Yaakulyasecurenet.hashnode.dev·Dec 22, 2024Implementing a Password Strength Checker in PythonPasswords are the frontline of security for digital systems, yet many users still rely on weak passwords. To help promote better password practices, we’ll build a simple but effective password strength checker in Python. This blog will guide you thro...1 like#cybersecurity
Manya LambaforWeb Securitywebsecurity-bymn.hashnode.dev·Dec 19, 2024Session HijackingIntroduction: A Digital Heist in Plain Sight Imagine shopping online, adding items to your cart, and preparing to check out—only to find items you didn’t add. This could mean you’re a victim of session hijacking, where hackers steal your active sessi...39 readsDeveloper
Shalon N. Ngiginjeri-ngigi.hashnode.dev·Nov 28, 2024Auth 101: Token Based Authentication💡 This is a stack agnostic strategy that can be implemented in a number of frameworks and languages. I, however, might reference ReactJS (client) and NodeJS (server). Overview There are a number of ways to implement secure authentication and autho...1 like·64 readsJWT token,JSON Web,Token,Token authentication,Access token,JSON token,JWT security,JWT authentication,Token-based authentication,JWT decoding,JWT implementation
Mbaoma chukwuemekambaoma.hashnode.dev·Nov 26, 2024Cybersecurity Awareness Month Day 11: The Role of Updates and PatchesImportance of Keeping Software Current Keeping software up to date is one of the most fundamental yet often overlooked aspects of cybersecurity. Updates and patches play a critical role in protecting devices and systems from vulnerabilities that coul...20 likesCybersecurityAwareness
Denishdenish.hashnode.dev·Nov 26, 2024Boost Your Web Security with Reverse Proxies and SSL Certificates!Hello friends, gadget freaks? ✌ Now let me share with you something rather important for any Web application nowadays – security. As it seen, hackers are always coming up with new strategies and methods of penetrating through a particular system; the...proxy
Mbaoma chukwuemekacybersecurityawareness.hashnode.dev·Nov 23, 2024Cybersecurity Awareness Month: Day8Safe Browsing Practices In today's connected world, browsing the internet has become second nature. However, navigating the web comes with risks like malicious websites and harmful downloads. These threats can compromise your data, infect your device...20 likes#cybersecurity
David G. Simmonsedgeiot.hashnode.dev·Nov 22, 2024Building a Secure Lora Gateway using Zymbit SEN400Overview This How To Guide will show you how to integrate a LoRaWAN card with a Zymbit Secure Edge Node (SEN) Developer Kit. The Goals is to be able to get your Zymbit Secure Edge Node Developer Kit to come up as a LoRaWAN packet forwarder and connec...35 readsiot
Mbaoma chukwuemekambaoma.hashnode.dev·Nov 22, 2024Day 7: Quiz or Interactive Recap.Cybersecurity Awareness Quiz Multiple-Choice Questions Which of the following is NOT a type of malware? A) Ransomware B) Trojan C) Firewall D) Spyware Correct Answer: C) Firewall What does phishing aim to steal from victims? A) Hardware B)...10 likes#cybersecurity
Mbaoma chukwuemekambaoma.hashnode.dev·Nov 21, 2024Cybersecurity Awareness Month Day 6:The Evolution of Cyber Threats Introduction Cyber threats have evolved dramatically over the years. From simple pranks and experimental viruses to sophisticated ransomware and nation-state-sponsored cyberattacks, the nature of these threats has grown...10 likes#cybersecurity
Mbaoma chukwuemekambaoma.hashnode.dev·Nov 20, 2024Cybersecurity Awareness Month Day 5: Case Studies And Real Life Examples of Attacks and Their ConsequencesCyberattacks are not just abstract threats they are real, costly, and can have far reaching consequences. To highlight the importance of cybersecurity, let us examine some notable real world cases and the lessons they offer. 1. WannaCry Ransomware At...20 likes#cybersecurity