Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
What Are You Securing? - DevOps.com
What Are You Securing? - DevOps.com
In the case of information security, we need to ask, “What, exactly, are we trying to protect?” Don MacVittie explains.
·devops.com·
What Are You Securing? - DevOps.com
Invisible QR codes embed object data into infrared tags
Invisible QR codes embed object data into infrared tags
Barcodes and QR codes feel like they’re everywhere nowadays, but they don’t have to be. Scientists at MIT have developed an invisible tagging system called BrightMarker, which embeds fluorescent tags into objects that can be viewed and tracked through an infrared camera.
·newatlas.com·
Invisible QR codes embed object data into infrared tags
Tourists Give Themselves Away by Looking Up. So Do Most Network Intruders.
Tourists Give Themselves Away by Looking Up. So Do Most Network Intruders.
In large metropolitan areas, tourists are often easy to spot because they're far more inclined than locals to gaze upward at the surrounding skyscrapers. Security experts say this same tourist dynamic is a dead giveaway in virtually all computer intrusions…
·krebsonsecurity.com·
Tourists Give Themselves Away by Looking Up. So Do Most Network Intruders.
Hardening repositories against credential theft
Hardening repositories against credential theft
Some best practices and important defenses to prevent common attacks against GitHub Actions that are enabled by stolen personal access tokens, compromised accounts, or compromised GitHub sessions.
·github.blog·
Hardening repositories against credential theft
AI decodes Darknet slang | Deeplab.com
AI decodes Darknet slang | Deeplab.com
Scientists successfully taught advanced neural network sophisticated Darknet slang recognition capabilities
·deeplab.com·
AI decodes Darknet slang | Deeplab.com
Teach a Man to Phish and He’s Set for Life
Teach a Man to Phish and He’s Set for Life
One frustrating aspect of email phishing is the frequency with which scammers fall back on tried-and-true methods that really have no business working these days. Like attaching a phishing email to a traditional, clean email message, or leveraging link redirects…
·krebsonsecurity.com·
Teach a Man to Phish and He’s Set for Life
Who and What is Behind the Malware Proxy Service SocksEscort?
Who and What is Behind the Malware Proxy Service SocksEscort?
Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. Now new findings reveal that AVrecon is the malware engine behind a 12-year-old service…
·krebsonsecurity.com·
Who and What is Behind the Malware Proxy Service SocksEscort?
FBI Seizure of Mastodon Server is a Wakeup Call to Fediverse Users and Hosts to Protect their Users
FBI Seizure of Mastodon Server is a Wakeup Call to Fediverse Users and Hosts to Protect their Users
We’re in an exciting time for users who want to take back control from major platforms like Twitter and Facebook. However, this new environment comes with challenges and risks for user privacy, so we need to get it right and make sure networks like the Fediverse and Bluesky are mindful of past...
·eff.org·
FBI Seizure of Mastodon Server is a Wakeup Call to Fediverse Users and Hosts to Protect their Users
A Modern Approach to Securing APIs
A Modern Approach to Securing APIs
Developers and security teams should work together toward a scalable, flexible, multilayered approach for any type of workload in any environment.
·thenewstack.io·
A Modern Approach to Securing APIs
RFC 9446: Reflections on Ten Years Past the Snowden Revelations
RFC 9446: Reflections on Ten Years Past the Snowden Revelations
This memo contains the thoughts and recountings of events that transpired during and after the release of information about the United States National Security Agency (NSA) by Edward Snowden in 2013. There are four perspectives: that of someone who was involved with sifting through the information to responsibly inform the public, that of a security area director of the IETF, that of a human rights expert, and that of a computer science and affiliate law professor. The purpose of this memo is to provide some historical perspective, while at the same time offering a view as to what security and privacy challenges the technical community should consider. These essays do not represent a consensus view, but that of the individual authors.
·rfc-editor.org·
RFC 9446: Reflections on Ten Years Past the Snowden Revelations
memory spy
memory spy
·memory-spy.wizardzines.com·
memory spy
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | InformIT
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | InformIT
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct ThemCybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result.
·informit.com·
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | InformIT
The Security Pipeline - DevOps.com
The Security Pipeline - DevOps.com
Integrating security solutions into DevOps toolchains will take effort, but once in place they will enhance application security.
·devops.com·
The Security Pipeline - DevOps.com
API Security: Is Authorization the Biggest Threat?
API Security: Is Authorization the Biggest Threat?
Authorization is the largest vulnerability area that is not protected well and represents the biggest current risk for API security.
·thenewstack.io·
API Security: Is Authorization the Biggest Threat?
Lessons from 'Star Trek: Picard'—A cybersecurity expert explains how a sci-fi series illuminates today's threats
Lessons from 'Star Trek: Picard'—A cybersecurity expert explains how a sci-fi series illuminates today's threats
(Editor's note: This article contains plot spoilers.) Society's understanding of technology and cybersecurity often is based on simple stereotypes and sensational portrayals in the entertainment media. I've written about how certain scenarios are entertaining but misleading. Think of black-clad teenage hackers prowling megacities challenging corporate villains. Or think of counterintelligence specialists repositioning a satellite from the back of a surveillance van via a phone call.
·techxplore.com·
Lessons from 'Star Trek: Picard'—A cybersecurity expert explains how a sci-fi series illuminates today's threats
How to fix a ReDoS | The GitHub Blog
How to fix a ReDoS | The GitHub Blog
Code scanning detects ReDoS vulnerabilities automatically, but fixing them isn’t always easy. This blog post describes a 4-step strategy for fixing ReDoS bugs.
·github.blog·
How to fix a ReDoS | The GitHub Blog
Runtime Security: Relevancy Is What Counts
Runtime Security: Relevancy Is What Counts
Security best practices have emerged, including those for cloud native deployments. However, that remains a work in progress.
·thenewstack.io·
Runtime Security: Relevancy Is What Counts
Mitigate Risk Beyond the Supply Chain with Runtime Monitoring
Mitigate Risk Beyond the Supply Chain with Runtime Monitoring
Pipeline controls can only ensure security and compliance for changes that have gone through the pipeline. They don't account for "dark deploys" from bad actors who access production by going around the golden path.
·thenewstack.io·
Mitigate Risk Beyond the Supply Chain with Runtime Monitoring
Internet Identity Workshop 36 Report
Internet Identity Workshop 36 Report
Last week's IIW was great with many high intensity discussions of identity by people from across the globe.
·windley.com·
Internet Identity Workshop 36 Report
ETHOS | Emerging Threat Open Sharing
ETHOS | Emerging Threat Open Sharing
ETHOS is the OT-centric, open-source platform for sharing anonymous early warning threat information.
·ethos-org.io·
ETHOS | Emerging Threat Open Sharing