OWASP Top 10 Web Application Vulnerability 2020
1. Injection
Injection flaws occur when untrusted data sent to an interpreter through a form input or some other data submission to a web...
Denial of Service Attacks
The first type of attack to examine is the denial of service (DoS). A denial of service attack is any attack that aims to deny legitimate users...
Common Examples of Social Engineering
Let us try to understand the concept of Social Engineering attacks through some examples.
Example 1
You must have noticed old company documents being thrown into dustbins as garbage. These documents...