
Penetration testing
Information gathering [updated 2019]
Penetration testing begins with a pre-engagement phase in which the pen tester gets acquainted with the client, the goals, limitations, and scope of the pene

General security
Guiding principles in information security
A principle which is a core requirement of information security for the safe utilization, flow, and storage of information is the CIA triad. CIA stands for

Security awareness
Top 20 security awareness slogans, catchphrases, and taglines
This article presents the top 20 popular security awareness slogans, catchphrases and taglines with short explanations and remarks. Whether you’re looking fo

Application security
Creating an API authenticated with OAuth 2 in Node.js
In the second part of the Securing Web APIs series, we are going to shed light on the OAuth authorization framework and we are going to build a simple API wi

Application security
Securing Your WordPress Admin Panel
Today, anyone can create their own website with tools such as WordPress, Joomla or Drupal. However, many people suffer when they do not take precautions to s

Secure coding
General HTML5 Security, Part 2
To read the first part of the General HTML5 Security series, please visit: /general-html5-security/ In the second part of the General HTML5 Security series,

Hacking
Web Vulnerabilities Explained eBook
107 Page eBook This book will be useful to anyone engaged in, or studying, web development or/and penetration testing as well as those interested in informat

Phishing
Spear-phishing statistics from 2014-2015
[download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a s