Also a good reminder of why the fact that it's proprietary makes things harder security wise.
Interesting forensic of a device left around to spy a network.
Indeed, don't use this by default. This is likely overkill and has terrible side effects. Look up for the alternatives proposed in this article first.
Always amazed when such important routing systems are reached through very insecure means.
Good reminder of why fingerprint readers are really a poor security device.
Now this one is really nasty...
Fascinating attack vector. It was just a matter of time I guess, the more you use blurry frontiers (be it between OSes or other important domains) the more opportunities for exploits show up.
Pile up enough complexity and it'll quickly become insecure.
Interesting exploration and rough explanation of why SAML has so many issues. Complexity by design in such critical components is a bad idea...
Another couple of attempts at supply chain attacks. This time in the Python ecosystem. The skill level of those attempts isn't high though.
This ecosystem keeps baffling me... How come there are so little checks on what can get published or how the command line process parameters.
Good reminder of why if you got mobile devices which are outside of a secured office (like most companies nowadays) you should never underestimate the Evil-Maid scenario...
Seeing the bad practices of Amazon with its Android AppStore, it really feels like another supply chain mess in the making with Windows 11 Android support...
Looks like a very interesting tool, in particular for security purposes.
OK, now that's a funny consequence of how authorities behave which are taken into account by criminals.
Oops... security flaws ready to exploited in Wi-Fi again. And that includes WPA3.
Nice summary of several security headers you can have to deal with for HTTP.
A way to common mistake which can blow the security of your service
Or why you can't really trust SMS for 2FA... it's just too much of a wild west there.
Yes, the permission model of GitHub gives me the creeps as well... A couple of the examples given in there are really problematic and need to be addressed. This is even more important seeing the amount of stuff hosted on GitHub nowadays.