What follows in the article is a brief overview of a OWASP Top 10 2017 vulnerability - A7-Insufficient Attack Protection.
This post is useful for beginners who want to understand about Insufficient Attack Protection and for developers to help protect their applications against this vulnerability.
Whenever a user with malicious intention visits any application, his first motive is to damage the application or to create a sense of panic among the application’s admins or users who are using the application.
It is natural behaviour for most attackers targeting an application to perform extensive research about the application, its services and categories of users accessing the application. The research usually starts with an ‘information gathering’ phase which includes collecting information about the application stack and usernames that are available to any random user who has access to the application, in addition to observing contact-us forms’ structures.
Once the attackers have enough information about the application, they try to start with their attacks on the application.
Supercharger, what a great way to begin our acceleration! Being part of Supercharger can fuel Entersoft to fulfil the mission to be the best in application security. Entersoft is well-positioned to meet this goal by being 1 out of the top 8 startups selected to be part of the Supercharger accelerator program.
As it turns out, 2016 was even worse than the popular public opinion, with cyber-attacks on major companies practically every day. It was a yearlong Christmas for cyber criminals. Some were politically motivated, most did it for money and a few special snowflakes just did it for the giggles. From Silicon Valley giants to top governmental organisations, everyone was affected as over a billions records were compromised. Here are a few (of the many, many) hacks from last year’s cyber-shitstorm:
Lack of security standards at any market place makes it difficult to manage security controls at an application level. Having a strong security checklist in place not only improves app security but the ecosystem involved in the development process, as well. Also, robust security standards and well set guidelines differentiate a platform from the others.
Topics: Android App Security, Android Best Practices, Android Security, Application Security, Application Security Guidelines, Playstore Security guidelines, Security Checklist, Security DOs, Security Guidelines
We are very pleased to announce Jared's arrival to our team as a social engineering expert.