Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
Identity as Root
Identity as Root
This is from an email thread on the topic of digital identity, which is the twice-yearly subject* of the Internet Identity Workshop, the most leveraged conference I know. It begins with a distincti…
·doc.searls.com·
Identity as Root
Is Voting Secure?
Is Voting Secure?
I'm fairly certain that what I write here won't change the minds that need changing. But I feel like I need to make a statement anyway: your vote is secure.
·windley.com·
Is Voting Secure?
Domains to Allow for Firefox | Firefox for Enterprise Help
Domains to Allow for Firefox | Firefox for Enterprise Help
This document is primarily intended for Firefox Enterprise users. Making sure the domains listed in this article are allowed by your firewall or other software ensures that Firefox works correctly.
·support.mozilla.org·
Domains to Allow for Firefox | Firefox for Enterprise Help
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah w…
·schneier.com·
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
How Zero Trust Network Access Helps Ransomware Recovery
How Zero Trust Network Access Helps Ransomware Recovery
Ransomware attacks have had devastating impact in recent years. IT managers are now using Zero Trust Network Access to combat these attacks.
·networkcomputing.com·
How Zero Trust Network Access Helps Ransomware Recovery
Digital ID Isn't for Everybody, and That's Okay
Digital ID Isn't for Everybody, and That's Okay
How many times do you pull out your driver’s license a week? Maybe two to four times to purchase age restricted items, pick up prescriptions, or go to a bar. If you get a mobile driver’s license (mDL) or other forms of digital identification (ID) being offered in Google and Apple wallets, you may...
·eff.org·
Digital ID Isn't for Everybody, and That's Okay
AI-Generated Malware Found in the Wild
AI-Generated Malware Found in the Wild
HP has detected an email campaign comprising a standard malware payload delivered by an AI-generated dropper.
·securityweek.com·
AI-Generated Malware Found in the Wild
PGP, GPG, Yubikeys, Oh My!
PGP, GPG, Yubikeys, Oh My!
Cheatsheet for interacting with a postgres database inside a docker container
·joshhaines.com·
PGP, GPG, Yubikeys, Oh My!
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens
A new Federal Trade Commission staff report that examines the data collection and use practices of major social media and video streaming services shows they engaged in vast surveillance of consume
·ftc.gov·
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens
pcp: pmcd network daemon review (CVE-2024-45769), (CVE-2024-45770)
pcp: pmcd network daemon review (CVE-2024-45769), (CVE-2024-45770)
Performance Co-Pilot (PCP) is a system for collecting system performance data and sharing it over the network. We performed a review of its main networking daemon component pmcd, which resulted in the finding of two CVEs and a couple of other noticeable aspects.
·security.opensuse.org·
pcp: pmcd network daemon review (CVE-2024-45769), (CVE-2024-45770)
A next frontier for spam and scams
A next frontier for spam and scams
Please be on the alert for: Spam that includes your name, address, phone number and other personal details. Phone calls that are from human-sounding bots that pretend to be from friends or trusted …
·seths.blog·
A next frontier for spam and scams
3 API Vulnerabilities Developers Accidentally Create
3 API Vulnerabilities Developers Accidentally Create
Attacking APIs is easy, if you know what to look for, according to professional API hacker Katie Paxton-Fear. She shared how she does it.
·thenewstack.io·
3 API Vulnerabilities Developers Accidentally Create
Revocation is broken
Revocation is broken
We have a little problem on the web right now and I can only see this becoming a larger concern as time goes by. More and more sites are obtaining certificates, vitally important documents that we need to deploy HTTPS, but we have no way of protecting ourselves when things
·scotthelme.co.uk·
Revocation is broken
Digital Identity and Access Control
Digital Identity and Access Control
Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours.
·windley.com·
Digital Identity and Access Control
OWASP CRS Project
OWASP CRS Project
The 1st Line Of Defense
·coreruleset.org·
OWASP CRS Project
Browser Bot Detection
Browser Bot Detection
What is Fingerprint Browser Bot Detection? Fingerprint Browser Bot Detection is a Smart Signal that detects automated activity on your website. It analyses a variety of browser attributes and gives you a bot detection signal with one of three values: Good bot - usually a bot that belongs to a well-k...
·dev.fingerprint.com·
Browser Bot Detection