growing in the financial space with time. It is no secret that the financial companies today see digital presence as a key component to their company's success. Customers can now manage their finances from anywhere and at anytime using these digital offerings. But, this raises a serious issue. With...

by Nikhit Kumar
Tag: penetration testing
19-Oct-2015

Application Security

Six Common Mistakes that may put your Application Under Risk

A thief picks a lock to open it. But if the key is already available, it’s a piece of cake for the thief. Such is the nature of applications and hackers today. All it takes is one mistake from the developer(the key) and the hackers capitalize on that mistake (the theft). It has been rightly said, ”Security is only as strong as the...

by Nikhit Kumar
Tag: penetration testing
06-Oct-2015

Application Security

Abusing Password reset functionality to steal user data (Part – I)

For every developer, implementing a password reset feature is a very interesting part. This is where he develops a logic and then implements it in the code. There is no well-defined industry standard on how to implement a secure password reset functionality in your application. So, the result is that every application has a different way...

by Abhinav Mishra
Tag: penetration testing
02-Sep-2015