· Alex · security
How to Prevent SQL Injection in Java
From input validation, to using parametrized queries, prepared statements, ORMs and more
From input validation, to using parametrized queries, prepared statements, ORMs and more
What is Broken Access Control, how to identify and mitigation strategies
Types of mobile hacking, steps to cleaning an infected device and how to avoid re-infection
What are worms, brief history and remediation strategies
What is a blind SQL injection, examples, how to detect and mitigation strategies.
A rundown of the most useful Android tools used for Application Security.