the hairy IT dog

trying to make secure computing easier and more achievable

Categories
N/A
Content Types
N/A
More Information
Location|Languages
Publications
N/A

Published Content

99
searchsecurity.techtarget.com
Article
How did WhatsApp vulnerabilities get around encryption?
December, 7 2018
searchsecurity.techtarget.com
Article
How can users remove Google location tracking completely?
December, 6 2018
searchsecurity.techtarget.com
Article
How does TLS 1.3 differ from TLS 1.2?
December, 5 2018
searchsecurity.techtarget.com
Article
How do L1TF vulnerabilities compare to Spectre?
December, 4 2018
searchsecurity.techtarget.com
Article
What are the security risks of third-party app stores?
December, 4 2018
searchsecurity.techtarget.com
Article
How is Plead malware used for cyberespionage attacks?
November, 13 2018
searchsecurity.techtarget.com
Article
How to configure browsers to avoid web cache poisoning
November, 12 2018
searchsecurity.techtarget.com
Article
What is behind the growing trend of BEC attacks?
November, 8 2018
searchsecurity.techtarget.com
Article
How does site isolation defend against Spectre vulnerabilities?
November, 7 2018
searchsecurity.techtarget.com
Article
How does the public Venmo API pose a threat for users?
November, 6 2018
searchsecurity.techtarget.com
Article
How can U2F authentication end phishing attacks?
November, 5 2018
searchsecurity.techtarget.com
Article
The implications of the NetSpectre vulnerability
October, 18 2018
searchsecurity.techtarget.com
Article
How does Apple's Quick Look endanger user privacy?
October, 12 2018
searchsecurity.techtarget.com
Article
How did Netflix phishing attacks use legitimate TLS certificates?
October, 11 2018
searchsecurity.techtarget.com
Article
What does the expansion of MANRS mean for BGP security?
October, 11 2018
searchsecurity.techtarget.com
Article
How do hackers use legitimate admin tools to compromise networks?
October, 10 2018
searchsecurity.techtarget.com
Article
How does TLBleed abuse the Hyper-Threading feature in Intel chips?
October, 8 2018
searchsecurity.techtarget.com
Article
How does the SynAck ransomware use Process Doppelgänging?
September, 14 2018
searchsecurity.techtarget.com
Article
How does Telegram malware bypass end-to-end encryption?
September, 13 2018
searchsecurity.techtarget.com
Article
How does Android Protected Confirmation provide security for users?
September, 12 2018
searchsecurity.techtarget.com
Article
What issues can arise from hardware debug exception flaws?
September, 11 2018
searchsecurity.techtarget.com
Article
How does the Android Rowhammer exploit affect users?
September, 10 2018
searchsecurity.techtarget.com
Article
How the STARTTLS Everywhere initiative will affect surveillance
September, 6 2018
searchsecurity.techtarget.com
Article
How to find the best privileged identity management tool
August, 24 2018
searchsecurity.techtarget.com
Article
Weighing privileged identity management tools' pros and cons
August, 24 2018
searchsecurity.techtarget.com
Article
How to mitigate the Efail flaws in OpenPGP and S/MIME
August, 16 2018
searchsecurity.techtarget.com
Article
Facebook user data: How do malicious apps steal user data?
August, 10 2018
searchsecurity.techtarget.com
Article
UPnP vulnerability: How is the UPnP protocol being misused?
August, 9 2018
searchsecurity.techtarget.com
Article
How do SDKs for ad networks cause data leaks?
August, 8 2018
searchsecurity.techtarget.com
Article
Microsoft's NTFS flaw: What are the potential consequences?
August, 6 2018
searchsecurity.techtarget.com
Article
Domain fronting: Why cloud providers are concerned about it
July, 19 2018
searchsecurity.techtarget.com
Article
Drupalgeddon 2.0: Why is this vulnerability highly critical?
July, 13 2018
searchsecurity.techtarget.com
Article
How can cryptojacking attacks in Chrome be stopped?
July, 12 2018
searchsecurity.techtarget.com
Article
What are the implications of DNS over HTTPS for privacy?
July, 11 2018
searchsecurity.techtarget.com
Article
What effect does GDPR have on the WHOIS database?
July, 10 2018
searchsecurity.techtarget.com
Article
How did an old, unpatched Firefox bug expose master passwords?
July, 9 2018
searchsecurity.techtarget.com
Article
How can domain generation algorithms be used to bypass ad blockers?
June, 8 2018
searchsecurity.techtarget.com
Article
How does a SAML vulnerability affect single sign-on systems?
June, 7 2018
searchsecurity.techtarget.com
Article
How lattice-based cryptography will improve encryption
June, 7 2018
searchsecurity.techtarget.com
Article
How did cryptomining malware exploit a Telegram vulnerability?
June, 6 2018
searchsecurity.techtarget.com
Article
What risks do untrusted certificates pose to enterprises?
June, 5 2018
searchsecurity.techtarget.com
Article
How will the new WPA3 protocol strengthen password security?
May, 4 2018
searchsecurity.techtarget.com
Article
IoT botnets: How are new Mirai variants impacting systems?
May, 3 2018
searchsecurity.techtarget.com
Article
How were Android Pixel vulnerabilities exploited?
May, 2 2018
searchsecurity.techtarget.com
Article
How did an Electron framework flaw put Slack at risk?
May, 1 2018
searchsecurity.techtarget.com
Article
What is included in the mPOS security standard from PCI SSC?
April, 30 2018
searchsecurity.techtarget.com
Article
How a Blizzard DNS rebinding flaw put millions of gamers at risk
April, 5 2018
searchsecurity.techtarget.com
Article
Secure code review tips: How many review rounds are needed?
April, 3 2018
searchsecurity.techtarget.com
Article
How can improper certificate pinning be stopped by the Spinner tool?
March, 9 2018
searchsecurity.techtarget.com
Article
How does a WPAD attack work and how can it be prevented?
March, 8 2018
Authorship Stats
2Sites99Projects64,768Words
About
the hairy IT dog is a writer who has produced content for internetofthingsagenda.techtarget.com and searchsecurity.techtarget.com
Key Phrases
Michael Cobb, Application Security, Ask Michael, Google Play, Operating System, Open Source, Digital Certificates, Windows Server, Play Store, Security Risks
© ClearVoice, Inc.