A Cyber Security Income Opportunity: Freelance Bug Finder
I recently wrote about the Cyber Security Staffing Shortage, and how it meant good things for those interested in careers in cyber security. Here is another – potentially quite lucrative – opportunity: bounty hunter. I’m not talking about the bounty hunters you see in movies or television shows, though. I’m talking about bug finders. You […]
What Is Web Metadata Encryption and Why Is It Important?
Your data may be encrypted when you use https, but what about your metadata? I wrote about metadata and eavesdropping earlier this year – it is, among other things, the URLs of the websites you visit. If attackers can access this information, they can learn some potentially confidential information about you, and you are unlikely […]
WebAuthn: Toward the End of Passwords On the Web
Frequent readers of this blog will know that I am constantly looking for alternatives to passwords. Some reasons are: they can be shared so a system cannot tell who the real user is, they can be forgotten, when stored improperly they can be leaked. Passwords fall into the single-factor category of “something you know” (the […]
What Is The Difference Between Single-mode and Multi-mode Fiber?
I recently wrote about the use of fiber optic cable for physical intrusion detection. In that post, I mentioned single- and multi-mode fiber. Here, I’d like to discuss the two types in more detail. This is a bit of a technical overview, so if you are looking for deep details or a non-technical explanation, this […]
How Are Fiber Optic Cables Used For (Physical) Intrusion Detection?
Many of us have fiber optic cable that delivers Internet access to our homes or offices. But optical fiber cable can be used for more than high-speed data transfer. I’m not talking about artwork or illumination, but rather an important security application: physical intrusion detection. Optical fiber types In order to understand how this works, […]