User Tools

Site Tools


computer_security

If you want to send us your comments, please do so. Thanks
More on comments


Computer security

Zero trust security model
The Censys data base can be useful to investigate security issues
Why security is important: Ransomlook.io - recent hacks

Sans: The 17 Best Cybersecurity Podcasts. Status 2023

Trust in connected devices

When a device is used, which connects to a remote Internet service of unknown repute, the owner of the device is truly placing a huge amount of trust into entities whose trust has not been earned and may not be deserved. It's bad enough to have one's light switches and plugs connected back to potentially hostile foreign soil. But giving remote, and in clearly irresponsible, entities real-time knowledge of vehicle location and movement and even over the vehicle's real-time fuel flow seems reckless at best.1)

Apple Airtags are a risk

Email security

Presenting email in HTML format makes the risk of clicking on a criminal link greater
It is advised to display email in plain text. Even better: Send email only in plain text
Better: Use an email program, like Sylpheed that does not (initially) display HTML

Web browser security

Javascript

Login

If the password can be reset via e-mail the password safety depends on the safety of the e-mail system. That includes the e-mail provider and all the e-mail servers the e-mail passes through. If the connection is not save it also includes the wires which can be tapped. For important logins it is advised to use two factor authentication like OTP2)

Bots attack logins and 2FA

Bit flips

Bit filps, like the ones from cosmic background radiation, can make a connection insecure if the software and hardware are not hardened to it

Best practices for event logging and threat detection


Main subjects on this wiki: Linux, Debian, HTML, Microcontrollers, Privacy

RSS
Disclaimer
Privacy statement
Bugs statement
Cookies
Copyright © : 2014 - 2026 Webevaluation.nl and the authors
Changes reserved.

computer_security.txt · Last modified: by wim