Posts about infosec
Security related posts. In some cases, a gross misuse of the term as this tag is used for network and app security as well as information security. See also Security.
- Using BlueSky Features As Disinformation Tools
- Banks: Stop relying on SMS based 2FA
- Misusing Microsoft Defender For Domain Blocking Bypass Shenanigans
- Creating A Log-Analysis System To Autodetect and Announce Mastodon Scraper Bot Activity
- Examining The Behaviour of a Self Authenticating Mastodon Scraper
- Tightening Controls over Public Activity Feeds on Mastodon
- Implementing Geo-Blocking with OpenResty and LUA
- Analysing Clearnet, Tor and I2P WAF Exceptions using InfluxDB IOx
- OSINTing the OS-INTers and The Dangers of Meta-Data
- Barclays Online Banking gives 3rd Parties access to login pages
- Cynet 360 Uses Insecure Control Channels
- Spamhaus still parties like it's 1999
- Twitter Screws Up With Data It Shouldn't Hold
- The Curious Case of BitFi and Secret Persistence
- A guide to designing Account Security Mechanisms
- Don't Use Web2Tor / Tor2Web (especially Onion.cab)
- The State of Mobile Banking (in the UK)
- The DVLA is routinely sending sensitive details via email
- Understanding the Difficulty of Assessing True Randomness
- Vulnerability: Infiltrating a network via Powerline (HomePlugAV) adapters
- Understanding Password Storage
- My Own Little HeartBleed Headache
- Why You Shouldn't be using SHA1 or MD5 to Store Passwords
- Checking for Outdated Joomla Extensions on your server
- Darkleech Apache attacks on the rise, but is it really that hard to detect?
- What is js.Runfore?
- Who's auditing the auditors? (it should be you)
- The Importance of Salting Stored Passwords And How To Do So Correctly
- Security Flaw in the Computrend Powergrid 902 Adaptor
- Building Network Resilience Through Sensible Reporting Policies
- A User's Guide to Data Security and Control
- Educating Our Way to Security
- Whitepaper: Attack of the Clones - Is Homogeneity in a network environment safe?
- Analysis of a Compromised GMail Account
- Howto Encrypt Your Removeable Media on Linux
- A Developers Guide to Storage and Manipulation of Passwords
- The Importance of Changing Default Passwords
- Best Practice For Network Security in Small and Medium Sized Business
- Storage and Manipulation of Passwords: A Developers Guide
- Republished: Tips for fighting password theft
- Republished: Hacking the Computrend Powergrid 902 Powerline Adaptor
- Republished: UK government wants to put our networks at risk