Kotlin Among the new “it” programming languages, there are few names getting as much press and chatter as Kotlin. Originally released by the Czech development company JetBrains in 2011, Kotlin has seen its usage supercharged by becoming the Google-approved development language for Android applications. Companies like Netflix, Lyft, Pinterest, and other tech heavyweights have rapidly pivoted to...
Top Quality API Top Quality Api, It's easy to think about creating beautiful UIs for presenting data when you don't consider the effort that goes into gathering and serving the data itself. Here's the thing -- thanks to apilayer, you can focus on your UIs and not the pain of...
Android Security Our phones know a lot about us, so it’s important we can trust them. After discovering and then publishing our findings on SourMint — the malicious iOS ad SDK — the Snyk Security Team decided to dig deeper in the Android ecosystem. To do so, we leveraged Snyk Code to analyze and...
PHP Security Security is a delicate matter that all PHP developers should be aware. However, not all PHP developer know the basic security measures that should be taken to avoid the most common security flaws. Read this article to learn about 6 common PHP security issues and what you can...
Nuxt Content is a git files based headless CMS that allows you to create a blog or documentation site from Markdown, JSON, YAML, XML, and CSV files. It includes: Full-text search Static site generation support with nuxt generate A Powerful QueryBuilder API (MongoDB like) Syntax highlighting to code blocks in markdown files...
React React skills, React is the ultimate library for front-end developers today. Simply put, you get better at development when you learn React, and many organizations view these skills as essential. React developers should be hungry to level-up or audit the skills essential to Facebook’s prominent JavaScript Library. See how...
Malware & Virus, Whether you’re on a Windows, Apple or Linux computer, a desktop, laptop, smartphone or tablet, you’re vulnerable to ever-evolving cyberthreats from computer viruses and other types of malware. The first step to protecting yourself and your data is understanding what you're up against. Here's an overview of the...
Cookie Cookies are text files with small pieces of data — like a username and password that are used to identify your computer as you use a computer network. Specific cookies known as HTTP cookies are used to identify specific users and improve your web browsing experience. Data stored in...
Sql Injection, One of the most dangerous and widespread vulnerability types is SQL Injection, which gives attackers access to your backend database. Using prepared statements and Object-Relational Mapping (ORM) is a good way to defend against SQL injection, but it’s not enough. As this post shows, ORM packages such as Sequelize and MySQL...
SQL injection is one of the most dangerous vulnerabilities for online applications. This happens when a user adds untrusted data to a database query. For example, when filling out a web form. If SQL injection is possible, intelligent attackers can create a user input to steal valuable data, bypass authentication,...