<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">
Bryan Allo

Bryan Allo

Recent Posts By Bryan Allo

User Enumeration | Online Security

If you wanted to access an office building or home, the first thing you try is to simply walk up to the main access ...

Internet of Things Follow Up

As part of my daily routine I like to spend a few moments catching up on industry trends. Not just Application Security ...

System Information Leakage

A while ago I wrote about a seemingly minor but common vulnerability in Denial of Service and Code-Level Application ...

Denial of Service and Code-Level Application Flaws

What is a Denial of Service Attack? Generally speaking, it is a type of attack on a network or application intended to ...

‘Undocumented Features’—Evolving the Security Mindset in

The first piece of software I ever wrote was on a Commodore 64C in the late 80s. All I remember is it had something to ...

How will we secure everything, when everything is connected?

The “Things” part of the “Internet of Things” (IoT) refers to any physical device designed with some type of network ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments