Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Authenticate with OpenID Connect and Apache APISIX
Authenticate with OpenID Connect and Apache APISIX
Lots of companies are eager to provide their identity provider: Twitter, Facebook, Google, etc. For smaller businesses, not having to manage identities is a benefit. However, we want to avoid being locked into one provider. In this post, I want to demo how to use OpenID Connect using Google underneath and then switch to Azure. OpenID Connect The idea of an authorization open standard started with OAuth around 2006. Because of a security issue, OAuth 2.0 superseded the initial version. OAuth 2
·blog.frankel.ch·
Authenticate with OpenID Connect and Apache APISIX
Highlights from the New U.S. Cybersecurity Strategy
Highlights from the New U.S. Cybersecurity Strategy
The Biden administration today issued its vision for beefing up the nation's collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold with little regard for security. The White House's new national cybersecurity…
·krebsonsecurity.com·
Highlights from the New U.S. Cybersecurity Strategy
What Is a Message Authentication Code (MAC)?
What Is a Message Authentication Code (MAC)?
In secure website connections, a message authentication code (MAC) helps authenticate a message and its data integrity so you know its legit.
·thesslstore.com·
What Is a Message Authentication Code (MAC)?
Serious Security: How to store your users’ passwords safely
Serious Security: How to store your users’ passwords safely
Following our popular article explaining what Adobe did wrong with its users’ passwords, a number of readers asked us, “Why not publish an article showing the rest of us how to do it ri…
·nakedsecurity.sophos.com·
Serious Security: How to store your users’ passwords safely
Password strength explained
Password strength explained
I try to explain how attackers would guess your password, should they get their hands on your encrypted data. There are some thoughts on the strength of real-world passwords and suggestions for your new password.
·palant.info·
Password strength explained
Zerobot Weaponizes Numerous Flaws in Slew of IoT Devices
Zerobot Weaponizes Numerous Flaws in Slew of IoT Devices
The botnet exploits flaws in various routers, firewalls, network-attached storage, webcams, and other products and allows attackers to take over affected systems.
·darkreading.com·
Zerobot Weaponizes Numerous Flaws in Slew of IoT Devices
beam
beam
Shining a light on information threats
·beamdisinfo.org·
beam
Keyoxide
Keyoxide
A modern, secure and privacy-friendly platform to establish your decentralized online identity
·codeberg.org·
Keyoxide
_FORTIFY_SOURCE
_FORTIFY_SOURCE
glibc 2.3.4 introduced _FORTIFY_SOURCE in 2004 to catch security errors due to misuse of some C library functions. The initially supported functions was fprintf, gets, memcpy, memmove, mempcpy, memset
·maskray.me·
_FORTIFY_SOURCE
MITRE D3FEND Knowledge Graph
MITRE D3FEND Knowledge Graph
D3FEND is a knowledge base of cybersecurity countermeasure techniques. In the simplest sense, it is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. The primary goal of the initial D3FEND release is to help standardize the vocabulary used to describe defensive cybersecurity technology functionality.
·d3fend.mitre.org·
MITRE D3FEND Knowledge Graph
Say Hello to Crazy Thin ‘Deep Insert’ ATM Skimmers
Say Hello to Crazy Thin ‘Deep Insert’ ATM Skimmers
A number of financial institutions in and around New York City are dealing with a rash of super-thin "deep insert" card skimming devices designed to fit inside the mouth of an ATM's card acceptance slot. The card skimmers are paired…
·krebsonsecurity.com·
Say Hello to Crazy Thin ‘Deep Insert’ ATM Skimmers
Transacting in Person with Strangers from the Internet
Transacting in Person with Strangers from the Internet
Communities like Craigslist, OfferUp, Facebook Marketplace and others are great for finding low- or no-cost stuff that one can pick up directly from a nearby seller, and for getting rid of useful things that don't deserve to end up in…
·krebsonsecurity.com·
Transacting in Person with Strangers from the Internet
Denial of Wallet Attacks: The new (D)DoS in a Serverless world
Denial of Wallet Attacks: The new (D)DoS in a Serverless world
Denial of Service (DoS) attacks always have been the easiest way to inflict maximum financial damages without requiring advanced skills or techniques. With the advent of cloud computing, website owners can now deploy more resources than the attackers and gracefully handle these primitive attacks. It led to the development of
·kerkour.com·
Denial of Wallet Attacks: The new (D)DoS in a Serverless world
SBOMs Are Great for Supply Chain Security but Buyers Beware
SBOMs Are Great for Supply Chain Security but Buyers Beware
While software bill of materials (SBOMs) have emerged as a potential way for organizations to begin to secure their supply chains, they are not a panacea. However, complementing SBOMs with Supply-Chain Levels for Software Artifacts (SLSA) shows great promise. SLSA provides a framework and roadmap so that the industry can start adhering to the implementation of SBOMs and other security good practices for securing the software supply chain.
·thenewstack.io·
SBOMs Are Great for Supply Chain Security but Buyers Beware
The Security Pros and Cons of Using Email Aliases
The Security Pros and Cons of Using Email Aliases
One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a "+" character after the username portion of your email address -- followed by…
·krebsonsecurity.com·
The Security Pros and Cons of Using Email Aliases
What do we trust to keep our data private?
What do we trust to keep our data private?
We find it fascinating to contemplate the future of privacy and confidentiality in computation. Privacy-enhancing technologies (PETs), as a…
·medium.com·
What do we trust to keep our data private?