Hot in Security Other:

HOT IN Security Other THIS WEEK! Top

CommunityNews
I believe this topic is not really well discussed online – and often with multiple misunderstandings. There seems to be this general beli...
New

HOT IN Security Other THIS MONTH! Top

HOT IN Security Other THIS YEAR! Top

First poster: apsori
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing.
New
CommunityNews
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog. Discover how Hardware Security Modules (HSMs) provide robust ...
New
New
First poster: brennan
Open source maintainers underpaid and going gray. AI-coded contributions? Most would rather skip the bot’s work
New
CommunityNews
A recent security incident involving Dropbox Sign - Dropbox Sign. Information on a security incident involving Dropbox Sign.
New
CommunityNews
At Microsoft, years of security debt come crashing down. Critics say negligence, misguided investments and hubris have left the enterpri...
New
CommunityNews
Decoding US Government Plans to Shift the Software Security Burden. US government officials discussed plans on how to incentivize securi...
New
CommunityNews
GitHub - orhun/flawz: A Terminal UI for browsing security vulnerabilities (CVEs). A Terminal UI for browsing security vulnerabilities (C...
New
New
CommunityNews
Chair: Addressing BGP flaws will “help make our Internet routing more secure.”
New
First poster: akinihsan
GitHub - TzuHuanTai/RaspberryPi_WebRTC: Native WebRTC uses v4l2 hardware h264 and software openh264 encoder for live streaming on Raspber...
New
CommunityNews
65% Of Employees Bypass Cybersecurity Measures, New Study Finds. More than half of workers surveyed say they’ve shared confidential data...
New
CommunityNews
New Zealand Company’s ‘Impossible-to-Hack’ Security Turns Out to Be No Security at All. Teammate App had a publicly exposed database and...
New
New
CommunityNews
GitHub - skerkour/black-hat-rust: Applied offensive security with Rust - https://kerkour.com/black-hat-rust. Applied offensive security...
New

HOT IN Security Other THE LAST THREE YEARS! Top

First poster: bot
Raspberry Pi security alarm — the basics. In November last year — I started building a DIY security alarm system, using a Raspberry Pi a...
New
First poster: bot
Process injection: breaking all macOS security layers with a single vulnerability. If you have created a new macOS app with Xcode 13.2, ...
New
First poster: bot
The encrypted app will refuse to comply with the Online Safety Bill if required to scan messages.
New
First poster: bot
Users of some models of iPhone, iPad and Mac are being urged to run “important” security update.
New
New
First poster: bot
Featuring the Solarium Commission, Carnegie Mellon, and a Singapore conference.
New
First poster: bot
Open Cybersecurity Schema Framework. Open Cybersecurity Schema Framework has 4 repositories available. Follow their code on GitHub.
New
First poster: bot
About the security content of iOS 16.2 and iPadOS 16.2. This document describes the security content of iOS 16.2 and iPadOS 16.2.
New
First poster: bot
Security Principles: Addressing underlying causes of risk in complex systems. On December 14th, 2022, in collaboration with technologist...
New
First poster: bot
Demystifying Security Research - Part 1. There are a number of key questions which are always asked by people wanting to get into securi...
New
First poster: bot
The tech giant’s boss says he’d rather see the app blocked than weaken encryption under proposed laws.
New
First poster: bot
Home · Wiki · Kali Linux / kali-purple / Documentation · GitLab. The ultimate SOC-in-a-box community project
New
First poster: bot
You can’t solve AI security problems with more AI. One of the most common proposed solutions to prompt injection attacks (where an AI la...
New
CommunityNews
Blog - Advancing iMessage security: iMessage Contact Key Verification - Apple Security Research. iMessage broke new ground in 2011 as th...
New
First poster: bot
Apple’s macOS Ventura | 7 New Security Changes to Be Aware Of. With macOS 13, Apple have made some bold and potentially disruptive chang...
New

HOT IN Security Other THIS Over 3 Years! Top

ErlangSolutions
2020 has seen a significant uptick in the number of companies looking at adding Digital Wallets and tokenization to their offerings. On o...
New
First poster: bot
Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020. https://www.techrepublic.co...
New
First poster: AstonJ
We engineered a wearable microphone jammer that is capable of disabling microphones in its user’s surroundings, including hidden micropho...
New
Exadra37
As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at McAfee Advanced Threa...
New
Exadra37
The new Quantum Internet: This will be a parallel internet to the one we use today with the goal of making virtually impossible to eye...
New
First poster: bot
Our Solo v2 launch is official!. Our Kickstarter campaign for our next generation of Solo products launches on January 26th. To > ge...
New
First poster: AstonJ
Millions of British people are using their pet’s name as their online password, despite it being an easy target for hackers, a survey has...
New
First poster: bot
It’s been nearly 10 years since Arm had first announced the Armv8 architecture in October 2011, and it’s been a quite eventful decade of ...
New
KnowledgeIsPower
I had written an article about container sand-boxing. Please give comments or feedback, thanks! Sandboxing containers
New
New
First poster: bot
Hands-on with PostgreSQL Authorization - Part 2 - Row-Level Security. For any application or website where users authenticate and can se...
New
First poster: bot
U.S. chipmaker Nvidia has confirmed that it’s investigating a cyber incident that has reportedly downed the company’s developer tools and...
New
First poster: bot
Welcome. This is a maintained technical guide that aims to provide introduction to various online tracking techniques, online id verific...
New
CommunityNews
Container security best practices: Ultimate guide - Sysdig. Container security best practices include the full component stack used for ...
New
First poster: bot
Last summer, 580 cybersecurity researchers spent 13,000 hours trying to break into a new kind of processor. They all failed. The hack at...
New

Security

Classification: Topic
Forum Category: General
Threads: 208
Posts: 238

"Our portal about all things security related."

  • Follow
  • Join
  • Shape
the conversation

Portal Stewards

Latest Security Jobs

Featured Security Book

Practical Security (PragProg)

Latest Security Learning Resources

Making Sense of Cybersecurity (Manning)
Backend Learning Resources
Cyber Security Career Guide (Manning)
Backend Learning Resources
Practical Security (PragProg)
General Learning Resources

Security Events (WIP)

64 days remaining
Expo Vegas
Las Vegas June 13, 2020
183 days remaining
Developer Conference 2020
Rio de Janeiro October 15, 2020
289 days remaining
BigMeet 2021
Chicago Feb 25, 2021

My Saved Portals

    None saved yet

Top Sub Portals

    None added yet

Similar Portals

Get money off!

The Pragmatic Bookshelf

35% off any eBook

The Pragmatic Studio

20% off any course

Simply use coupon code "devtalk.com" at checkout. Where applicable this coupon can be used for an many items and as many times as you like!

My Saved Portals

    None saved yet

Top Sub Portals

    None added yet

Similar Portals