Part seven of the series detailing the OWASP top 10 web application vulnerabilities with a focus on password hashing. (See intro)
"Insecure cryptographic storage" relates to a number of aspects, but I think that it can be broken down to two main areas: Encryption and Hashing.
As these are similar in some respects and are often both used together, there's a bit of confusion around what they are.
Firstly, encryption uses a mathematical formula to transform human readable data into an unreadable form by means of a key. Often...