DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
FaceTime Vulnerability Allows Unauthorized Access to iPhone Mic

FaceTime Vulnerability Allows Unauthorized Access to iPhone Mic

33
Comments 4
1 min read
Swiss Army knife for Unix permissions

Swiss Army knife for Unix permissions

6
Comments
1 min read
the infosec mindset

the infosec mindset

11
Comments
3 min read
Awesome Java Security 🕶☕🔐

Awesome Java Security 🕶☕🔐

51
Comments 6
1 min read
Basic Authentication

Basic Authentication

15
Comments 2
3 min read
Spring Security with JWT

Spring Security with JWT

208
Comments 43
7 min read
Configure OpenVPN Access Server on Azure

Configure OpenVPN Access Server on Azure

7
Comments
1 min read
Introduction to Authentication and Authorization

Introduction to Authentication and Authorization

16
Comments
2 min read
About SSL/TLS security

About SSL/TLS security

76
Comments 1
3 min read
I Don't Know Crap About Security (Or At Least I Didn't)

I Don't Know Crap About Security (Or At Least I Didn't)

42
Comments
8 min read
Golang Security Checker

Golang Security Checker

37
Comments 4
1 min read
Using .pfx and .cer for security in .Net

Using .pfx and .cer for security in .Net

7
Comments 1
4 min read
Awesome Python Security 🕶🐍🔐

Awesome Python Security 🕶🐍🔐

43
Comments 5
1 min read
One Easy Way to Improve Your Ruby Security

One Easy Way to Improve Your Ruby Security

76
Comments 4
3 min read
Credentials for SanDisk Connect Wireless Stick

Credentials for SanDisk Connect Wireless Stick

3
Comments
1 min read
RCE in Mattermost Desktop earlier than 4.2.0

RCE in Mattermost Desktop earlier than 4.2.0

6
Comments
3 min read
Dropping root privileges in rust

Dropping root privileges in rust

8
Comments
2 min read
libVES: End-to-End Encryption API. Encrypt Everything without fear of losing the Key

libVES: End-to-End Encryption API. Encrypt Everything without fear of losing the Key

11
Comments
1 min read
RSA: How Maths will protect us while P!=NP

RSA: How Maths will protect us while P!=NP

42
Comments 1
8 min read
How to develop more secure solutions without the hassle

How to develop more secure solutions without the hassle

6
Comments
5 min read
Please don't commit .env

Please don't commit .env

142
Comments 85
4 min read
Poll: Do You Know What "Idempotent" Means?

Poll: Do You Know What "Idempotent" Means?

141
Comments 19
2 min read
Awesome Golang Security 🕶🔐

Awesome Golang Security 🕶🔐

102
Comments 7
1 min read
Learn How to Hack, Capture the Flag for Beginners!

Learn How to Hack, Capture the Flag for Beginners!

123
Comments 3
2 min read
How to be Secure in the Cloud

How to be Secure in the Cloud

34
Comments 3
7 min read
Why You Should Care What You Npm Install

Why You Should Care What You Npm Install

56
Comments 8
4 min read
I dis-agree to all Google's Terms and Policy

I dis-agree to all Google's Terms and Policy

40
Comments 45
1 min read
Facebook Lied : A Facebook Feature Which Kills Another Feature

Facebook Lied : A Facebook Feature Which Kills Another Feature

43
Comments 15
2 min read
How I hate the term «Ethical Hacker» !

How I hate the term «Ethical Hacker» !

51
Comments 15
2 min read
XSS in Ghost

XSS in Ghost

71
Comments 12
9 min read
Awesome PHP Security 🕶🐘🔐

Awesome PHP Security 🕶🐘🔐

45
Comments 2
1 min read
Create a Secure Spring REST API

Create a Secure Spring REST API

17
Comments
9 min read
Protect Application Assets: How to Secure Your Secrets

Protect Application Assets: How to Secure Your Secrets

5
Comments
7 min read
Let's Encrypt: Certbot For OpenBSD's httpd

Let's Encrypt: Certbot For OpenBSD's httpd

23
Comments 2
4 min read
Pragmatic Privacy for Programmers (Part 1)

Pragmatic Privacy for Programmers (Part 1)

39
Comments 1
8 min read
Effective Communication Security / Beyond 'Use Signal Use Tor'

Effective Communication Security / Beyond 'Use Signal Use Tor'

15
Comments 6
3 min read
How to Securely Store a Password in Java

How to Securely Store a Password in Java

115
Comments 21
11 min read
Mixed Content: Fetching data from HTTPS and HTTP

Mixed Content: Fetching data from HTTPS and HTTP

77
Comments 13
7 min read
How to build JWT Authorization in Angular with Router Guards and HTTP Interceptor

How to build JWT Authorization in Angular with Router Guards and HTTP Interceptor

18
Comments 1
1 min read
What It’s Like To Work Through A Security Incident

What It’s Like To Work Through A Security Incident

92
Comments 7
10 min read
Build a Basic App with Spring Boot and JPA using PostgreSQL

Build a Basic App with Spring Boot and JPA using PostgreSQL

8
Comments
19 min read
This is raw

This is raw

6
Comments
2 min read
Demystifying STRIDE Threat Models

Demystifying STRIDE Threat Models

42
Comments 2
5 min read
Password manager recommendations?

Password manager recommendations?

90
Comments 140
1 min read
3 things you might see in your logs once your site is public

3 things you might see in your logs once your site is public

45
Comments 3
4 min read
Security & HTTP Headers

Security & HTTP Headers

128
Comments 6
4 min read
npm package discovered to have bitcoin-stealing backdoor

npm package discovered to have bitcoin-stealing backdoor

73
Comments 33
1 min read
Net Core security - NWebSec to the rescue!

Net Core security - NWebSec to the rescue!

80
Comments 8
3 min read
Why Facebook's api starts with a for loop

Why Facebook's api starts with a for loop

1139
Comments 41
5 min read
Why Hash Maps are Randomized

Why Hash Maps are Randomized

36
Comments 3
2 min read
Beware of the findOne function

Beware of the findOne function

84
Comments 16
3 min read
I'm a security auditor and researcher, Ask Me Anything!

I'm a security auditor and researcher, Ask Me Anything!

38
Comments 32
2 min read
How do we improve security in the npm ecosystem?

How do we improve security in the npm ecosystem?

24
Comments 21
1 min read
How to deal with the event-stream vulnerability

How to deal with the event-stream vulnerability

35
Comments 5
2 min read
A Hypothetical Case of a Phishing Attack

A Hypothetical Case of a Phishing Attack

88
Comments 8
6 min read
Security Sprint: using Seccomp for secure containers.

Security Sprint: using Seccomp for secure containers.

20
Comments
3 min read
NPM... we all knew this would happen eventually

NPM... we all knew this would happen eventually

7
Comments 2
2 min read
セキュリティの分野で Haskell を使用する [翻訳記事]

セキュリティの分野で Haskell を使用する [翻訳記事]

11
Comments 2
2 min read
Should you care about XSS in Vue.js?

Should you care about XSS in Vue.js?

33
Comments 8
5 min read
The How To Of Port Forwarding With SSH

The How To Of Port Forwarding With SSH

51
Comments
5 min read
loading...