Security

Security

The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Oct
23
Understanding Digital Signatures: More Than Just a Hash

Understanding Digital Signatures: More Than Just a Hash

Digital signatures are a cornerstone of modern security practices, ensuring data integrity and authentication in various online communications. But there&
6 min read
Sep
01
Unlocking Your Tech Success - 5 Essential Lessons

Unlocking Your Tech Success - 5 Essential Lessons

Ever wondered what it takes to thrive in the tech world, not just as a coder but as a tech-savvy
2 min read
May
31
Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation

Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation

HawkAuth protocol is widely adopted by Firefox Accounts and appears in Postman in a very short list of supported API
9 min read
Aug
01

Certificate Pinning is powerful, but you probably shouldn't use it

Let's be clear about Certificate Pinning. It IS extremely useful. It IS valid, if you follow 1 rule,
1 min read
Jun
25

You should have a preference for EV Certificates in 2022 - when most think they are dead

Domain Validated (DV) Certificates may be growing in popularity since the browsers ceased showing the organisation name along with a
3 min read
Oct
04

Zero-trust doesn't exist but that's OK

Where zero-trust might exist 1. Scenarios that have no data 2. Scenarios with data that are never connected to power
7 min read
Aug
01

You don't know OWASP

About a year ago I was just getting involved with the CSA Working Group [https://cloudsecurityalliance.org/research/contribute/] for
5 min read
Jun
17

Private AWS S3 - How hard could that be?

Applying private routing to AWS management APIs is hard. AWS S3 has had some poor press coverage, but to Amazon's credit it has always been subject to authentication by default and not leaked any customer data.
6 min read
Jun
13

You're probably a Blue Team, not a Red Team

For those unfamiliar with Cybersecurity team colors, there are Blue Teams which are the defenders, and there are Red Teams
5 min read
Jun
07

Everything in AWS is an API, is it secure?

EDIT: 2020-08-01 SHA-1 Windows content to be retired [https://techcommunity.microsoft.com/t5/windows-it-pro-blog/sha-1-windows-content-to-be-retired-august-3-2020/ba-p/1544373] in 2 days.
20 min read