User Tools

Site Tools


computer_security

If you want to send us your comments, please do so. Thanks
More on comments


Computer security

The Censys data base can be useful to investigate security issues

Sans: The 17 Best Cybersecurity Podcasts. Status 2023

Trust in connected devices

When a device is used, which connects to a remote Internet service of unknown repute, the owner of the device is truly placing a huge amount of trust into entities whose trust has not been earned and may not be deserved. It's bad enough to have one's light switches and plugs connected back to potentially hostile foreign soil. But giving remote, and in clearly irresponsible, entities real-time knowledge of vehicle location and movement and even over the vehicle's real-time fuel flow seems reckless at best.1)

Apple Airtags are a risk

Webbrowser security

Javascript

Login

If the password can be reset via e-mail the password safety depends on the safety of the e-mail system. That includes the e-mail provider and all the e-mail servers the e-mail passes through. If the connection is not save it also includes the wires which can be tapped. For important logins it is advised to use two factor authentication like OTP2)

Bots attack logins and 2FA

Bit flips

Bit filps, like the ones from cosmic background radiation, can make a connection insecure if the software and hardware are not hardened to it


Main subjects on this wiki: Linux, Debian, HTML, Microcontrollers, Privacy

RSS
Disclaimer
Privacy statement
Bugs statement
Cookies
Copyright © : 2014 - 2024 Webevaluation.nl and the authors
Changes reserved.

This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.More information about cookies
computer_security.txt · Last modified: 13-03-2024 15:22 by wim