Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Applications are hemorrhaging sensitive data. In many cases, the culprit is marketing and analytics libraries that indiscriminately collect user behavior data. And sometimes, sensitive data gets leaked because of poor design or programming errors. A few years ago, I wrote an extension called ...Learn more
As a web application owner, it is crucial to understand the concept of a content security policy ...Learn more
Setting up your environment for a mobile application penetration test can be a chore, especially if ...Learn more
I am fond of meal kits. I enjoy the entire experience: the scrolling through delicious-looking meal ...Learn more
During a recent conversation at DerbyCon it occurred to me that some security folks who are just ...Learn more
Is your corporate wifi as secure as you think it is? A common configuration for WPA Enterprise ...Learn more