DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The API Gateway security risk you need to pay attention to

The API Gateway security risk you need to pay attention to

8
Comments 2
4 min read
Lock Your Door and Close Your Windows

Lock Your Door and Close Your Windows

8
Comments
4 min read
We've made a privacy-focused analytics platform

We've made a privacy-focused analytics platform

9
Comments 2
1 min read
NordVPN: Official response regarding the breach of one of our datacenters

NordVPN: Official response regarding the breach of one of our datacenters

4
Comments
1 min read
Go-ofile

Go-ofile

7
Comments
1 min read
Authenticate The Future: 3 Ways To Make Your Application More Secure

Authenticate The Future: 3 Ways To Make Your Application More Secure

6
Comments
4 min read
How to setup DNS over HTTPS (Doh 🍩!) in Google Chrome on MacOSX

How to setup DNS over HTTPS (Doh 🍩!) in Google Chrome on MacOSX

18
Comments
3 min read
Azure AD Application Registration Security with Graph API

Azure AD Application Registration Security with Graph API

5
Comments
6 min read
Kubernetes myths; app security 101; & change management in teams

Kubernetes myths; app security 101; & change management in teams

34
Comments
2 min read
Modern cyber security tooling should empower developers

Modern cyber security tooling should empower developers

12
Comments
3 min read
Prove you are not human - use ACME

Prove you are not human - use ACME

8
Comments
3 min read
Implementing Security for Your Business

Implementing Security for Your Business

7
Comments
3 min read
Security, meet Agile; Reviewing code you dislike; and Web Performance KPIs

Security, meet Agile; Reviewing code you dislike; and Web Performance KPIs

15
Comments
2 min read
Securing IIS

Securing IIS

8
Comments
2 min read
Upgrading APIs, Cloud security & some Engineering advice

Upgrading APIs, Cloud security & some Engineering advice

8
Comments
2 min read
Python Encryption with Trezor

Python Encryption with Trezor

5
Comments
3 min read
Trezor hardware wallet with Python

Trezor hardware wallet with Python

8
Comments
2 min read
How users and applications stay safe on the Internet: it's proxy servers all the way down

How users and applications stay safe on the Internet: it's proxy servers all the way down

91
Comments 1
9 min read
How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

6
Comments
4 min read
Why are you not using HTTPS?

Why are you not using HTTPS?

11
Comments
1 min read
Bots are Playing a Bigger Role in the Election than People Realize

Bots are Playing a Bigger Role in the Election than People Realize

6
Comments
23 min read
Compromising User Data via Push Notification Services

Compromising User Data via Push Notification Services

6
Comments
3 min read
Hack Rails with vulnerabilities by OWASP

Hack Rails with vulnerabilities by OWASP

5
Comments
1 min read
“Why would anyone hack me? I’m just a small business owner!”

“Why would anyone hack me? I’m just a small business owner!”

7
Comments
1 min read
My story of setting up Let’s Encrypt SSL on SiteGround

My story of setting up Let’s Encrypt SSL on SiteGround

6
Comments 1
1 min read
Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

8
Comments 3
1 min read
You have critical security vulnerabilities in your software but you don’t know it yet!

You have critical security vulnerabilities in your software but you don’t know it yet!

5
Comments
13 min read
Presentations I would love to watch

Presentations I would love to watch

6
Comments
2 min read
Weekly Links #3

Weekly Links #3

8
Comments
3 min read
How to Securely Backup a Seed Phrase

How to Securely Backup a Seed Phrase

5
Comments
3 min read
Why you should use uBlock Origin just like me?

Why you should use uBlock Origin just like me?

4
Comments
1 min read
The target="_blank" vulnerability by example

The target="_blank" vulnerability by example

43
Comments 15
3 min read
Robots Protect Better Than You

Robots Protect Better Than You

7
Comments
3 min read
Problems that forced me to leave Dashlane for 1Password

Problems that forced me to leave Dashlane for 1Password

2
Comments
1 min read
How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

3
Comments
6 min read
How to Build your own Amazon Ring Security System in an Afternoon

How to Build your own Amazon Ring Security System in an Afternoon

63
Comments
16 min read
Using Microsoft Defender ATP Streaming API with Misp

Using Microsoft Defender ATP Streaming API with Misp

5
Comments
6 min read
5 steps to make your iOS app more secure

5 steps to make your iOS app more secure

7
Comments
3 min read
Security Basics Every Programmer should know from the Start

Security Basics Every Programmer should know from the Start

6
Comments
3 min read
What is a password manager?

What is a password manager?

3
Comments
1 min read
Block SSH brute-force attacks

Block SSH brute-force attacks

13
Comments 7
2 min read
A maze called VPN logging policies

A maze called VPN logging policies

6
Comments 3
2 min read
Importance of GDPR Compliance in a Development Project?

Importance of GDPR Compliance in a Development Project?

3
Comments
4 min read
Protecting your digital self at Hacker Summer Camp

Protecting your digital self at Hacker Summer Camp

6
Comments
1 min read
My password policy

My password policy

4
Comments
2 min read
Blockchain Solution - Alwin Technologies

Blockchain Solution - Alwin Technologies

3
Comments 1
1 min read
TELLIT

TELLIT

9
Comments
1 min read
You can’t function in 2019 without a password manager

You can’t function in 2019 without a password manager

6
Comments
3 min read
You stole my source code on Neopets

You stole my source code on Neopets

5
Comments
7 min read
Why Should You Use Cloudflare Like I Do

Why Should You Use Cloudflare Like I Do

4
Comments
1 min read
The Dangers of Shadow IT

The Dangers of Shadow IT

4
Comments
3 min read
How to use python objects like java-script dictionaries.

How to use python objects like java-script dictionaries.

6
Comments
1 min read
Introducing Osgood

Introducing Osgood

43
Comments 5
4 min read
How to Protect a WordPress site from being Hacked

How to Protect a WordPress site from being Hacked

5
Comments
17 min read
Pipdig Under Investigation (and Your Options If You Want Out)

Pipdig Under Investigation (and Your Options If You Want Out)

5
Comments
8 min read
0-day Vulnerability for Social Warfare WordPress plugin

0-day Vulnerability for Social Warfare WordPress plugin

4
Comments
2 min read
WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

5
Comments
13 min read
WooCommerce Checkout Manager 4.2.6 Vulnerability

WooCommerce Checkout Manager 4.2.6 Vulnerability

3
Comments
1 min read
Secrets Management in Elixir Using AWS

Secrets Management in Elixir Using AWS

19
Comments
3 min read
SAST Tooling – Part 2: The selection criteria

SAST Tooling – Part 2: The selection criteria

5
Comments
3 min read
loading...