Why Order Matters
While it may seem strange, sometimes it is possible for a mathematical expression to have two different right answers. Consider: This expression has been discussed on the Internet since 2011! The correct answer could be either 2 or 288. Really. It depends on how the expression is evaluated. To understand that we have to understand […]
The Brave Web Browser: Faster and More Secure
It is a Brave new (browser) world out there. Almost since the start of the World Wide Web, users have had different preferences of how to access it. Some like Firefox, some Safari, some Chrome, some Opera, some Chrome, some… You get the picture. The “browser wars” ebb and flow in intensity. A relatively new […]
What is Credential Stuffing and Why Should I Care?
You should know by now that using common passwords is a bad idea. And you may have heard of recent password breaches and that you should change passwords on breached sites. But there is an additional threat: credential stuffing. Whenever there is a breach where usernames or email addresses are disclosed and can be matched […]
A Cyber Security Income Opportunity: Freelance Bug Finder
I recently wrote about the Cyber Security Staffing Shortage, and how it meant good things for those interested in careers in cyber security. Here is another – potentially quite lucrative – opportunity: bounty hunter. I’m not talking about the bounty hunters you see in movies or television shows, though. I’m talking about bug finders. You […]
What Is Web Metadata Encryption and Why Is It Important?
Your data may be encrypted when you use https, but what about your metadata? I wrote about metadata and eavesdropping earlier this year – it is, among other things, the URLs of the websites you visit. If attackers can access this information, they can learn some potentially confidential information about you, and you are unlikely […]