Hacking your application may be easier than you think
Or “How I hacked my favorite coffee shop, and why it matters”
Or “How I hacked my favorite coffee shop, and why it matters”
And hack your organization walking through the front door
Cross Site Request Forgery attack and mitigations explained
The basics of how to test and protect your application