A technical perspective on information security. This blog aims to demystify security issues that are prevalent in today's applications. Everything from the OWASP top 10 vulnerability list to buffer overflows will be discussed in a step-by-step manner. All you need is an open mind:)