Web 3.0 Requires Data Integrity

If you’ve ever taken a computer security class, you’ve probably learned about the three legs of computer security—confidentiality, integrity, and availability—known as the CIA triad. When we talk about a system being secure, that’s ...
bot, Management of Good Bots is Crucial

The Unseen Battle: How Bots and Automation Threaten the Web 

| | Bots, traffic, web
New research from F5 Labs examined over 200 billion web and API traffic requests from businesses with bot controls in place ...
Security Boulevard
vulnerability ADA bots standing Boa Web3 NIST supply chain digital data

Web Vulnerability Submissions Exploded in 2023

There was an alarming surge of user-submitted web vulnerability submissions in 2023—with a 30% increase compared to 2022—as open-scoped bug bounty programs evolved ...
Security Boulevard
Calling Home, Get Your Callbacks Through RBI

Calling Home, Get Your Callbacks Through RBI

Authored By: Lance B. Cain and Alexander DeMineOverviewRemote Browser Isolation (RBI) is a security technology which has been gaining popularity for large businesses securing their enterprise networks in recent years. This blog ...
Infoblox certificates Datadog Web3 DNSSEC OPSWAT web application security

DNSSEC: The Secret Weapon Against DNS Attacks 

The domain name system (DNS) is known as the phone book of the internet, quickly connecting users from their devices to their desired content. But what appears to most users as seamless ...
Security Boulevard
The Exploitations of Password Managers, Web Tracker Edition

The Exploitations of Password Managers, Web Tracker Edition

via Martin Brinkmann writing at his eponymous blog: gHacks Technology News, tells the tale of Password Manager Exploitation by nefarious-minded Web Trackers. Certainly Wednesday's MustRead, yes? 'Research from Princeton's Center for Information ...

20 Critical Security Controls: Control 7 – Email and Web Browser Protections

Today, I will be going over Control 7 from version 7 of the CIS top 20 Critical Security Controls – Email and Web Browser Protections. I will go through the 10 requirements ...
  via  the comic content delivery system known as   Randal Munroe  at !

XKCD, Conversational Dynamics

| | Sarcasm, satire, web, XKCD
via the comic content delivery system known as Randal Munroe at ! Permalink ...
Tech support scam alarms Chrome users

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little ...
Solving the Security B-Sides London 2012 Web Hacking Challenge

Solving the Security B-Sides London 2012 Web Hacking Challenge

This year (2012) I wrote a web hacking challenge for BSides London. Rather than write a lengthy blog post about how to solve it (when others have already covered it), I thought ...