Securing https://www.securing.pl/en/ Fri, 21 Jul 2023 10:21:10 +0000 en-US hourly 1 https://www.securing.pl/wp-content/uploads/2020/09/favicon.png Securing https://www.securing.pl/en/ 32 32 Penetration Testing for Filestack https://www.securing.pl/en/penetration-testing-for-filestack/ Fri, 21 Jul 2023 10:08:29 +0000 https://www.securing.pl/?p=10701 See from the client's perspective what cooperation with us looks like. From the initial interview about the platforms and expectations, through actual security tests up to retests and remediations consulting.

The post Penetration Testing for Filestack appeared first on Securing.

]]>
How to prepare an effective threat modeling session https://www.securing.pl/en/how-to-prepare-an-effective-threat-modeling-session/ Wed, 17 May 2023 13:24:29 +0000 https://www.securing.pl/?p=10456 Every threat modeling session requires thorough preparation. This article will help you create an effective session step by step.

The post How to prepare an effective threat modeling session appeared first on Securing.

]]>
Voice Biometrics – how easy is it to hack them with AI Deepfake? https://www.securing.pl/en/voice-biometrics-how-easy-is-it-to-hack-them-with-ai-deepfake/ Thu, 04 May 2023 10:26:19 +0000 https://www.securing.pl/?p=10278 Voice biometrics are becoming a widely used authentication method. They may be convenient but also vulnerable, especially in the age of AI. Here, you will find my research regarding voice biometrics security.

The post Voice Biometrics – how easy is it to hack them with AI Deepfake? appeared first on Securing.

]]>
Storing secrets in web applications using vaults https://www.securing.pl/en/storing-secrets-in-web-applications-using-vaults/ Wed, 19 Apr 2023 12:20:13 +0000 https://www.securing.pl/?p=10162 There is no one-size-fits-all solution when it comes to storing secrets in web applications. Here, you will learn about the useful features of vaults and best practices for keeping your secrets safe.

The post Storing secrets in web applications using vaults appeared first on Securing.

]]>
Cloud Shared Responsibility Model explained https://www.securing.pl/en/cloud-shared-responsibility-model-explained/ Wed, 12 Apr 2023 13:25:24 +0000 https://www.securing.pl/?p=10048 The cloud computing is the future, and many companies are moving their workloads to the cloud. However, there is a general misconception that the cloud is secure by default. This is simply wrong – many things also depend on the cloud consumers.

The post Cloud Shared Responsibility Model explained appeared first on Securing.

]]>
Hackers vs root detection on Android https://www.securing.pl/en/hackers-vs-root-detection-on-android/ Mon, 13 Mar 2023 04:35:08 +0000 https://www.securing.pl/?p=4601 Since the beginning of time, security researchers and hackers have needed to bypass root detection mechanisms implemented in Android apps. In this article, I will present some bypassing techniques and best practices regarding the implementation of these mechanisms.

The post Hackers vs root detection on Android appeared first on Securing.

]]>
Crypto Wallet Security – Video https://www.securing.pl/en/crypto-wallet-security-video/ Tue, 21 Feb 2023 13:50:09 +0000 https://www.securing.pl/?p=9878 In this video, you will learn what security features are important for mobile crypto wallets. You will also discover the differences between wallets and banking applications.

The post Crypto Wallet Security – Video appeared first on Securing.

]]>
Why threat modeling is important https://www.securing.pl/en/why-threat-modeling-is-important/ Mon, 13 Feb 2023 11:02:06 +0000 https://www.securing.pl/?p=9793 In our experience, we have discovered that, in many cases, threat modeling sessions are avoided due to the fear of their potential complexity. It is a popular misconception but there are many good reasons to start doing them.

The post Why threat modeling is important appeared first on Securing.

]]>
How passkeys will impact app security and set us free https://www.securing.pl/en/how-passkeys-will-impact-app-security-and-set-us-free/ Mon, 30 Jan 2023 11:33:16 +0000 https://www.securing.pl/?p=9602 Find out more about the latest authentication trend and discover technical details behind passkeys both from the perspective of a user and a developer

The post How passkeys will impact app security and set us free appeared first on Securing.

]]>
Third-party iPhone keyboards vs your iOS application security https://www.securing.pl/en/third-party-iphone-keyboards-vs-your-ios-application-security/ Wed, 26 Oct 2022 09:41:29 +0000 https://www.securing.pl/?p=8784 The story about the customization of iPhone keyboards is a tightrope walk between comfort and security. Given this road full of obstacles, let us understand how to protect users from the most common threats.

The post Third-party iPhone keyboards vs your iOS application security appeared first on Securing.

]]>