Imperceptible Perturbations
Data Safety and Information Security
EBCDIC is incompatible with GDPR
Welcome to acronym city! The Court of Appeal of Brussels has made an interesting ruling. A customer complained that their bank was spelling the customer’s name incorrectly. The bank didn̵…
Sequoia-PGP
Sequoia is a modular OpenPGP implementation in Rust.
Top 16 open source intelligence tools (OSINT) to find anyone online
What are the top 16 open source intelligence tools (OSINT) ever made? find anyone online and offline with these tools, hints and tips.
Which browsers are best for privacy?
An open-source privacy audit of popular web browsers.
ThreatMapper: Open source platform for scanning runtime environments - Help Net Security
ThreatMapper is an open source platform for scanning runtime environments for supply chain vulnerabilities and contextualizing threats.
Container security best practices: Ultimate guide - Sysdig
Container security best practices include the full component stack used for building, distributing, and specifically executing the container.
Google distributing 10,000 security keys to journalists, elected officials, human rights activists
Global initiative ‘will definitely prevent some cyber-attacks’, says expert
NFTs, Verifiable Credential, and Picos
The hype over NFTs and collectibles is blinding us to their true usefulness as trustworthy persistent data objects. How do they sit in the landscape with verifiable credentials and picos?
Delivering 10,000 security keys to high risk users
Google’s Advanced Protection Program (APP) improves account security for highly visible at-risk groups, such as elected officials, political campaigns, human rights activists and journalists.
4 Container Orchestration Security Concerns
If you’re looking to use container-based applications, you may want to keep in mind the security risks that come with this technology.
The Rise of One-Time Password Interception Bots – Krebs on Security
6 Kubernetes Security Best Practices - The New Stack
Regardless of where you deploy, this post will help you get a clearer understanding of your role and your options for securing Kubernetes.
Is Network Security Relevant in the Cloud? - The New Stack
network security has to become cloud native.
Cyber security in the public cloud
A brief guide to the network, infrastructure, data, and application security capabilities AWS, Microsoft Azure, and Google Cloud provide to prevent cyber attacks and protect your cloud-based resources and workloads.
How to verify checksum on Mac
Verifying SHA-512, SHA-256, SHA-1 and MD5 checksum on Mac using Terminal
RSA sign and verify using Openssl : Behind the scene
IPython notebook version of this page: openssl_sign_verify
Verification for computer networking: Is it possible?
What tools are available? What are the benefits? Let's find out
Gift cards, serial numbers and hard technology
I bought someone a digital gift card the other day. That’s generally a bad idea, since there’s so much waste and breakage, but it was the right answer to the problem in the moment. The …
How Do Authentication and Authorization Differ? - The New Stack
While related, authentication and authorization are two different concepts that need to be separate steps in an access policy and may well be managed by different teams using different tools.
What is SOAR (Security Orchestration, Automation, and Response) - Service Now
Keep up with the current threat landscape. SOAR refers to a collection of software solutions that streamline security operations in key areas. Learn more.
The Show Must Go On: Securing Netflix Studios At Scale
A Journey About Productizing Security
Is there a way out of password hell?
Passwords are hell. Worse, to make your hundreds of passwords safe as possible, they should be nearly impossible for others to discover—and for you to remember. Unless you’re a wizard, this a…
SASE breakdown: Using DNS-layer security to block unwanted or malicious content
Want to know how DNS-layer security features on your road to SASE? Click here to learn how this cybersecurity solution complements a SASE security stack.
Fluid Multi-Pseudonymity
Fluid multi-pseudonymity perfectly describes the way we live our lives and the reality that identity systems must realize if we are to live authentically in the digital sphere.
Norwegian student tracks Bluetooth headset wearers by wardriving around Oslo on a bicycle
Address randomisation not implemented on some, it seems
How does Google Authenticator work? (Part 1)
When you’re accessing services over the WEB – let’s pick GMail as an example – couple of things have to happen upfront:
The server you’re connecting to (GMail in our example) has to get to know who you are. Only after getting to know who you are it’s able to decide what resources you are allowed to access (e.g. your own email inbox, your Calendar, Drive etc.). Step 1 above is called authentication.
Calculate Your Ransomware Score With HYCU - Architecting IT
HYCU has developed a website to allow anyone to calculate their R-Score, a measure of ransomware readiness protection.
Are you prepared to recover from a ransomware attack?
Find out what your R-Score is today!
Rootkits Come to Containers and Bring Trouble with Them - The New Stack
Advanced Persistent Threats and rootkits go hand-in-hand.