public marks

PUBLIC MARKS with tag security

January 2018

December 2017

sonarwhal

by dzc
a linting tool for the web: accessibility, speed, security, and more (best practices and common errors)

October 2017

September 2017

August 2017

July 2017

May 2017

Let them paste passwords - NCSC Site

by Spone
We think that stopping password pasting (or SPP) is a bad thing that reduces security. We think customers should be allowed to paste their passwords into forms, and that it improves security.

Things to Use Instead of JWT | Kevin Burke

by Spone
You might have heard that you shouldn't be using JWT. That advice is correct - you really shouldn't use it. In general, specifications that allow the attacker to choose the algorithm for negotiation have more problems than ones that don't (see TLS). N libraries need to implement M different encryption and decryption algorithms, and an attacker only needs to find a vulnerability in one of them, or a vulnerability in their combination. JWT has seen both of these errors; unlike TLS, it hasn't already been deployed onto billions of devices around the world.

April 2017

VersionEye - Notification System for Software Packages

by dzc
notifies you about security vulnerabilities, license violations and out-dated dependencies in your Git repositories. Free : 1 private and 4 Open Source Projects

March 2017

Privacy Tools

by wabaus & 2 others
Tools for privacy on devices & across the Internet.

February 2017

January 2017

ZeroDisclo.com by YesWeHack ! The Right Path to Responsible Disclosure

by srcmax
In constant contact with its community of security researchers, YesWeHack can testify that it is complex for a security researcher and therefore, for a whistleblower to report security flaws -in a responsible way- to impacted organisations. Especially, if those organisations do not have a Bounty Bounty program registered on BountyFactory.io

December 2016

Parrot Security OS 3.3

by alamat & 1 other (via)
Palinuro has announced the release of Parrot Security OS 3.3, a new release of the project’s Debian-based, specialist distribution with a collection of utilities designed for penetration testing, computer forensics, reverse engineering, hacking, privacy and cryptography:

5 Ways to Secure Your Browser

by alamat & 1 other (via)
What’s the one piece of software you use more than anything else, day in and day out? For most people, the answer is easy: their web browser.

November 2016

Brace Yourself for Kaspersky’s “Hack-proof” Operating System

by alamat & 1 other (via)
Kaspersky is a security software developer and cyber security firm that is trusted by people globally. So, when the company states that it has created a hack-proof operating system, users are bound to feel overjoyed.

The WordPress megahack that wasn’t

by alamat & 1 other (via)
Since 2013, WordPress has been updating itself, which is a good thing.

Siber İstihbarat Tanımı ve Faaliyet Alanı

by hothot
Siber İstihbarat; hedef ülkenin siber uzaydaki altyapısını teşkil eden cihazlar, kablolar, enerji üreticileri, internet servis sağlayıcıları, sunucular vb. ile siber saldırı, siber istihbarat faaliyetlerinde bulunacak ya da siber savunma yapacak olan teknokratların, görevlilerin nitelik ve nicelik gibi özellikleri hakkında bilgi elde edilmesi ve değerlendirilmesidir.

PUBLIC TAGS related to tag security

apache +   apple +   article +   authentication +   best practices +   browser +   chat +   cookies +   crypto +   docker +   firefox +   firewall +   google +   hacking +   hashing +   html +   html5 +   http +   https +   id +   internet +   javascript +   knockd +   laptop +   linux +   oAuth +   online +   password +   passwords +   php +   plugin +   privacy +   scanner +   secu +   server +   sécurité +   software +   spam +   ssl +   technology +   tls +   tool +   tools +   tracking +   tutorial +   vulnerability +   web +   wifi +   wordpress +   xss +