1. I’m harvesting credit card numbers and passwords from your site. Here’s how. | by David Gilbertson | HackerNoon.com | Medium (medium.com)

    Posted 33 months ago security

  2. Don’t mix URL parsers | daniel.haxx.se (daniel.haxx.se)

    Posted 34 months ago security

  3. Secure Containerized Browser | πšŸπšŽπš›πš–πšŠπšπšŽπš— (vermaden.wordpress.com)

    Posted 34 months ago security

  4. Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution (googleprojectzero.blogspot.com)

    Posted 34 months ago security

  5. It's Now Possible To Sign Arbitrary Data With Your SSH Keys (agwa.name)

    Posted 35 months ago security

  6. gautamkrishnar/nothing-private: Do you think you are safe using private browsing or incognito mode?. This will prove that you're wrong. (github.com)

    Posted 36 months ago security

  7. Comparing SSH Keys - RSA, DSA, ECDSA, or EdDSA? | Teleport (goteleport.com)

    Posted 38 months ago ssh security

  8. Security Analysis of Telegram (Symmetric Part) - Security Analysis of Telegram (Symmetric Part) (mtpsym.github.io)

    Posted 39 months ago security telegram

  9. enable cross-origin resource sharing (enable-cors.org)

    Posted 45 months ago web security

  10. Project Zero: A Look at iMessage in iOS 14 (googleprojectzero.blogspot.com)

    Posted 45 months ago ios security