Homepage
About membership
Sign in
Get started
Homepage
Home
Technology
Culture
Entrepreneurship
Creativity
Self
Politics
Media
Productivity
Design
Popular
More
Cybersecurity
Towards a more perfect password.
Follow
Following
Related topics
Programming
,
Technology
,
Equality
For you
Dealing with “Security Nihilists”
Tell me.
Tony Robinson
Dec 8
Stopping fraudsters by changing products
Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as…
Sam King
Dec 14
Audio available
Sleep Walking into a War: Part 3
Nothing Is Real Anymore
Tobias Stone
Dec 4
The Story Behind “anyone can login as root” Tweet
After my tweet about the security issue of MacOS High Sierra on Nov 28, I got many reactions like a blast. I think I need to express myself…
Lemi Orhan Ergin
Nov 29
In case you missed it
I used to track cell phone location information for prosecutors.
Tomorrow morning, the Supreme Court is hearing arguments in Carpenter v. United States, a case that asks whether the Constitution protects…
Laura M. Moy
Nov 28
Member preview
Ubergate Post Mortem: Will We Ever Learn?
By Matt Kimball, Moor Insights and Strategy
Forbes
Dec 8
Member preview
Dozens of companies are tracking you via your Android phone
It’s probably happening on iPhones, too.
Dallin Crump
Nov 30
Use a .dev domain? Not anymore.
For years, programmers used .dev domains for testing their code. Those days are over.
Daryl Koopersmith
Nov 28
Audio available
Sleep Walking into a War: Part 4
What Victory Looks Like
Tobias Stone
Dec 5
Identity Theft, Is This Really You?
The fluidity with which we treat our personal information is surprisingly underestimated. The ease with which we share information with…
Linet Kwamboka
Dec 1
Privacy stripped away, one email at a time
As the European Union General Data Protection Regulations (GDPR) looms, a privacy stripping email setting continues in widespread use…
Chris Kubecka
Dec 1
How I’ve captured all passwords trying to ssh into my server!
By default ssh logs out ssh attempts , wether they’re successful or not , what it doesn’t do by default is log out the passwords they’ve…
Short Tech Stories
Dec 3
Dive deeper with these tags
Hacking
,
Infosec
,
Privacy
Phuck Phishing & Be Secure While Using MyEtherWallet
It’s been increasingly becoming important to be aware of internet attacks who’s looking constantly to steal your digital assets. Following…
Vamshi Vangapally
Dec 1
#PutinAtWar: New Russian Anti-Ballistic Missile
A brief look into Russia’s newly introduced PRS-1M interceptor missile
@DFRLab
Dec 1
Developer VS The Great Firewall of China
Working as a developer while traveling is amazing. Unfortunately, the Great Firewall of China can make things tricky.
Sam Williams
Nov 11
iOS Biometric Local Authentication using Swift
Security is playing very crucial role in mobile domain for the last couple of years. Many platforms are allowing device owners to verify…
Santosh Botre
Sep 13
Audio available
Sleep Walking into a War: Part 2
Votes: The Heart of Our Democracies
Tobias Stone
Dec 1
How I hacked Google’s bug tracking system itself for $15,600 in bounties
Easy Bugs for Hard Cash
Alex Birsan
Oct 30
Why Hackers Love Cryptocurrency Miner Coinhive
Cryptocurrency miner Coinhive is becoming a hacking tool for cybercriminals, according to security researchers.
PCMag
Nov 30
Hell hath no fury like a sysadmin scorned: 5 cautionary tales
Some recent stories have underlined the importance of treating your sysadmins well — and revoking their privileges when they leave.
Security Response
Nov 30
Member preview
Your passwords are at risk! Why SSL is not enough and how to solve it.
When we talk about passwords this topic ends up always with people that are concerned about their privacy, even if they’re non…
Tobias Gurtzick
Nov 29
Audio available
Sleep Walking into a War
The Great Cyber War: Part 1
Tobias Stone
Nov 30
Member preview
Supreme Court Hears Arguments About Cellphone Location Tracking in Landmark Privacy Case
The Intercept
Nov 29
Member preview
Staggering Variety of Clandestine Trackers Found In Popular Android Apps
The Intercept
Nov 24
Common Security Issues in Web Applications. Part 1
Yo Yo chaps.
Narek Harutyunyan
Nov 24