


NFT: Setting new security standards in blockchains

Interview with Tamás Lengyel, Intel
Interview with Tamás Lengyel Tell us a bit about yourself Hey everyone! I work at Intel as a Senior Security Researcher in the Software and Advanced Technologies Group. My team has a very wide scope in terms of software security at Intel: we have a company-wide...
Deserialization vulnerabilities in Java
Deserialization vulnerabilities in Java Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding securely and meeting other...
JWT handling best practices
JWT handling best practices Máté Simon-Takács (Content developer, Avatao) JWT, short for JSON web tokens, is a popular method for managing user authorization and authentication in web applications. It is designed for allowing parties to transmit information securely....
Recent Comments