Found 19 bookmarks
Newest
NordVPN confirms it was hacked
NordVPN confirms it was hacked
NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached. It first emerged that NordVPN had an expired internal private key exposed, potentially allowing anyone to spin out their own servers imitating NordVPN. VPN providers are […]
·techcrunch.com·
NordVPN confirms it was hacked
How to Protect Yourself From SIM Swapping Hacks
How to Protect Yourself From SIM Swapping Hacks
Here’s a guide on how to prevent and protect yourself against the threat of hackers taking over your phone number and going after your online accounts.
·motherboard.vice.com·
How to Protect Yourself From SIM Swapping Hacks
Why Mastercard Doesn't Use OAuth 2.0
Why Mastercard Doesn't Use OAuth 2.0
There are fundamental differences between OAuth 2.0 and OAuth 1.0a that Mastercard considers crucial for security OAuth 2.0 is designed for authorization only and could leave us vulnerable to account takeover / impersonation attacks OAuth 1.0a includes authentication and authorization, which our Mastercard Developers APIs need to process critically sensitive data
·developer.mastercard.com·
Why Mastercard Doesn't Use OAuth 2.0
"Stylish" browser extension steals all your internet history | Robert Heaton
"Stylish" browser extension steals all your internet history | Robert Heaton
Before it became a covert surveillance tool disguised as an outstanding browser extension, Stylish really was an outstanding browser extension. It bestowed upon its users nothing less than the power to change the appearance of the internet. Its extensive bank of user-made skins gave bright websites a dark background, undid disliked UI changes, and added manga pictures to everything that wasn’t a manga picture already. I spent many wonderful hours in its simple CSS editor, hiding the distracting parts of the web whilst unknowingly being spied on. Facebook news feed...
·robertheaton.com·
"Stylish" browser extension steals all your internet history | Robert Heaton
Web Application Penetration Testing Cheat Sheet
Web Application Penetration Testing Cheat Sheet
This cheatsheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level.
·jdow.io·
Web Application Penetration Testing Cheat Sheet
A secure web is here to stay
A secure web is here to stay
Posted by Emily Schechter, Chrome Security Product Manager For the past several years, we’ve moved toward a more secure web by strongly adv...
·security.googleblog.com·
A secure web is here to stay