the hairy IT dog

trying to make secure computing easier and more achievable

Categories
N/A
Content Types
N/A
More Information
Location|Languages
Publications

Published Content

88
The implications of the NetSpectre vulnerability
searchsecurity.techtarget.comArticle
The implications of the NetSpectre vulnerability
October, 18 2018
How does Apple's Quick Look endanger user privacy?
searchsecurity.techtarget.comArticle
How does Apple's Quick Look endanger user privacy?
October, 12 2018
How did Netflix phishing attacks use legitimate TLS certificates?
searchsecurity.techtarget.comArticle
How did Netflix phishing attacks use legitimate TLS certificates?
October, 11 2018
What does the expansion of MANRS mean for BGP security?
searchsecurity.techtarget.comArticle
What does the expansion of MANRS mean for BGP security?
October, 11 2018
How do hackers use legitimate admin tools to compromise networks?
searchsecurity.techtarget.comArticle
How do hackers use legitimate admin tools to compromise networks?
October, 10 2018
How was Google Firebase security bypassed?
searchsecurity.techtarget.comArticle
How was Google Firebase security bypassed?
October, 9 2018
How does TLBleed abuse the Hyper-Threading feature in Intel chips?
searchsecurity.techtarget.comArticle
How does TLBleed abuse the Hyper-Threading feature in Intel chips?
October, 8 2018
How does the SynAck ransomware use Process Doppelgänging?
searchsecurity.techtarget.comArticle
How does the SynAck ransomware use Process Doppelgänging?
September, 14 2018
How does Telegram malware bypass end-to-end encryption?
searchsecurity.techtarget.comArticle
How does Telegram malware bypass end-to-end encryption?
September, 13 2018
How does Android Protected Confirmation provide security for users?
searchsecurity.techtarget.comArticle
How does Android Protected Confirmation provide security for users?
September, 12 2018
What issues can arise from hardware debug exception flaws?
searchsecurity.techtarget.comArticle
What issues can arise from hardware debug exception flaws?
September, 11 2018
How does the Android Rowhammer exploit affect users?
searchsecurity.techtarget.comArticle
How does the Android Rowhammer exploit affect users?
September, 10 2018
How the STARTTLS Everywhere initiative will affect surveillance
searchsecurity.techtarget.comArticle
How the STARTTLS Everywhere initiative will affect surveillance
September, 6 2018
How to find the best privileged identity management tool
searchsecurity.techtarget.comArticle
How to find the best privileged identity management tool
August, 24 2018
Weighing privileged identity management tools' pros and cons
searchsecurity.techtarget.comArticle
Weighing privileged identity management tools' pros and cons
August, 24 2018
How to mitigate the Efail flaws in OpenPGP and S/MIME
searchsecurity.techtarget.comArticle
How to mitigate the Efail flaws in OpenPGP and S/MIME
August, 16 2018
Facebook user data: How do malicious apps steal user data?
searchsecurity.techtarget.comArticle
Facebook user data: How do malicious apps steal user data?
August, 10 2018
UPnP vulnerability: How is the UPnP protocol being misused?
searchsecurity.techtarget.comArticle
UPnP vulnerability: How is the UPnP protocol being misused?
August, 9 2018
How do SDKs for ad networks cause data leaks?
searchsecurity.techtarget.comArticle
How do SDKs for ad networks cause data leaks?
August, 8 2018
Microsoft's NTFS flaw: What are the potential consequences?
searchsecurity.techtarget.comArticle
Microsoft's NTFS flaw: What are the potential consequences?
August, 6 2018
Domain fronting: Why cloud providers are concerned about it
searchsecurity.techtarget.comArticle
Domain fronting: Why cloud providers are concerned about it
July, 19 2018
Drupalgeddon 2.0: Why is this vulnerability highly critical?
searchsecurity.techtarget.comArticle
Drupalgeddon 2.0: Why is this vulnerability highly critical?
July, 13 2018
How can cryptojacking attacks in Chrome be stopped?
searchsecurity.techtarget.comArticle
How can cryptojacking attacks in Chrome be stopped?
July, 12 2018
What are the implications of DNS over HTTPS for privacy?
searchsecurity.techtarget.comArticle
What are the implications of DNS over HTTPS for privacy?
July, 11 2018
What effect does GDPR have on the WHOIS database?
searchsecurity.techtarget.comArticle
What effect does GDPR have on the WHOIS database?
July, 10 2018
How did an old, unpatched Firefox bug expose master passwords?
searchsecurity.techtarget.comArticle
How did an old, unpatched Firefox bug expose master passwords?
July, 9 2018
How can domain generation algorithms be used to bypass ad blockers?
searchsecurity.techtarget.comArticle
How can domain generation algorithms be used to bypass ad blockers?
June, 8 2018
How lattice-based cryptography will improve encryption
searchsecurity.techtarget.comArticle
How lattice-based cryptography will improve encryption
June, 7 2018
How does a SAML vulnerability affect single sign-on systems?
searchsecurity.techtarget.comArticle
How does a SAML vulnerability affect single sign-on systems?
June, 7 2018
How did cryptomining malware exploit a Telegram vulnerability?
searchsecurity.techtarget.comArticle
How did cryptomining malware exploit a Telegram vulnerability?
June, 6 2018
What risks do untrusted certificates pose to enterprises?
searchsecurity.techtarget.comArticle
What risks do untrusted certificates pose to enterprises?
June, 5 2018
How will the new WPA3 protocol strengthen password security?
searchsecurity.techtarget.comArticle
How will the new WPA3 protocol strengthen password security?
May, 4 2018
IoT botnets: How are new Mirai variants impacting systems?
searchsecurity.techtarget.comArticle
IoT botnets: How are new Mirai variants impacting systems?
May, 3 2018
How were Android Pixel vulnerabilities exploited?
searchsecurity.techtarget.comArticle
How were Android Pixel vulnerabilities exploited?
May, 2 2018
How did an Electron framework flaw put Slack at risk?
searchsecurity.techtarget.comArticle
How did an Electron framework flaw put Slack at risk?
May, 1 2018
What is included in the mPOS security standard from PCI SSC?
searchsecurity.techtarget.comArticle
What is included in the mPOS security standard from PCI SSC?
April, 30 2018
How a Blizzard DNS rebinding flaw put millions of gamers at risk
searchsecurity.techtarget.comArticle
How a Blizzard DNS rebinding flaw put millions of gamers at risk
April, 5 2018
Secure code review tips: How many review rounds are needed?
searchsecurity.techtarget.comArticle
Secure code review tips: How many review rounds are needed?
April, 3 2018
How can improper certificate pinning be stopped by the Spinner tool?
searchsecurity.techtarget.comArticle
How can improper certificate pinning be stopped by the Spinner tool?
March, 9 2018
How does a WPAD attack work and how can it be prevented?
searchsecurity.techtarget.comArticle
How does a WPAD attack work and how can it be prevented?
March, 8 2018
How can users deal with app trackers that collect customer data?
searchsecurity.techtarget.comArticle
How can users deal with app trackers that collect customer data?
March, 7 2018
How does Tizi spyware affect Android apps?
searchsecurity.techtarget.comArticle
How does Tizi spyware affect Android apps?
March, 6 2018
The Keeper browser extension flaw: How can users stay secure?
searchsecurity.techtarget.comArticle
The Keeper browser extension flaw: How can users stay secure?
March, 5 2018
Why the Bleichenbacher attack is still around
searchsecurity.techtarget.comArticle
Why the Bleichenbacher attack is still around
March, 1 2018
Fight a targeted cyberattack with network segmentation, monitoring
searchsecurity.techtarget.comArticle
Fight a targeted cyberattack with network segmentation, monitoring
February, 5 2018
Bypassing facial recognition: The means, motive and opportunity
searchsecurity.techtarget.comArticle
Bypassing facial recognition: The means, motive and opportunity
February, 1 2018
The ROCA vulnerability: How it works and what to do about it
searchsecurity.techtarget.comArticle
The ROCA vulnerability: How it works and what to do about it
January, 4 2018
How does Google Play Protect aim to improve Android security?
searchsecurity.techtarget.comArticle
How does Google Play Protect aim to improve Android security?
October, 16 2017
What risk do Windows 10 telemetry features pose enterprises?
searchsecurity.techtarget.comArticle
What risk do Windows 10 telemetry features pose enterprises?
September, 15 2017
Applying IoT security guidelines to device development and deployment
internetofthingsagenda.techtarget.comArticle
Applying IoT security guidelines to device development and deployment
May, 1 2017
Authorship Stats
2Sites88Projects58,139Words
About
the hairy IT dog is a writer who has produced content for internetofthingsagenda.techtarget.com and searchsecurity.techtarget.com
Key Phrases
Michael Cobb, Application Security, Ask Michael, Operating System, Open Source, Google Play, Windows Server, Digital Certificates, User Data, Identity Management
© ClearVoice, Inc.