Mostrar mensagens com a etiqueta Security. Mostrar todas as mensagens
Mostrar mensagens com a etiqueta Security. Mostrar todas as mensagens

quarta-feira, 24 de abril de 2019

And the top pawned passwords are...

https://www.ncsc.gov.uk/blog-post/passwords-passwords-everywhere

Quoting:
"Today, in collaboration with Troy Hunt, we're releasing a file containing the top 100,000 passwords from his Have I Been Pwned data set. If you see a password that you use in this list you should change it immediately. This blog explains why you should do this, and answers some common questions about password blacklists.

(If you just want to download the file, you can do so here: PwnedPasswordTop100k.txt)."

segunda-feira, 14 de agosto de 2017

Security: Infected DNA?

Well, sort of. It's DNA who tries to exploit a known security flaw in DNA processing software:
https://www.theverge.com/2017/8/11/16130568/scientists-infiltrate-computer-malware-code-dna

sexta-feira, 20 de janeiro de 2017

terça-feira, 12 de julho de 2016

segunda-feira, 27 de julho de 2015

How do Security Experts Behave?

How do Security Experts Behave? You'll never know. After the Ashley Madison’s web site attack, this article seems to give us a few basic reminders and security warnings:

Seven things security experts do to keep safe online | Guardian:
http://www.theguardian.com/technology/2015/jul/27/security-experts-keep-safe-online-password-manager-seven-things 

domingo, 4 de janeiro de 2015

Worried about privacy?

Worried about privacy? If you're not then you should. It's not about what we share about ourselves (which we can control), it's about what anyone (or any governmental agency) could want to discover with more or less right to do so.

PC Mag is doing some reviews on products for the worried ones. One interesting can be found here.

quinta-feira, 18 de dezembro de 2014

LIST: Web Services Security Resources

The top 5 google search links returned me very interesting results that are must reads for anyone working with SOA/Web Services - either developing and deploying or testing. Some are from people I know very well (not the NSA ones). 

  1. https://www.nsa.gov/ia/_files/factsheets/soa_security_vulnerabilities_web.pdf (NSA classification for vulnerabilities)
  2. http://www2.informatik.uni-freiburg.de/~accorsi/papers/igi-chapter.pdf (model based security)
  3. https://eden.dei.uc.pt/~mvieira/dsn_ws.pdf
  4. http://www.infosectoday.com/Articles/webservices.pdf
  5. https://www.blackhat.com/presentations/bh-europe-07/Bhalla-Kazerooni/Whitepaper/bh-eu-07-bhalla-WP.pdf


PS: Not in any particular order.