Mobile and Social – the Threats You Should Know About
(For more resources related to this topic, see here.)
A prediction of the future (and the lottery numbers for next week) scams
Security threats, such as...
RubyGems strong_password v0.0.7 hijacked; infected thread and attacker account isolated for now
Last week, a developer Tute Costa notified Ruby users that the strong_password v0.0.7 rubygem has been hijacked. The malicious actor published v0.0.7 containing the...
Understanding the big picture
(For more resources related to this topic, see here.)
So we've got this thing for authentication and authorization. Let's see who is responsible and what...
Facebook unfriends Twitter. Cross-posted tweets on Facebook disappear temporarily.
Following Facebook’s move to restrict cross-posts from other platforms earlier this month via changes to its API platform, many users noticed their old Twitter...
Cyber security news bulletin – Wednesday 25 April
Welcome to this week's cyber security news bulletin. There's news of malware targeting hospitals, NATO attacking a fictional country (yes, seriously), and big security...
Fundamentals
(For more resources related to this topic, see here.)
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment ( VA) and Penetrating Testing ( PT or PenTest )...
Rounding up…
(For more resources related to this topic, see here.)
We have now successfully learned how to secure our users' passwords using hashes; however, we should...
test-article
Service Invocation
Time for action – creating the book warehousing process
Let's create the BookWarehousingBPEL BPEL process:
We will open the SOA composite by double-clicking on the...
GE’s 2 models of hospital anesthesia machines found with vulnerabilities, says it won’t harm...
As per the reports from ZDNet, security researchers from CyberMDX, a healthcare cybersecurity firm found vulnerabilities in two models of hospital anesthesia machines manufactured...
General Considerations
(For more resources related to this topic, see here.)
Building secure Node.js applications will require an understanding of the many different layers that it is...