Security Testing

22
Oct

How to Protect User Passwords from Brute Force Attacks

Password stealing, secret possession of private data have become a common thing on the Internet, made by unfair users. Numerous objects and virtual systems are at risk (social networks, mail agents, verified accounts, and so on). This article contains useful information on a proper way of testing passwords on websites and also protecting yourself and your personal data from hacking and stealing.

14
Oct

Testing Web Application Security with Burp Suite

This software may be considered the most effective and popular web product to perform security testing. Its usage is an opportunity to test software in non-standard ways that can present in-depth views of visible and hidden vulnerabilities of the developed software.

27
Jul

Implementation of XSS Injections While Performing Security Testing

In this article, we will talk about security testing using the example of such system vulnerability as XSS injections, with the help of which a hacker can easily inject his dangerous scripts into pages that will be viewed by Internet users in the future.

23
Jun

What Are SQL Injections and How to Test Them?

This article describes the main concepts of SQL injections, analyzes the most popular types of vulnerabilities and also, provides information on the best ways to prevent SQL code entering into a website.

23
Apr

Why Does Testing Help to Improve the Software Security

The particular vulnerability of security and information integrity is a big risk that is faced by many companies developing various digital products. Hence, security testing is a very important and essential process that can protect such a company from damaged reputation or even bankruptcy.

23
Jan

VPN Implementation in the Sphere of Software Testing

Nowadays, VPN testing services are one of the most popular things that clients want to have tested. And thus, they appeal to specialized companies that provide exhaustive testing of any web functionality.

9
Dec

What Are Cookie Files and How to Test Them?

In this article we described all the main aspects of cookies using in the web development sphere. Also, we analyzed exhaustive test cases to check quickly and easily the functionality of cookies when you develop a particular program code.

11
Nov

Concept of Spear Phishing and Methods for Dealing With It

Spear phishing is a kind of wire fraud when a hacker gets access to secret (confidential) files of some user. Unlike the classic phishing, here a hacker represents oneself as your friend or someone you completely trust.

24
Jul

Software Testing Lab: What Differentiates Good Requirements from Bad Ones?

There are characteristics of good product requirements: Necessary Each software requirement should contain something that the users really want or that is needed for compliance with external system standard. Besides, it must originate from a source that is authorized to define the requirements. Keep track of each requirement back to its initiation like use case, business rules, regulation, etc. Software

Read more

11
May

Quality Assurance Consultant: ISO / IEC 12207 and IEEE / EIA 12207 Standards

ISO / IEC 12207 is an international standard developed by the joint efforts of the International Electrotechnical Commission (IEC) and the International Organization for Standardization (ISO). The standard specifies the structure of the software lifecycle processes from concept to retirement. This standard is compatible with the quality system method, ISO 9001 – the the world’s most recognized quality assurance standard

Read more