Author: Mike Stark

Why Cryptographic Systems Fail

Why Cryptographic Systems Fail

Cryptographic systems can be vulnerable to outside attacks beyond the well-known brute-force attacks. Cryptographic main weaknesses come in two forms: weaknesses within the algorithm itself and weaknesses with their implementation. To clarify, the latter are called side-channel attacks. Why are Cryptosystems Insecure? Cryptosystems typically rely on random number generation to ensure that algorithms can’t be […]

Continue Reading

Emulators Versus Physical Devices: Which is Better?

Emulators Versus Physical Devices: Which is Better?

When it comes to mobile testing, developers have two choices: emulators versus physical devices. Emulators/simulators are software programs that mimic a device’s features. These are virtual devices that act like real smartphones, tablets or other mobile devices. While typically lumped together, simulators and emulators are slightly different. Essentially, emulators mimic the outer behavior of an […]

Continue Reading

Top 10 Web Application Vulnerabilities

Top 10 Web Application Vulnerabilities

Scanning for web application vulnerabilities involves setting up a program that communicates with your system’s web application via the website’s front end. Next, this scanner program interacts with the back-end databases and other resources. Essentially, the goal of this program is to determine if there any vulnerabilities in the web application or architecture. Notably, identifying […]

Continue Reading

Brute-Force Password Guessing Attacks

Brute-Force Password Guessing Attacks

Caveats: The following analysis is based entirely on a brute force attack. Hackers cannot extrapolate information from this document to help them learn user passwords. iBeta does automated testing of the security of websites, especially for things like cross-site scripting (CSS), and cross-site request forgery (XSRF). However, our automated tool occasionally finds other problems not […]

Continue Reading