DEV Community 👩‍💻👨‍💻

# websecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Web Security: Recon

Web Security: Recon

Reactions 2 Comments 1
7 min read
Web Security: Introduction

Web Security: Introduction

Reactions 12 Comments
3 min read
Javascript flaws you should know

Javascript flaws you should know

Reactions 5 Comments
2 min read
10 tips to build a Content Security Policy (CSP) without breaking your site!

10 tips to build a Content Security Policy (CSP) without breaking your site!

Reactions 16 Comments
10 min read
What is Cybersecurity?

What is Cybersecurity?

Reactions 2 Comments
1 min read
What is JSON Web Token?

What is JSON Web Token?

Reactions 9 Comments
2 min read
Cross Domain Security

Cross Domain Security

Reactions 2 Comments
1 min read
Free CDN to optimize your website

Free CDN to optimize your website

Reactions 3 Comments
1 min read
Why do we need HTTPS?

Why do we need HTTPS?

Reactions 60 Comments 4
2 min read
YouTube and The Strange Hackings - Short Theory

YouTube and The Strange Hackings - Short Theory

Reactions 5 Comments
3 min read
Using target=_blank The Malicious Way

Using target=_blank The Malicious Way

Reactions 116 Comments 6
3 min read
It's been a while - Hello Cyber Security!

It's been a while - Hello Cyber Security!

Reactions 4 Comments
3 min read
OWASP API Security Top 10 2019

OWASP API Security Top 10 2019

Reactions 11 Comments
1 min read
Your web app vulnerabilities

Your web app vulnerabilities

Reactions 4 Comments 1
1 min read
Web security unknowns: Same-origin Policy

Web security unknowns: Same-origin Policy

Reactions 5 Comments
6 min read
Is it really easy for black hat hackers to inject codes into a website?

Is it really easy for black hat hackers to inject codes into a website?

Reactions 7 Comments 8
1 min read
If you want to be an above average Web Security Researcher, ask questions

If you want to be an above average Web Security Researcher, ask questions

Reactions 11 Comments
2 min read
How To Become A Web Security Researcher?

How To Become A Web Security Researcher?

Reactions 53 Comments 14
5 min read
What Happens If Your JWT Is Stolen?

What Happens If Your JWT Is Stolen?

Reactions 47 Comments 9
12 min read
Bulletproof Node — Security Best Practises

Bulletproof Node — Security Best Practises

Reactions 17 Comments
5 min read
A tour through the OWASP Top 10

A tour through the OWASP Top 10

Reactions 7 Comments
1 min read
Hashing in Action: Understanding bcrypt

Hashing in Action: Understanding bcrypt

Reactions 10 Comments
1 min read
loading...