DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

12
Comments
3 min read
A House of Cards: An Exploration of Security When Building Docker Containers

A House of Cards: An Exploration of Security When Building Docker Containers

31
Comments 2
10 min read
A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

13
Comments
2 min read
Find security issues before the code goes into production

Find security issues before the code goes into production

20
Comments 1
7 min read
Beyond the login screen - Part II

Beyond the login screen - Part II

14
Comments
5 min read
Visualize AWS Flow Logs in a Visual Environment (closed beta)

Visualize AWS Flow Logs in a Visual Environment (closed beta)

7
Comments
1 min read
Beyond the login screen - Part I

Beyond the login screen - Part I

17
Comments 2
2 min read
Homographs, Attack!

Homographs, Attack!

317
Comments 30
10 min read
Using HTTP Headers to Secure Your Site

Using HTTP Headers to Secure Your Site

225
Comments
9 min read
Airline websites don’t care about your privacy follow-up: Emirates responds to my article with…

Airline websites don’t care about your privacy follow-up: Emirates responds to my article with…

13
Comments 1
5 min read
Four Security Principles That Software Developers Should Follow

Four Security Principles That Software Developers Should Follow

211
Comments 21
8 min read
Please Stop Using Local Storage

Please Stop Using Local Storage

1113
Comments 203
11 min read
Security Sprint: What I learnt in a CTF

Security Sprint: What I learnt in a CTF

56
Comments 5
2 min read
Adding Free SSL Certificates To Static Websites via AWS Certificate Manager

Adding Free SSL Certificates To Static Websites via AWS Certificate Manager

29
Comments
4 min read
Linux Syslog Server And Log Management

Linux Syslog Server And Log Management

13
Comments
1 min read
[PoC] Password-Based user roles and triggers/actions

[PoC] Password-Based user roles and triggers/actions

9
Comments
4 min read
I learned enough Web Crypto to be dangerous

I learned enough Web Crypto to be dangerous

17
Comments 6
4 min read
How screwed would your employer be if you died suddenly?

How screwed would your employer be if you died suddenly?

22
Comments 16
5 min read
Add security.txt to your website

Add security.txt to your website

12
Comments
2 min read
Dark patterns with the HTML 5.2 <dialog> tag and Chrome for fun and profit

Dark patterns with the HTML 5.2 <dialog> tag and Chrome for fun and profit

13
Comments 1
1 min read
This is how Meltdown works

This is how Meltdown works

215
Comments 26
5 min read
The Case for Automatic Updates

The Case for Automatic Updates

11
Comments 1
5 min read
Preparing for the EU General Data Protection Regulation with 12 steps

Preparing for the EU General Data Protection Regulation with 12 steps

15
Comments
3 min read
Things I think I know about Cryptography

Things I think I know about Cryptography

18
Comments 1
5 min read
Build Your Own Invoicing Service with Node, Coinbase, Bitcoin, and Okta

Build Your Own Invoicing Service with Node, Coinbase, Bitcoin, and Okta

34
Comments 4
17 min read
Processor Security Flaws

Processor Security Flaws

38
Comments 9
1 min read
How to put Google Invisible reCaptcha on your website

How to put Google Invisible reCaptcha on your website

11
Comments
1 min read
Bulletproof Node — Security Best Practises

Bulletproof Node — Security Best Practises

17
Comments
5 min read
Open Source API Gateways?

Open Source API Gateways?

31
Comments 27
1 min read
Crypto Show And Tell: The Wonders of Diffie-Hellman-Merkle

Crypto Show And Tell: The Wonders of Diffie-Hellman-Merkle

29
Comments 2
5 min read
Security Sprint week 9: Privacy politics and the internet

Security Sprint week 9: Privacy politics and the internet

13
Comments 3
2 min read
Security Sprint week 7&8: A chat with a security expert

Security Sprint week 7&8: A chat with a security expert

16
Comments
4 min read
Software security is hopelessly broken

Software security is hopelessly broken

29
Comments 8
8 min read
The Spectre of the Zygote

The Spectre of the Zygote

15
Comments
6 min read
Four Tips for a More Secure Website

Four Tips for a More Secure Website

49
Comments 6
7 min read
You Just Need to Speculate to Exfiltrate

You Just Need to Speculate to Exfiltrate

15
Comments
11 min read
My Journey From Getting Hacked to a Security Consultant (Ethical Hacking)

My Journey From Getting Hacked to a Security Consultant (Ethical Hacking)

47
Comments 7
4 min read
Useful Linux Security Tricks To Harden Your System

Useful Linux Security Tricks To Harden Your System

26
Comments
1 min read
Spectre & Meltdown: How does this affect mobile apps?

Spectre & Meltdown: How does this affect mobile apps?

15
Comments 3
1 min read
Client and Server API Protection

Client and Server API Protection

12
Comments 2
2 min read
DNS Gazer: Passive DNS query/reply logging tool for security monitoring

DNS Gazer: Passive DNS query/reply logging tool for security monitoring

15
Comments
4 min read
Dear Internet, Stop Taking My Information Over HTTP

Dear Internet, Stop Taking My Information Over HTTP

19
Comments
3 min read
Mitigating cross-site scripting with Content Security Policy

Mitigating cross-site scripting with Content Security Policy

37
Comments 8
3 min read
Critique My Plan: API Key for Authentication

Critique My Plan: API Key for Authentication

37
Comments 14
4 min read
Security Sprint: week 6 - Perl, forensic and new limits

Security Sprint: week 6 - Perl, forensic and new limits

20
Comments 1
4 min read
Security Sprint: Week 5: Network capture probe

Security Sprint: Week 5: Network capture probe

9
Comments
2 min read
Security Sprint week 4: CA pairs creation with openssl

Security Sprint week 4: CA pairs creation with openssl

10
Comments 1
5 min read
Things you wanted to know about storing passwords but were afraid to ask

Things you wanted to know about storing passwords but were afraid to ask

30
Comments 13
10 min read
Hands-free Security Scanning in .NET Applications

Hands-free Security Scanning in .NET Applications

19
Comments 1
4 min read
Non-authenticated Email Ordering

Non-authenticated Email Ordering

16
Comments 9
1 min read
Distributed Ledger and ethereum token creation

Distributed Ledger and ethereum token creation

26
Comments 2
4 min read
Clicking a Facebook link logs me into another person's account

Clicking a Facebook link logs me into another person's account

22
Comments 5
2 min read
Arduboy Rubber Ducky

Arduboy Rubber Ducky

10
Comments 1
3 min read
ネットワークの監視

ネットワークの監視

13
Comments
1 min read
Security Sprint: week 3 - Distributed Ledger system and our first Catch The Flag training

Security Sprint: week 3 - Distributed Ledger system and our first Catch The Flag training

12
Comments
3 min read
MongoDB Basics: Configuring Role-Based Access Control (RBAC)

MongoDB Basics: Configuring Role-Based Access Control (RBAC)

12
Comments
7 min read
Security Sprint: week 2 - Choosing a nice point to sniff and using tcpdump for packet analysis

Security Sprint: week 2 - Choosing a nice point to sniff and using tcpdump for packet analysis

16
Comments
3 min read
With great power comes great responsibility

With great power comes great responsibility

14
Comments 10
7 min read
Do you use security key?

Do you use security key?

16
Comments 5
1 min read
Security Sprint: week 1 - My project and first studies

Security Sprint: week 1 - My project and first studies

12
Comments 2
1 min read
loading...