Blog

, page 2 back to homepage

Forget the password? Then scan your finger

How do you unlock your smartphone? Do you enter the password or use fingerprint authentication? How do you confirm a transaction in your banking application? Do you enter a correct

Read More

Positive UX – how to make wow effect simple

Do you return home if you forget your phone on a table? Can you live at least one day without any gadget or PC? According to the report made by

Read More

Can cyber security culture ensure hacker’s wipeout?

Recent successful cyber attacks force to change the attitude to cyber security culture that is closely connected with the company’s culture as well. Poor corporate culture evokes not only problems

Read More

Security Testing Tools You Need to Know

The statistics of cyber attacks of the recent years shows that hackers broke 1061 blogs and websites in 2015 and 1017 ones in 2016. But when your website is hacked,

Read More

Hacking: Pluses and Minuses

Nowadays hacking is rather popular. Some people are engaged in hacking activity because of personal illegal profit, using confidential or personal information for blackmailing or something like this. For others,

Read More

What Are the Threats of Software Security?

The main aim of security testing is to remove all critical flaws in the security system of software products. The specialists apply different techniques and methods in order to detect

Read More

What Is WPA (Wi-Fi Protected Access)?

Wireless networking has become very popular and many people were and still are not interested in the way the data is sent through the air and how this information can

Read More

Unit vs Integration vs Functional Testing

There are various types of software testing and the QA specialists should be aware of their specific features and different peculiarities. If the test is engaged in mobile testing, then

Read More

Security Testing Tools

Nowadays, security of personal and corporate data plays an important role. And a huge attention is paid to thorough penetration testing, security testing, access control testing, etc. To check whether

Read More

Security Testing Myths

For various specialists, the notion ‘security’ has different meaning and includes diverse concept. In general, security means the combination of specific means that protect the product from malicious attacks and

Read More

5 Open-Source Mobile App Security Testing Tools

To secure mobile applications from various attacks is not a simple task. Modern programs and apps pass thorough security testing in order to define the weak point of the system.

Read More