OWASP Top 10 #2: Broken Authentication

Number two on the OWASP top 10 is Broken Authentication, and while I want to make sure these explanatory guides are as in-depth and detailed as possible, this one is going to be a little shorter. This is because broken authentication is a vulnerability that most people who know computers sort of understand instinctually. As … Continue reading OWASP Top 10 #2: Broken Authentication