David PettyinIndependent Security EvaluatorsXML vs JSON: Security RisksXXE injection, DTD validation attacks with XML, JSONP bypassing Same-Origin Policy restrictions. Developers beware of these security risks.May 15, 2017May 15, 2017
David PettyinIndependent Security EvaluatorsSecurity Best Practices: Guidelines for the Hotel Industry and Similar High-Turnover EnvironmentsBusinesses with a high volume of employee turnover need an efficient onboarding and offboarding system to handle the legal requirements of…Jan 25, 2017Jan 25, 2017
David PettyinIndependent Security EvaluatorsElectric Fence: Who Let the Heap Corruption Out?Heap mismanagement has been known to be a security issue for over 15 years, but continues to produce critical vulnerabilities in even…Aug 26, 20161Aug 26, 20161