the hairy IT dog

trying to make secure computing easier and more achievable

Categories
N/A
Content Types
N/A
More Information
Location|Languages
Publications

Published Content

74
What does the expansion of MANRS mean for BGP security?
searchsecurity.techtarget.comArticle
What does the expansion of MANRS mean for BGP security?
October, 11 2018
How to mitigate the Efail flaws in OpenPGP and S/MIME
searchsecurity.techtarget.comArticle
How to mitigate the Efail flaws in OpenPGP and S/MIME
August, 16 2018
Facebook user data: How do malicious apps steal user data?
searchsecurity.techtarget.comArticle
Facebook user data: How do malicious apps steal user data?
August, 10 2018
UPnP vulnerability: How is the UPnP protocol being misused?
searchsecurity.techtarget.comArticle
UPnP vulnerability: How is the UPnP protocol being misused?
August, 9 2018
How do SDKs for ad networks cause data leaks?
searchsecurity.techtarget.comArticle
How do SDKs for ad networks cause data leaks?
August, 8 2018
Microsoft's NTFS flaw: What are the potential consequences?
searchsecurity.techtarget.comArticle
Microsoft's NTFS flaw: What are the potential consequences?
August, 6 2018
Domain fronting: Why cloud providers are concerned about it
searchsecurity.techtarget.comArticle
Domain fronting: Why cloud providers are concerned about it
July, 19 2018
Drupalgeddon 2.0: Why is this vulnerability highly critical?
searchsecurity.techtarget.comArticle
Drupalgeddon 2.0: Why is this vulnerability highly critical?
July, 13 2018
How can cryptojacking attacks in Chrome be stopped?
searchsecurity.techtarget.comArticle
How can cryptojacking attacks in Chrome be stopped?
July, 12 2018
What are the implications of DNS over HTTPS for privacy?
searchsecurity.techtarget.comArticle
What are the implications of DNS over HTTPS for privacy?
July, 11 2018
What effect does GDPR have on the WHOIS database?
searchsecurity.techtarget.comArticle
What effect does GDPR have on the WHOIS database?
July, 10 2018
How did an old, unpatched Firefox bug expose master passwords?
searchsecurity.techtarget.comArticle
How did an old, unpatched Firefox bug expose master passwords?
July, 9 2018
How can domain generation algorithms be used to bypass ad blockers?
searchsecurity.techtarget.comArticle
How can domain generation algorithms be used to bypass ad blockers?
June, 8 2018
How does a SAML vulnerability affect single sign-on systems?
searchsecurity.techtarget.comArticle
How does a SAML vulnerability affect single sign-on systems?
June, 7 2018
How lattice-based cryptography will improve encryption
searchsecurity.techtarget.comArticle
How lattice-based cryptography will improve encryption
June, 7 2018
How did cryptomining malware exploit a Telegram vulnerability?
searchsecurity.techtarget.comArticle
How did cryptomining malware exploit a Telegram vulnerability?
June, 6 2018
What risks do untrusted certificates pose to enterprises?
searchsecurity.techtarget.comArticle
What risks do untrusted certificates pose to enterprises?
June, 5 2018
How will the new WPA3 protocol strengthen password security?
searchsecurity.techtarget.comArticle
How will the new WPA3 protocol strengthen password security?
May, 4 2018
IoT botnets: How are new Mirai variants impacting systems?
searchsecurity.techtarget.comArticle
IoT botnets: How are new Mirai variants impacting systems?
May, 3 2018
How were Android Pixel vulnerabilities exploited?
searchsecurity.techtarget.comArticle
How were Android Pixel vulnerabilities exploited?
May, 2 2018
How did an Electron framework flaw put Slack at risk?
searchsecurity.techtarget.comArticle
How did an Electron framework flaw put Slack at risk?
May, 1 2018
What is included in the mPOS security standard from PCI SSC?
searchsecurity.techtarget.comArticle
What is included in the mPOS security standard from PCI SSC?
April, 30 2018
How a Blizzard DNS rebinding flaw put millions of gamers at risk
searchsecurity.techtarget.comArticle
How a Blizzard DNS rebinding flaw put millions of gamers at risk
April, 5 2018
Secure code review tips: How many review rounds are needed?
searchsecurity.techtarget.comArticle
Secure code review tips: How many review rounds are needed?
April, 3 2018
How can improper certificate pinning be stopped by the Spinner tool?
searchsecurity.techtarget.comArticle
How can improper certificate pinning be stopped by the Spinner tool?
March, 9 2018
How does a WPAD attack work and how can it be prevented?
searchsecurity.techtarget.comArticle
How does a WPAD attack work and how can it be prevented?
March, 8 2018
How can users deal with app trackers that collect customer data?
searchsecurity.techtarget.comArticle
How can users deal with app trackers that collect customer data?
March, 7 2018
How does Tizi spyware affect Android apps?
searchsecurity.techtarget.comArticle
How does Tizi spyware affect Android apps?
March, 6 2018
The Keeper browser extension flaw: How can users stay secure?
searchsecurity.techtarget.comArticle
The Keeper browser extension flaw: How can users stay secure?
March, 5 2018
Why the Bleichenbacher attack is still around
searchsecurity.techtarget.comArticle
Why the Bleichenbacher attack is still around
March, 1 2018
Fight a targeted cyberattack with network segmentation, monitoring
searchsecurity.techtarget.comArticle
Fight a targeted cyberattack with network segmentation, monitoring
February, 5 2018
Bypassing facial recognition: The means, motive and opportunity
searchsecurity.techtarget.comArticle
Bypassing facial recognition: The means, motive and opportunity
February, 1 2018
The ROCA vulnerability: How it works and what to do about it
searchsecurity.techtarget.comArticle
The ROCA vulnerability: How it works and what to do about it
January, 4 2018
How does Google Play Protect aim to improve Android security?
searchsecurity.techtarget.comArticle
How does Google Play Protect aim to improve Android security?
October, 16 2017
What risk do Windows 10 telemetry features pose enterprises?
searchsecurity.techtarget.comArticle
What risk do Windows 10 telemetry features pose enterprises?
September, 15 2017
Applying IoT security guidelines to device development and deployment
internetofthingsagenda.techtarget.comArticle
Applying IoT security guidelines to device development and deployment
May, 1 2017
Attack by TIFF images: What are the vulnerabilities in LibTIFF?
searchsecurity.techtarget.comArticle
Attack by TIFF images: What are the vulnerabilities in LibTIFF?
March, 10 2017
How symmetric and asymmetric encryption algorithms differ
searchsecurity.techtarget.comArticle
How symmetric and asymmetric encryption algorithms differ
December, 7 2016
How do the Linux kernel memory protection features on Android work?
searchsecurity.techtarget.comArticle
How do the Linux kernel memory protection features on Android work?
December, 2 2016
How did a full access OAuth token get issued to the Pokémon GO app?
searchsecurity.techtarget.comArticle
How did a full access OAuth token get issued to the Pokémon GO app?
November, 29 2016
Is Barclays' phone banking biometric authentication system secure?
searchsecurity.techtarget.comArticle
Is Barclays' phone banking biometric authentication system secure?
November, 28 2016
Bug bounties: How does Apple's program compare to others?
searchsecurity.techtarget.comArticle
Bug bounties: How does Apple's program compare to others?
November, 28 2016
Are browsers using the HTTP/2 protocol vulnerable to HEIST attacks?
searchsecurity.techtarget.comArticle
Are browsers using the HTTP/2 protocol vulnerable to HEIST attacks?
November, 15 2016
Is the open source architecture beneficial or a security vulnerability?
searchsecurity.techtarget.comArticle
Is the open source architecture beneficial or a security vulnerability?
October, 4 2016
Internal PKI: What are the benefits of enterprises moving it in-house?
searchsecurity.techtarget.comArticle
Internal PKI: What are the benefits of enterprises moving it in-house?
September, 30 2016
How can privileged access accounts be managed in large companies?
searchsecurity.techtarget.comArticle
How can privileged access accounts be managed in large companies?
September, 29 2016
How are weak passwords banned with Microsoft's Smart Password Lockout?
searchsecurity.techtarget.comArticle
How are weak passwords banned with Microsoft's Smart Password Lockout?
September, 28 2016
How did a malicious app slip past Google Play app store security?
searchsecurity.techtarget.comArticle
How did a malicious app slip past Google Play app store security?
September, 27 2016
How does SandJacking let attackers load malware on iOS devices?
searchsecurity.techtarget.comArticle
How does SandJacking let attackers load malware on iOS devices?
September, 26 2016
Improving Android device security for enterprises with Android N
searchsecurity.techtarget.comArticle
Improving Android device security for enterprises with Android N
September, 6 2016
Authorship Stats
2Sites74Projects49,753Words
About
the hairy IT dog is a writer who has produced content for internetofthingsagenda.techtarget.com and searchsecurity.techtarget.com
Key Phrases
Michael Cobb, Application Security, Open Source, Ask Michael, Google Play, Operating System, Windows Server, Digital Certificates, Master Password, Play Store
© ClearVoice, Inc.