Turning Everyday Gadgets into Bombs is a Bad Idea « bunnie's blog
Data Safety and Information Security
Mossad’s pager operation: Inside Israel’s penetration of Hezbollah
New details emerge of Israel’s elaborate plan to sabotage Hezbollah communications devices to kill or maim thousands of its operatives.
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah w…
Watch this loud contraption shake coins to create unhackable crypto wallets
Discover how this offline random number generator uses simple physics to create secure cryptocurrency keys and clinical trial data.
How Zero Trust Network Access Helps Ransomware Recovery
Ransomware attacks have had devastating impact in recent years. IT managers are now using Zero Trust Network Access to combat these attacks.
The State of Security in 2024
It's About Training
Thousands of Linux systems infected by stealthy malware since 2021
The ability to remain installed and undetected makes Perfctl hard to fight.
'I break into buildings and pretend to be the bad guy'
Alethe Denis exposes tricks that made you fall for that return-to-office survey
Digital ID Isn't for Everybody, and That's Okay
How many times do you pull out your driver’s license a week? Maybe two to four times to purchase age restricted items, pick up prescriptions, or go to a bar. If you get a mobile driver’s license (mDL) or other forms of digital identification (ID) being offered in Google and Apple wallets, you may...
AI-Generated Malware Found in the Wild
HP has detected an email campaign comprising a standard malware payload delivered by an AI-generated dropper.
AdGuard Is Better Than Pi-hole in Blocking Ads. Here's Why - Make Tech Easier
In a contest of Pi-Hole vs. AdGuard, AdGuard wins with network-wide ad blocking. Read on to learn all the reasons I made the switch.
PGP, GPG, Yubikeys, Oh My!
Cheatsheet for interacting with a postgres database inside a docker container
Noise Storms: Mysterious massive waves of spoofed traffic observed since 2020
GreyNoise warns of a mysterious phenomenon observed since January 2020, massive waves of spoofed traffic called Noise Storms.
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens
A new Federal Trade Commission staff report that examines the data collection and use practices of major social media and video streaming services shows they engaged in vast surveillance of consume
pcp: pmcd network daemon review (CVE-2024-45769), (CVE-2024-45770)
Performance Co-Pilot (PCP) is a system for collecting system performance data and sharing it over the network. We performed a review of its main networking daemon component pmcd, which resulted in the finding of two CVEs and a couple of other noticeable aspects.
A next frontier for spam and scams
Please be on the alert for: Spam that includes your name, address, phone number and other personal details. Phone calls that are from human-sounding bots that pretend to be from friends or trusted …
3 API Vulnerabilities Developers Accidentally Create
Attacking APIs is easy, if you know what to look for, according to professional API hacker Katie Paxton-Fear. She shared how she does it.
World map · General statistics · The Shadowserver Foundation
Revocation is broken
We have a little problem on the web right now and I can only see this becoming a
larger concern as time goes by. More and more sites are obtaining certificates,
vitally important documents that we need to deploy HTTPS, but we have no way of
protecting ourselves when things
Digital Identity and Access Control
Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours.
Rogue WHOIS server gives researcher superpowers no one should ever have
.mobi top-level-domain managers changed the location of its WHOIS server. No one got the memo.
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
Sophisticated attack breaks security assurances of the most popular FIDO key.
Formal CHERI: rigorous engineering and design-time proof of full-scale architecture security properties | Light Blue Touchpaper
OWASP CRS Project
The 1st Line Of Defense
Browser Bot Detection
What is Fingerprint Browser Bot Detection? Fingerprint Browser Bot Detection is a Smart Signal that detects automated activity on your website. It analyses a variety of browser attributes and gives you a bot detection signal with one of three values: Good bot - usually a bot that belongs to a well-k...
What is Browser Fingerprinting & How Does it Work? | SEON
Browser fingerprinting gathers hundreds of data points about your users' devices and browser configurations. But how does it stop fraud, and is it enough?
Browser Fingerprinting: Techniques, Use Cases & Best Practices
Browser fingerprinting is a website user identification method. Learn more about what it is, how it works & techniques like audio fingerprinting
How to Detect Bot Traffic (Complete Guide) - Ricky Spears
Do you own a website and keep getting disturbed by bots? Read the article below to learn how to detect and block bot traffic. Bot traffic, if not contained, can mess up your analytics and even add to your server cost.
Announcing Turnstile, a user-friendly, privacy-preserving alternative to CAPTCHA
Any website can use a simple API to replace CAPTCHAs with our invisible alternative, whether they’re on the Cloudflare network or not.
Verifiable Credentials Overview
Credentials are a part of our daily lives; driver's licenses are used to assert that we are capable of operating a motor vehicle, university degrees can be used to assert our level of education, and government-issued passports enable us to travel between countries.
The family of W3C Recommendations for Verifiable Credentials, described in this overview document, provides a mechanism to express these sorts of credentials on the Web in a way that is cryptographically secure, privacy respecting, and machine-verifiable.