Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah w…
·schneier.com·
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
How Zero Trust Network Access Helps Ransomware Recovery
How Zero Trust Network Access Helps Ransomware Recovery
Ransomware attacks have had devastating impact in recent years. IT managers are now using Zero Trust Network Access to combat these attacks.
·networkcomputing.com·
How Zero Trust Network Access Helps Ransomware Recovery
Digital ID Isn't for Everybody, and That's Okay
Digital ID Isn't for Everybody, and That's Okay
How many times do you pull out your driver’s license a week? Maybe two to four times to purchase age restricted items, pick up prescriptions, or go to a bar. If you get a mobile driver’s license (mDL) or other forms of digital identification (ID) being offered in Google and Apple wallets, you may...
·eff.org·
Digital ID Isn't for Everybody, and That's Okay
AI-Generated Malware Found in the Wild
AI-Generated Malware Found in the Wild
HP has detected an email campaign comprising a standard malware payload delivered by an AI-generated dropper.
·securityweek.com·
AI-Generated Malware Found in the Wild
PGP, GPG, Yubikeys, Oh My!
PGP, GPG, Yubikeys, Oh My!
Cheatsheet for interacting with a postgres database inside a docker container
·joshhaines.com·
PGP, GPG, Yubikeys, Oh My!
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens
A new Federal Trade Commission staff report that examines the data collection and use practices of major social media and video streaming services shows they engaged in vast surveillance of consume
·ftc.gov·
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens
pcp: pmcd network daemon review (CVE-2024-45769), (CVE-2024-45770)
pcp: pmcd network daemon review (CVE-2024-45769), (CVE-2024-45770)
Performance Co-Pilot (PCP) is a system for collecting system performance data and sharing it over the network. We performed a review of its main networking daemon component pmcd, which resulted in the finding of two CVEs and a couple of other noticeable aspects.
·security.opensuse.org·
pcp: pmcd network daemon review (CVE-2024-45769), (CVE-2024-45770)
A next frontier for spam and scams
A next frontier for spam and scams
Please be on the alert for: Spam that includes your name, address, phone number and other personal details. Phone calls that are from human-sounding bots that pretend to be from friends or trusted …
·seths.blog·
A next frontier for spam and scams
3 API Vulnerabilities Developers Accidentally Create
3 API Vulnerabilities Developers Accidentally Create
Attacking APIs is easy, if you know what to look for, according to professional API hacker Katie Paxton-Fear. She shared how she does it.
·thenewstack.io·
3 API Vulnerabilities Developers Accidentally Create
Revocation is broken
Revocation is broken
We have a little problem on the web right now and I can only see this becoming a larger concern as time goes by. More and more sites are obtaining certificates, vitally important documents that we need to deploy HTTPS, but we have no way of protecting ourselves when things
·scotthelme.co.uk·
Revocation is broken
Digital Identity and Access Control
Digital Identity and Access Control
Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours.
·windley.com·
Digital Identity and Access Control
OWASP CRS Project
OWASP CRS Project
The 1st Line Of Defense
·coreruleset.org·
OWASP CRS Project
Browser Bot Detection
Browser Bot Detection
What is Fingerprint Browser Bot Detection? Fingerprint Browser Bot Detection is a Smart Signal that detects automated activity on your website. It analyses a variety of browser attributes and gives you a bot detection signal with one of three values: Good bot - usually a bot that belongs to a well-k...
·dev.fingerprint.com·
Browser Bot Detection
What is Browser Fingerprinting & How Does it Work? | SEON
What is Browser Fingerprinting & How Does it Work? | SEON
Browser fingerprinting gathers hundreds of data points about your users' devices and browser configurations. But how does it stop fraud, and is it enough?
·seon.io·
What is Browser Fingerprinting & How Does it Work? | SEON
How to Detect Bot Traffic (Complete Guide) - Ricky Spears
How to Detect Bot Traffic (Complete Guide) - Ricky Spears
Do you own a website and keep getting disturbed by bots? Read the article below to learn how to detect and block bot traffic. Bot traffic, if not contained, can mess up your analytics and even add to your server cost.
·rickyspears.com·
How to Detect Bot Traffic (Complete Guide) - Ricky Spears
Verifiable Credentials Overview
Verifiable Credentials Overview
Credentials are a part of our daily lives; driver's licenses are used to assert that we are capable of operating a motor vehicle, university degrees can be used to assert our level of education, and government-issued passports enable us to travel between countries. The family of W3C Recommendations for Verifiable Credentials, described in this overview document, provides a mechanism to express these sorts of credentials on the Web in a way that is cryptographically secure, privacy respecting, and machine-verifiable.
·w3c.github.io·
Verifiable Credentials Overview