Tag

security

XSS are still by far the most common type of vulnerabilities, this article presents strategies to automate the search for XSSes.

Security

Hardcoded AWS keys in Mobile Applications

This article is about how to manage AWS access keys when using AWS services in your mobile application.

Thu 20 December 2018