Hot in Security Other:
HOT IN Security Other THIS WEEK!
HOT IN Security Other THIS MONTH!
False security: Dashy’s client-side authentication.
Update 3/28: The devs have announced that the auth system is to be deprecated. See d...
New
Job flexibility and security were linked to significantly less psychological distress and anxiety.
New
Discover what industry experts think the events of Q1 mean for the business cyber security landscape in the UK.
New
Haskell Security Response Team - 2024 January–March report.
The Haskell Security Response Team (SRT) is a volunteer organisation within ...
New
HOT IN Security Other THIS YEAR!
Apple has just released the first Rapid Security Response for Ventura.
Apple has just released the first of its new Rapid Security Respo...
New
Sun Tzu wouldn’t like the cybersecurity industry.
Sun Tzu quotes are beloved to the point of overuse in cybersecurity. Here’s why the le...
New
Blog - Advancing iMessage security: iMessage Contact Key Verification - Apple Security Research.
iMessage broke new ground in 2011 as th...
New
Apple loses copyright battle against security start-up Corellium.
Apple lost its copyright lawsuit against Corellium, a small security r...
New
Joseph Sullivan was convicted over covering up a security breach of 57 million user accounts in 2016.
New
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing.
New
US and its allies struggle to copy Kyiv’s collaborative efforts.
New
Senators issued satellite phones, offered demonstrations on upgraded security devices.
Senate Sergeant at Arms Karen Gibson said the pho...
New
Is macOS’s new XProtect behavioural security preparing to go live?.
Apple released its first update to its new behavioural security prot...
New
Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users .
The U.K. Parliament has passed the Online ...
New
Apple’s new iPhone security setting keeps thieves out of your digital accounts.
iPhone PINs won’t be enough to steal your iCloud account...
New
Home.
A security layer for Git repositories.
New
Despite a rise in cyberattacks and breaches, the cybersecurity industry is by no means exempt from the uncertainty inspired by the curren...
New
Consider Security First.
I write this in the context of my decision to ditch Raspberry Pi OS and move everything I possibly can, includi...
New
Disagreement over security disclosures and bug-fixing priorities led to split.
New
HOT IN Security Other THE LAST THREE YEARS!
Raspberry Pi security alarm — the basics.
In November last year — I started building a DIY security alarm system, using a Raspberry Pi a...
New
We engineered a wearable microphone jammer that is capable of disabling microphones in its user’s surroundings, including hidden micropho...
New
Process injection: breaking all macOS security layers with a single vulnerability.
If you have created a new macOS app with Xcode 13.2, ...
New
Millions of British people are using their pet’s name as their online password, despite it being an easy target for hackers, a survey has...
New
I had written an article about container sand-boxing.
Please give comments or feedback, thanks!
Sandboxing containers
New
Hands-on with PostgreSQL Authorization - Part 2 - Row-Level Security.
For any application or website where users authenticate and can se...
New
U.S. chipmaker Nvidia has confirmed that it’s investigating a cyber incident that has reportedly downed the company’s developer tools and...
New
Container security best practices: Ultimate guide - Sysdig.
Container security best practices include the full component stack used for ...
New
Public Report – WhatsApp End-to-End Encrypted Backups Security Assessment.
During the summer of 2021, WhatsApp engaged NCC Group’s Crypt...
New
About the security content of iOS 15.2.1 and iPadOS 15.2.1.
This document describes the security content of iOS 15.2.1 and iPadOS 15.2.1...
New
About Apple threat notifications and protecting against state-sponsored attacks.
Apple threat notifications are designed to inform and a...
New
Let’s say you’re a large company that has just shipped an employee a brand-new replacement laptop. And let’s say it comes preconfigured t...
New
A little less than a year ago, I wrote a now-popular post about how I over-engineered my home network for privacy and security. If you ha...
New
The encrypted app will refuse to comply with the Online Safety Bill if required to scan messages.
New
Contents (published version, 1st Edition: 25 Sep 2019) → 2nd Edition is further below
Frontmatter (Table of Contents; Foreword by Peter...
New
Security
Classification:
Topic
Forum Category:
General
Threads:
169
"Our portal about all things security related."
- Follow
- Join
- Shape
the conversation
Latest Security Jobs
Featured Security Book
Latest Security Learning Resources
Sanitizing HTML with HtmlSanitizeEx - ElixirCasts
Backend Learning ResourcesMaking Sense of Cybersecurity (Manning)
Backend Learning ResourcesCyber Security Career Guide (Manning)
Backend Learning ResourcesSecure Your Node.js Web Application (PragProg)
General Learning ResourcesPractical Security (PragProg)
General Learning ResourcesSecurity Events (WIP)
Get money off!
The Pragmatic Bookshelf
35% off any eBook
Manning Publications
45% off any item
The Pragmatic Studio
20% off any course
Simply use coupon code "devtalk.com" at checkout. Where applicable this coupon can be used for an many items and as many times as you like!
Filter by Type:
My Saved Portals
-
None saved yet