Author: Mike Stark

Why Cryptographic Systems Fail

Why Cryptographic Systems Fail

Cryptographic systems can be vulnerable to outside attacks beyond the well-known brute-force attacks. Cryptographic main weaknesses come in two forms: weaknesses within the algorithm itself and weaknesses with their implementation. To clarify, the latter are called side-channel attacks. Why are Cryptosystems Insecure? Cryptosystems typically rely on random number generation to ensure that algorithms can’t be […]

Continue Reading

Emulators Versus Physical Devices: Which is Better?

Emulators Versus Physical Devices: Which is Better?

When it comes to mobile testing, developers have two choices: emulators versus physical devices. Emulators/simulators are software programs that mimic a device’s features. These are virtual devices that act like real smartphones, tablets or other mobile devices. While typically lumped together, simulators and emulators are slightly different. Essentially, emulators mimic the outer behavior of an […]

Continue Reading

Top 10 Web Application Vulnerabilities

Top 10 Web Application Vulnerabilities

Scanning for web application vulnerabilities involves setting up a program that communicates with your system’s web application via the website’s front end. Next, this scanner program interacts with the back-end databases and other resources. Essentially, the goal of this program is to determine if there any vulnerabilities in the web application or architecture. Notably, identifying […]

Continue Reading