Web applications are an easy target for malicious users to exploit since the very nature of a web application requires accessibility and reliability regardless of whether a user is malicious or benign. In this presentation, we will look at ways for developers and testers to think like an attacker by delving into some of the most common attacks on web applications.
Today's software security breaches show that it isn't enough to address security concerns only at the beginning of the software development life cycle, with architectural design, and at the end, after most of the functionality has been completed. This talk aims to provide several techniques for developers to test drive the following cross functional security requirements throughout their project: input validation, output encoding, least available privilige
Ransomware is currently one of the most pervasive and damaging types of malware in the wild. Basically, it is a malware that stops you from using your PC or encrypts your files. Over the past year, we have seen an increase in ransomware infections. In this presentation we will explore:
Current attack methods used by ransomware authors
Mitigation and defense against these threats.
Microsoft’s telemetry on ransomware distribution.