Homepage
Open in app
Sign in
Get started
SecuRing your software
Ideas on how to improve software security
App security
Cloud security
Blockchain
Security testing
Join our newsletter
Follow
Crypto Wallet Security — Video
Crypto Wallet Security — Video
In this video, you will learn what security features are important for mobile crypto wallets.
Dawid Pastuszak
Mar 8
Why threat modeling is important — Securing
Why threat modeling is important — Securing
In our experience, we have discovered that, in many cases, threat modeling sessions are avoided due to the fear…
Sebastian Obara
Mar 8
How passkeys will impact app security and set us free
How passkeys will impact app security and set us free
Find out more about the latest authentication trend and discover technical details behind passkeys.
Natalia Trojanowska
Feb 2
Third-party iPhone keyboards vs your iOS application security
Third-party iPhone keyboards vs your iOS application security
The story about the customization of iPhone keyboards is a tightrope walk between comfort and security. Given this road full of obstacles…
Przemek Samsel
Oct 27, 2022
HTTP request smuggling attack. Is it a vulnerability still worth considering?
HTTP request smuggling attack. Is it a vulnerability still worth considering?
Smuggling through international borders is a massive-scale problem. History has shown people can smuggle everything, from drugs, money, and…
Przemek Samsel
Sep 25, 2022
7 key steps for secure Single Sign-On integration
7 key steps for secure Single Sign-On integration
A security guideline for implementing a Single Sign-On (SSO) integration into your web app.
Natalia Trojanowska
Jul 15, 2022
Blockchain bridges security & common cross-chain vulnerabilities
Blockchain bridges security & common cross-chain vulnerabilities
What to consider when developing a secure cross-chain protocol? Let’s draw conclusions from some of the past cross-chain exploits.
Jakub Zmysłowski
Jul 12, 2022
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Comprehensive overview of the most common questions about Single Sign-On (SSO). Choose the right standard for your applications.
Natalia Trojanowska
Apr 27, 2022
Smart Contracts Audits — how to get the most out of your security report?
Smart Contracts Audits — how to get the most out of your security report?
You have received a security report and wonder what to do next? Here are proven ways to help you introduce a higher level of security.
Paweł Kuryłowicz
Mar 28, 2022
Storing secrets in Android applications
Storing secrets in Android applications
What is the best place to keep your secrets secure on Android devices? This article shows available methods and our security…
Łukasz Bobrek
Mar 8, 2022
Front-running attack in DeFi applications — how to deal with it?
Front-running attack in DeFi applications — how to deal with it?
What is front-running and what actions can you take to minimize the negative effects of this attack? Here’s our recommendations to make…
Jakub Zmysłowski
Mar 7, 2022
Setting up your AWS Monitoring — Security tips
Setting up your AWS Monitoring — Security tips
This article contains good practices of AWS Monitoring and Alerting configuration. We also showed a few real-world evasion techniques.
Paweł Kusiński
Mar 7, 2022
Prevent Reverse Engineering (RE) of your Android application
Prevent Reverse Engineering (RE) of your Android application
From this article, you’ll learn how to implement protection measures against reverse engineering in your android application.
Łukasz Bobrek
Mar 7, 2022
Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing
Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing
We present potential threats of performing local authorization on iOS. You will learn how to protect your resources.
Wojciech Reguła
Jan 12, 2022
The future security of your smart contracts — upcoming changes in SCSVS
The future security of your smart contracts — upcoming changes in SCSVS
This article presents our vision for standard updates in SCSVS.
Paweł Kuryłowicz
Dec 14, 2021
WebView security issues in Android applications
WebView security issues in Android applications
WebView is in common use in Android applications. Here you will find tips on how to use WebView with security in mind.
Łukasz Bobrek
Nov 8, 2021
SAML — what can go wrong? Security check
SAML — what can go wrong? Security check
What you should consider when trying to securely integrate with SAML Identity Provider.
Natalia Trojanowska
Oct 27, 2021
How to force Android devices to communicate securely?
How to force Android devices to communicate securely?
Secure network communication is one of the most critical aspects of mobile application development. In this article, you will find tips on…
Łukasz Bobrek
Oct 20, 2021
Secure implementation of WebView in iOS applications — Securing
Secure implementation of WebView in iOS applications — Securing
This post discusses how to ensure secure WebViews and how to keep the attack surface restricted.
Wojciech Reguła
Oct 7, 2021
Reentrancy attack in smart contracts - is it still a problem?’
Reentrancy attack in smart contracts - is it still a problem?’
Reentrancy is as old as Solidity itself, and even older because it’s not the only programming language it appears in. It got a lot of…
Paweł Kuryłowicz
Sep 28, 2021
Security Features in Financial Applications — our recommendations
Security Features in Financial Applications — our recommendations
This article is an introduction to our open source project: Financial Application Features Security Guide (FAFSG).
Łukasz Bobrek
Sep 2, 2021
How to stay secure for longer? Software development case.
How to stay secure for longer? Software development case.
Do you want your software to be secure in its DNA? This post is our overview of two possible ways to improve security awareness.
Mateusz Olejarka
Aug 23, 2021
Top 7 AWS security vulnerabilities based on real-world tests
Top 7 AWS security vulnerabilities based on real-world tests
In our security tests and reviews of the AWS infrastructure , we often come across repeated oversights. Here are the most common ones.
Paweł Kusiński
Aug 19, 2021
Before you implement Face Recognition to your app — AI hack study
Before you implement Face Recognition to your app — AI hack study
In this article, we fooled popular Face Recognition APIs such as Azure Cognitive Services, Amazon Rekognition, and Face++.
Sebastian Drygiel
Aug 5, 2021
Why is it good to look back at your older iOS application builds?
Why is it good to look back at your older iOS application builds?
This article shows why you should always change the secrets in case they were leaked in previous versions of the application.
Dawid Pastuszak
Jun 25, 2021
About SecuRing
Latest Stories
Archive
About Medium
Terms
Privacy