Blog
Category
Archive
About
Subscribe
Category
Security (57)
●
Security (57)
Cyberattacks as acts of war
Large-scale social engineering
COVID19 Contact Tracing
Azure Lets Encrypt - DashboardConnectionString field is required
Compromising Compilers
Finding WannaCrypt's kill switch.
Subresource Integrity–Safely Consume Remote Resources
Encouraging HTTPS Adoption
Yahoo breach
Hacked under the cover of jQuery
SHA-1: If One Fails All Fails
Encryption should protect everybody from everybody
Windows Hello Tip–Improve Recognition
Cryptography as Natural Law
Setting up a Windows tablet for a child
Mobile proximity payments
PowerPoint found a problem
Redefining ownership in the digital age
OpenSSL Heartbleed Vulnerability
Why Not Android?
Data Breaches Target You
Data Capture Accusations
Privacy, Cloud Services and the Law
Encryption, Hashes and Broken Things
Adobe Security Breach
Threat Modeling Tool
DRM by Any Other Name
Ten Immutable Laws Of Security
OWASP 2013
The Dying Art of Computer Viruses
Basic Authentication using WebRequest
How to stop your Twitter account from sending spam
OWASP for the .NET Developer
Encrypting Configuration Files
Microsoft Security Essentials
Why Should I Trust TrueSwitch
What about Video delivery
FriendFeed – Another authentication tale!
How OAuth helps us all!
Why do you need my password?
SMS for Banking
Spam in a can!
Social Networks - Who do you trust?
Defensive Security Coding for ASP.NET
Unknown Publishers - Should Developers really take the time!
Windows Principal and Principal Permission
Phishing Mistakes
Windows Rights Management Client
The Security Questions to avoid!
Rescuing a friend!
The cost of Music and DRM
OpenID - Digital Identity
Securing XML Web Services
Protecting Personal Identity
Raising the low hanging fruit!
Sony Root Kit resolution
Somebody is always watching
© 2024 - Mark Downie, All Rights Reserved.
Powered by Dasblog-Core commit
7da8cd