(Yes, last week was indeed an April Fools' joke)
(This week isn't.)
Domain names are a blessi...
Read More
I am testing an application that only works on Internet Explorer in compatibility mode. Before...
Read More
Chinese cell phone manufacturer OnePlus (incidentally my daily carry) plans on including cryptocurre...
Read More
HSTS tracking beats even incognito mode in browsers, and it more and more often used by advertisers....
Read More
No, I haven't given up on my OTHER blog series about application vulnerability assessment but an opp...
Read More
I'll be doing a live webinar on Application Vulnerability Analysis on February 8 at 2PM EST - 1 mont...
Read More
Welcome to the 6th day of the C# Advent! Let's encrypt some malware.
That sounds horrible, but in se...
Read More
Reconnaissance means something different for pentesters as it does from vulnerability analysts. ...
Read More
Being a vulnerability analyst has a few humorous artifacts. This takes a few different forms, but in...
Read More
All of this fancy organization and lists are just tools for the goal - making a list of everything t...
Read More
The vulnerabilities you hear about aren’t really the problem much of the time.
I don’t w...
Read More
We live in a world where applications run the technology that we all use. There was, once, a t...
Read More