Ivan Dimov

Ivan is a student of IT and Information Security. He is currently working toward a Master's degree in the field of Informatics in Sweden. He is also a freelance web developer engaged in both front-end and back-end coding and a tech writer. Whenever he is not in front of an Interned-enabled device, he is probably reading a print book or traveling.
Ivan Dimov

Information gathering [updated 2019]

Penetration testing begins with a pre-engagement phase in which the pen tester gets acquainted with the client, the goals, limitations, and scope of the pene

Guiding principles in information security

 A principle which is a core requirement of information security for the safe utilization, flow, and storage of information is the CIA triad. CIA stands for

Top 20 security awareness slogans, catchphrases, and taglines

This article presents the top 20 popular security awareness slogans, catchphrases and taglines with short explanations and remarks. Whether you’re looking fo

Creating an API authenticated with OAuth 2 in Node.js

In the second part of the Securing Web APIs series, we are going to shed light on the OAuth authorization framework and we are going to build a simple API wi

Security Awareness Statistics

Security breaches have grave consequences for organizations. In 2015, the average cost of corporate data breaches increased by 15% compared to the previous y

Google hacking overview

Google Hacking is a term that encapsulates a wide range of techniques for querying Google to reveal vulnerable Web applications and sometimes to pinpoint vul

Securing Your WordPress Admin Panel

Today, anyone can create their own website with tools such as WordPress, Joomla or Drupal. However, many people suffer when they do not take precautions to s

How to prevent web scraping

Web scraping is a widely used technique that transforms unstructured data on the web (HTML) into structured data which can be stored in a database or a sprea

General HTML5 Security, Part 2

To read the first part of the General HTML5 Security series, please visit: /general-html5-security/ In the second part of the General HTML5 Security series,

General HTML5 Security

HTML5 is a living standard and new features are being added as we speak. New features will continue to arrive and browsers will keep becoming better and bett

Web Vulnerabilities Explained eBook

107 Page eBook This book will be useful to anyone engaged in, or studying, web development or/and penetration testing as well as those interested in informat

Spear-phishing statistics from 2014-2015

[download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a s