Software Science Learn the Fascinating History and Uses of the Public Suffix List The Public Suffix List is a piece of modern browser security comprised of a simple text file stored in a public repository, operated by volunteers.
Personal Optimization Send Secure Emails with Gmail’s Confidential Mode Banks won't be using it any time soon, but for the average user, Gmail's confidential mode is a very secure way to send private information.
Development You Should Be Using a Reentrancy Guard in Your Smart Contracts A reentrancy guard prevents more than one function from being executed at a time and eliminates the possibility of exploiting a recursive call.
Evolving the Industry Not Your Keys, Not Your Crypto It's important to learn how to properly store your cryptocurrencies. Here is a helpful guide to secure your assets for years to come.
DevOps & System Admin. How TOTP Systems Like Google Authenticator Work A history of the HOTP one-time password method, how the current TOTP system works, and a few risks inherent to the TOTP approach.
Personal Optimization Staying (Digitally) Safe During COVID-19 – Four Steps to Personal Cyber Security Cyber threats and scams have escalated during the COVID-19 pandemic. Here are are some tips and advice on what you can do to stay secure.
Development Practices Security Hygiene for Software Professionals Taking responsibility for your security hygiene is essential and not very difficult. Here are 7 things you should start doing as soon as possible.
Web Apps Safely Binding Unescaped Content in Web Applications Understanding cross-site scripting (XSS) vulnerability, when binding unescaped content is safe, and how to bypass warnings in Angular and Ember.
Technical Practices 5 Ways Atomic Object Keeps Your App Secure Atomic takes security concerns very seriously and uses a number of patterns and practices to ensure that the software we write is safe and secure.
Personal Optimization Understanding the 3 Main Types of Encryption An overview of symmetric encryption, asymmetric encryption, and hashing — how they work and why you need all three to create secure systems.
DevOps & System Admin. Shellshock – CVEs, Patches, Updates, & Other Resources Shellshock endangers un-patched web servers and Linux devices. So what is it? How can you tell if you’re vulnerable? And how can it be addressed?
DevOps & System Admin. Debian and Ubuntu Automatic Security Updates Automatic security updates for Debian and Ubuntu with unattended-upgrades provides an easy way to keep your servers patched against recent vulnerabilities.