DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why are you not using HTTPS?

Why are you not using HTTPS?

11
Comments
1 min read
Bots are Playing a Bigger Role in the Election than People Realize

Bots are Playing a Bigger Role in the Election than People Realize

6
Comments
23 min read
Compromising User Data via Push Notification Services

Compromising User Data via Push Notification Services

6
Comments
3 min read
Hack Rails with vulnerabilities by OWASP

Hack Rails with vulnerabilities by OWASP

5
Comments
1 min read
“Why would anyone hack me? I’m just a small business owner!”

“Why would anyone hack me? I’m just a small business owner!”

7
Comments
1 min read
My story of setting up Let’s Encrypt SSL on SiteGround

My story of setting up Let’s Encrypt SSL on SiteGround

6
Comments 1
1 min read
Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

8
Comments 3
1 min read
You have critical security vulnerabilities in your software but you don’t know it yet!

You have critical security vulnerabilities in your software but you don’t know it yet!

5
Comments
13 min read
Presentations I would love to watch

Presentations I would love to watch

6
Comments
2 min read
Weekly Links #3

Weekly Links #3

8
Comments
3 min read
How to Securely Backup a Seed Phrase

How to Securely Backup a Seed Phrase

5
Comments
3 min read
Why you should use uBlock Origin just like me?

Why you should use uBlock Origin just like me?

4
Comments
1 min read
The target="_blank" vulnerability by example

The target="_blank" vulnerability by example

39
Comments 15
3 min read
Robots Protect Better Than You

Robots Protect Better Than You

7
Comments
3 min read
Problems that forced me to leave Dashlane for 1Password

Problems that forced me to leave Dashlane for 1Password

2
Comments
1 min read
How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

3
Comments
6 min read
How to Build your own Amazon Ring Security System in an Afternoon

How to Build your own Amazon Ring Security System in an Afternoon

63
Comments
16 min read
Using Microsoft Defender ATP Streaming API with Misp

Using Microsoft Defender ATP Streaming API with Misp

5
Comments
6 min read
5 steps to make your iOS app more secure

5 steps to make your iOS app more secure

7
Comments
3 min read
Security Basics Every Programmer should know from the Start

Security Basics Every Programmer should know from the Start

6
Comments
3 min read
What is a password manager?

What is a password manager?

3
Comments
1 min read
Block SSH brute-force attacks

Block SSH brute-force attacks

13
Comments 7
2 min read
A maze called VPN logging policies

A maze called VPN logging policies

6
Comments 3
2 min read
Importance of GDPR Compliance in a Development Project?

Importance of GDPR Compliance in a Development Project?

3
Comments
4 min read
Protecting your digital self at Hacker Summer Camp

Protecting your digital self at Hacker Summer Camp

6
Comments
1 min read
My password policy

My password policy

4
Comments
2 min read
Blockchain Solution - Alwin Technologies

Blockchain Solution - Alwin Technologies

3
Comments 1
1 min read
TELLIT

TELLIT

9
Comments
1 min read
You can’t function in 2019 without a password manager

You can’t function in 2019 without a password manager

6
Comments
3 min read
You stole my source code on Neopets

You stole my source code on Neopets

5
Comments
7 min read
Why Should You Use Cloudflare Like I Do

Why Should You Use Cloudflare Like I Do

4
Comments
1 min read
What if your laptop or hard drive with sensitive data is stolen or you lost it?

What if your laptop or hard drive with sensitive data is stolen or you lost it?

11
Comments
6 min read
The Dangers of Shadow IT

The Dangers of Shadow IT

4
Comments
3 min read
How to use python objects like java-script dictionaries.

How to use python objects like java-script dictionaries.

6
Comments
1 min read
Introducing Osgood

Introducing Osgood

43
Comments 5
4 min read
How to Protect a WordPress site from being Hacked

How to Protect a WordPress site from being Hacked

5
Comments
17 min read
Pipdig Under Investigation (and Your Options If You Want Out)

Pipdig Under Investigation (and Your Options If You Want Out)

5
Comments
8 min read
WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

5
Comments
13 min read
0-day Vulnerability for Social Warfare WordPress plugin

0-day Vulnerability for Social Warfare WordPress plugin

4
Comments
2 min read
WooCommerce Checkout Manager 4.2.6 Vulnerability

WooCommerce Checkout Manager 4.2.6 Vulnerability

3
Comments
1 min read
Secrets Management in Elixir Using AWS

Secrets Management in Elixir Using AWS

19
Comments
3 min read
SAST Tooling – Part 2: The selection criteria

SAST Tooling – Part 2: The selection criteria

5
Comments
3 min read
Anyone Can Have a Bad Day

Anyone Can Have a Bad Day

14
Comments
6 min read
Securing APIs and Microservices with OAuth and OpenID Connect

Securing APIs and Microservices with OAuth and OpenID Connect

9
Comments
1 min read
Chatbot Security Framework: Everything you need to know about Chatbot security

Chatbot Security Framework: Everything you need to know about Chatbot security

4
Comments
7 min read
Technology landscape for Identification Management System

Technology landscape for Identification Management System

9
Comments
4 min read
Using EasyAuth (AppService Authentication) with ASP.NET Core

Using EasyAuth (AppService Authentication) with ASP.NET Core

12
Comments
3 min read
How to protect your Node.js applications from malicious dependencies

How to protect your Node.js applications from malicious dependencies

6
Comments
5 min read
The latest npm breach…or is it?

The latest npm breach…or is it?

4
Comments
8 min read
AppArmor with Python

AppArmor with Python

3
Comments
2 min read
Eight moderator factors of security and performance verification

Eight moderator factors of security and performance verification

8
Comments 1
1 min read
SAST Tooling – Part 3: The Winner

SAST Tooling – Part 3: The Winner

5
Comments
4 min read
SQL Injection??

SQL Injection??

6
Comments 1
1 min read
Flutter at IO Extended Kuala Lumpur 2019 — Follow-up

Flutter at IO Extended Kuala Lumpur 2019 — Follow-up

3
Comments
13 min read
Happy DAY - My Github Project listed in BlackArch OS

Happy DAY - My Github Project listed in BlackArch OS

11
Comments 2
1 min read
Security Using Spring and JWT

Security Using Spring and JWT

6
Comments
16 min read
Five Hard Earned Tips For Increasing Your Wordpress Security

Five Hard Earned Tips For Increasing Your Wordpress Security

8
Comments
6 min read
Creating a covert channel over the Telegram

Creating a covert channel over the Telegram

11
Comments
7 min read
PWGen - Create strong passwords easy to remember but hard to break

PWGen - Create strong passwords easy to remember but hard to break

6
Comments
2 min read
How to Protect React Native Apps with Jscrambler

How to Protect React Native Apps with Jscrambler

6
Comments
5 min read
loading...