Hot in Security Other:
HOT IN Security Other THIS WEEK!
Coder wrote a bug so bad security guards wanted a word.
Working for a startup is supposed to end with getting rich overnight, but not li...
New
HOT IN Security Other THIS MONTH!
65% Of Employees Bypass Cybersecurity Measures, New Study Finds.
More than half of workers surveyed say they’ve shared confidential data...
New
GitHub - skerkour/black-hat-rust: Applied offensive security with Rust - https://kerkour.com/black-hat-rust.
Applied offensive security...
New
HOT IN Security Other THIS YEAR!
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing.
New
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog.
Discover how Hardware Security Modules (HSMs) provide robust ...
New
Despite a rise in cyberattacks and breaches, the cybersecurity industry is by no means exempt from the uncertainty inspired by the curren...
New
Consider Security First.
I write this in the context of my decision to ditch Raspberry Pi OS and move everything I possibly can, includi...
New
Disagreement over security disclosures and bug-fixing priorities led to split.
New
Microsoft CEO Satya Nadella is now personally responsible for security flaws.
New
False security: Dashy’s client-side authentication.
Update 3/28: The devs have announced that the auth system is to be deprecated. See d...
New
Hello.
I am totally green, if we talk about hardware.
Could anybody recommend to me, how I could get into this knowledge?
My main goal...
New
Discover what industry experts think the events of Q1 mean for the business cyber security landscape in the UK.
New
Job flexibility and security were linked to significantly less psychological distress and anxiety.
New
On the new Dutch Intelligence and Security Law - Bert Hubert’s writings.
“The Netherlands hosts some of the world’s largest internet exc...
New
Haskell Security Response Team - 2024 January–March report.
The Haskell Security Response Team (SRT) is a volunteer organisation within ...
New
A recent security incident involving Dropbox Sign - Dropbox Sign.
Information on a security incident involving Dropbox Sign.
New
At Microsoft, years of security debt come crashing down.
Critics say negligence, misguided investments and hubris have left the enterpri...
New
Decoding US Government Plans to Shift the Software Security Burden.
US government officials discussed plans on how to incentivize securi...
New
HOT IN Security Other THE LAST THREE YEARS!
Raspberry Pi security alarm — the basics.
In November last year — I started building a DIY security alarm system, using a Raspberry Pi a...
New
Process injection: breaking all macOS security layers with a single vulnerability.
If you have created a new macOS app with Xcode 13.2, ...
New
I had written an article about container sand-boxing.
Please give comments or feedback, thanks!
Sandboxing containers
New
Hands-on with PostgreSQL Authorization - Part 2 - Row-Level Security.
For any application or website where users authenticate and can se...
New
U.S. chipmaker Nvidia has confirmed that it’s investigating a cyber incident that has reportedly downed the company’s developer tools and...
New
About the security content of iOS 15.2.1 and iPadOS 15.2.1.
This document describes the security content of iOS 15.2.1 and iPadOS 15.2.1...
New
The encrypted app will refuse to comply with the Online Safety Bill if required to scan messages.
New
Users of some models of iPhone, iPad and Mac are being urged to run “important” security update.
New
Objective-See: Tools.
Free, open-source tools to protect your Mac
New
SOK: On the Analysis of Web Browser Security.
Web browsers are integral parts of everyone’s daily life. They are commonly
used for secu...
New
Featuring the Solarium Commission, Carnegie Mellon, and a Singapore conference.
New
Git security vulnerability announced | The GitHub Blog.
Upgrade your local installation of Git, especially if you are using Git for Wind...
New
Open Cybersecurity Schema Framework.
Open Cybersecurity Schema Framework has 4 repositories available. Follow their code on GitHub.
New
Like many pieces of technology, the Web is one of those things that people are perfectly happy to use but have absolutely no idea how it ...
New
About the security content of iOS 16.2 and iPadOS 16.2.
This document describes the security content of iOS 16.2 and iPadOS 16.2.
New
HOT IN Security Other THIS Over 3 Years!
2020 has seen a significant uptick in the number of companies looking at adding Digital Wallets and tokenization to their offerings. On o...
New
Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020.
https://www.techrepublic.co...
New
We engineered a wearable microphone jammer that is capable of disabling microphones in its user’s surroundings, including hidden micropho...
New
As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at McAfee Advanced Threa...
New
The new Quantum Internet:
This will be a parallel internet to the one we use today with the goal of making virtually impossible to eye...
New
Our Solo v2 launch is official!.
Our Kickstarter campaign for our next generation of Solo products launches on January 26th. To > ge...
New
Millions of British people are using their pet’s name as their online password, despite it being an easy target for hackers, a survey has...
New
It’s been nearly 10 years since Arm had first announced the Armv8 architecture in October 2011, and it’s been a quite eventful decade of ...
New
New
Welcome.
This is a maintained technical guide that aims to provide introduction to various online tracking techniques, online id verific...
New
Container security best practices: Ultimate guide - Sysdig.
Container security best practices include the full component stack used for ...
New
Last summer, 580 cybersecurity researchers spent 13,000 hours trying to break into a new kind of processor. They all failed.
The hack at...
New
Engineers at Cloudflare and Apple say they’ve developed a new internet protocol that will shore up one of the biggest holes in internet ...
New
In an effort to make IT pros’ jobs easier, Jack Wallen offers cybersecurity tips to end users–in particular, what not to do to keep compa...
New
Public Report – WhatsApp End-to-End Encrypted Backups Security Assessment.
During the summer of 2021, WhatsApp engaged NCC Group’s Crypt...
New
Security
Classification:
Topic
Forum Category:
General
Threads:
195
"Our portal about all things security related."
- Follow
- Join
- Shape
the conversation
Latest Security Jobs
Featured Security Book
Latest Security Learning Resources
Sanitizing HTML with HtmlSanitizeEx - ElixirCasts
Backend Learning ResourcesMaking Sense of Cybersecurity (Manning)
Backend Learning ResourcesCyber Security Career Guide (Manning)
Backend Learning ResourcesSecure Your Node.js Web Application (PragProg)
General Learning ResourcesPractical Security (PragProg)
General Learning ResourcesSecurity Events (WIP)
Get money off!
The Pragmatic Bookshelf
35% off any eBook
Manning Publications
45% off any item
The Pragmatic Studio
20% off any course
Simply use coupon code "devtalk.com" at checkout. Where applicable this coupon can be used for an many items and as many times as you like!
Filter by Type:
My Saved Portals
-
None saved yet