Alexa myGO

Blog

WebSite Security
21 April 2020     1890

WebSite Security

Website security errors and their correction

Todays technological development requires more web security than ever before against cyber attacks.
These warranty and quality control tests include:

Web Crawlers
A scanner is a bot that scans all the square pixels of a program by clicking on all the links on it. Sometimes they can access vulnerable pages if appropriate measures are not taken. We use web transmitters to make sure that every page of your program has the necessary level of security.

web crawlers,web security

Google Crawlers
Web security issues are sometimes caused by the least likely culprit: Google. As one of the most advanced web servers, Google saves web site keywords and presents their results to customers. Without proper protection, these results can reflect what the customer does not want to see, for example, in a contact list, credit card numbers, or other personal information.

Crawlers
As a QA, first of all, We do programs manually to see if we can protect any protected information. Then we set the program to see if anything important is missing. There are plenty of excellent free programs like Nutch and Heritrix that you can easily find on the internet. Most of the vulnerabilities discovered by these programs are relatively easy to fix.

Common weaknesses on the login pages
Usually, the login page is enough to stop cyber security threats. They are still vulnerable to attacks, so we need to make sure they can not avoid or cheat on anything. The easiest way to access the side is metadata. During production, developers sometimes add user names or passwords as comments in the code. However, if they forget to delete the project eventually, this information will be available to anyone who sees the site is metadata. In our quality assurance process, we discuss metadata for sensitive information to ensure the security of the login page. Access to site metadata is very simple. Just go to your browsers source tab and browse the files.

Unprotected HTTP address
Another way for cybercriminals to access the site is to manually enter it via a specific HTTP path. This usually happens if access to the website is covered but not restricted. 

Always use TLS 1.2 
There has been a massive increase in the use of TLS 1.2 over the last four years. Big companies like Google and Apple continue to use it to communicate with servers.


Dea Kusrashvili

Dea Kusrashvili