
· Alex · security
How to Prevent SQL Injection in Java
From input validation, to using parametrized queries, prepared statements, ORMs and more

From input validation, to using parametrized queries, prepared statements, ORMs and more

What is Broken Access Control, how to identify and mitigation strategies

Types of mobile hacking, steps to cleaning an infected device and how to avoid re-infection

What are worms, brief history and remediation strategies

What is a blind SQL injection, examples, how to detect and mitigation strategies.

A rundown of the most useful Android tools used for Application Security.