Amrithshagaramrithshagar.hashnode.dev·Nov 28, 2023We all are whores in the internet's POVThe internet never cared about us. We are the ones solely dependent on it, surrendering the morsels of our lives to its algorithms, entrusting our secrets to its dark network, and unwittingly becoming the protagonists in a narrative we didn't quite s...Discuss·10 likesBeginner Developers
Sumit Mondalsumit007.hashnode.dev·Nov 26, 2023Maximizing Efficiency and Reliability with AWS Trusted AdvisorIntroduction In the ever-evolving landscape of cloud computing, businesses are constantly seeking ways to optimize their resources, enhance security, and ensure reliability. Amazon Web Services (AWS) has been at the forefront of providing cutting-edg...DiscussAWS
Rupak ChakrabortyforRupak's Daily IT blogit-basics.hashnode.dev·Nov 23, 2023DDoS AttackIntroduction In the rapidly evolving cyber landscape of today, risks and vulnerabilities are undergoing continuous transformations. This digital realm, while remaining expansive and interconnected, houses shadows that demand our attention.Among these...DiscussIT Basicsbasic concepts
Dave PoirierProblog.encoded.life·Nov 14, 2023iOS: Protecting against TLS bypass attacksThe cat and mouse game against hacker never ends. While we can never fully prevent against hackers modifying our runtime binaries and bypass our security measures, we sure can make it more difficult for them. TLS Pinning is a method by which we setup...Discuss·1 like·104 readsiOS
Cyber Docdigitalhealth.hashnode.dev·Nov 8, 2023Passwords: How to protect yourself with themWe knew we were doing the wrong thing, but you are only wrong if you get caught. Although, bringing phones was prohibited in my high school that did not deter 'us'. On a seemingly uneventful day without classes (which tends to happen in your final ye...Discuss#cybersecurity
Arpit Dwivediblog.arpitdwivedi.in·Oct 12, 2023The Critical Role of Input Validation in Web SecurityIn today's digital age, web applications serve as the backbone of businesses, entertainment, social interactions, and more. Yet, with the increasing reliance on these platforms comes the amplified risk of security breaches. A startling 35% of securit...Discuss·10 likes·99 readswebsecurity
Joel O.joelodey.hashnode.dev·Oct 9, 2023The SANS Top 25 Most Dangerous Software Errors.SANS TOP 25 Most Dangerous Software Errors The SANS TOP 25 is a list of the most dangerous software errors that can lead to serious security vulnerabilities. Organizations can use this list to prioritize their remediation efforts and to reduce their ...Discuss·10 likes#sans
Ghalebblog.ghaleb.dev·Oct 3, 2023Data Privacy: How Much is too Much to Share for 'Free'?There's an excellent quote that I've always been a fan of: When something online is free, you're not the customer, you're the product. This sentiment has always deeply resonated with me and has often deterred me from sharing information online, eve...DiscussDiscuss
Amanmadquickaman15.hashnode.dev·Oct 1, 2023How you can avoid being hacked?Get a Password Manager In today's digital age, passwords are the first line of defense against cyber threats. Gone are the days when simple passwords like "password" or "12345" were acceptable, even for the most insignificant accounts. As we navigate...DiscussHackers
Derek Onwudiwetecheffect.hashnode.dev·Sep 27, 2023Digital Privacy and SurveillancePrivacy in the Digital Age is a multifaceted issue with far-reaching implications. Here are some of the broader implications of digital privacy and surveillance, along with examples: Loss of Personal Privacy: Example: Social media platforms often col...Discussprivacy