|
You are here |
blog.scottlogic.com | ||
| | | | |
crackstation.net
|
|
| | | | | How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly. | |
| | | | |
luxsci.com
|
|
| | | | | Creating secure website forms is not as easy as purchasing an SSL certificate. Learn more about securing online data collection processes and how LuxSci can help. | |
| | | | |
www.cossacklabs.com
|
|
| | | | | How to implement OAuth in the context of mobile applications while avoiding security pitfalls? Practical steps on fortifying OAuth flow with PKCE, state parameter, managing secure redirections, and focusing on critical aspects during OAuth assessment in mobile environments. | |
| | | | |
tashian.com
|
|
| | | The story of a major hash table vulnerability, and how it took a decade to uncover and resolve. | ||