Search
Decentralization First: Privacy Coin Monero Cuts Out ASIC Miners to Stay Independent
13.3.2019
Privacy coin Monero introduces ASIC-resistance so it can remain an independent, open-source project — here are the details
SEC’s Assessment Concludes that Ethereum is not a Security, IBM Joins Crypto Custody Business
13.3.2019
U.S. Securities and Commission Exchange (SEC) Chairman Jay Clayton has written a letter to U.S. Rep. Ted Budd in which he agrees with Division of Corporate Finance Director Bill Hinman evaluation that Ethereum, the second largest digital asset by market […]
The post SEC’s Assessment Concludes...
I Spun up a Scalable WordPress Server Environment with Trellis, and You Can, Too
28.2.2019
A few years back, my fledgling website design agency was starting to take shape; however, we had one problem: managing clients' web servers and code deployments. We were unable to build a streamlined process of provisioning servers and maintaining operating system security patches. We had...
Google přidal podporu Asistenta pro Nest Security. Nikdo ale netušil, že má zařízení mikrofon
20.2.2019
Google v roce 2017 uvedl Nest Security System, který slouží k hlídání domácnosti. V únoru firma vydala aktualizaci pro Nest Guard, která z něj vytvoří chytrý reproduktor – uvnitř přistane Google Asistent. Vtip je v tom, že nikdo netušil, že je součástí zařízení i mikrofon. Informoval o tom Business
Konference Security 2019: Jaké jsou největší trendy oblasti kybernetické bezpečnosti?
18.2.2019
Už po 27. se ve čtvrtek 28. února v Clarion Congress hotelu v Praze sejdou odborníci na kybernetickou bezpečnost z celého světa. Nezávislou konferenci pořádá společnost AEC a i letos bude rozdělena na dva paralelní programy: manažerský a technický. Program začne zahájením konference v 9 hodin a...
Secure Dependencies with GitHub and Dependabot
6.2.2019
Updating and confirming security for dependencies from open source projects just became a lot more easier, GitHub announced
Od sledování uživatelů skrze CSS ke Content Security Policy
26.1.2019
Jste v bezpečí před sledováním s vypnutým JavaScriptem? Ne. Máte vypnout i kaskádové styly? Tak ano, můžete. Ale opravdu to dáte? Podíváme se na současné hranice a možnosti sledování uživatelů webu skrze kaskádové styly. A řekneme si něco o Content Security Policy
The Premise and Promise of Digital Securities (DS)
10.1.2019
What they are, how they improve on existing models, and what makes them different from utility tokens. (Part 1 of 3 in a series about Digital Securities) From the CoinMarketCap editorial desk: Continuing with our exploration of security tokens, we […]
The post The Premise and Promise...
Nejčtenější články roku 2018
31.12.2018
Co vás na Zdrojáku nejvíc zaujalo v uplynulém roce? 10 nejčtenějších článků. Docker. Otevřené .git repozitáře. Nábor. Eventloop. Přestavba Angularu. Security.txt. Atomické CSS. Webdesign 2017. PHP 7.3. Zranitelnosti dle OWASP
Tokenized Securities (STO) – A Contrarian Overview
20.12.2018
Radical Finance gives a quick overview about security tokens and their challenges on the CoinMarketCap blog.
The post Tokenized Securities (STO) – A Contrarian Overview appeared first on CoinMarketCap
WDRL — Edition 250: Efficient Servers, Doka, Permission Blocking, Payment Security and Thinking in Triplicate UX
30.11.2018
Hey,
Everyone here has different thoughts on Open Source. It’s a topic widely discussed between developers and it causes a lot of trouble. Just recently again, we faced a major security incident in a popular npm package. It happened because the initial author of the free and open source package...
Protecting Laravel Sites with IP Intelligence
24.11.2018
From the moment you publish a website, you need to be wary of security. From hackers to script-kiddies, you can’t always be sure of where the next attack could come from.
So, as developers,
There is no longer any such thing as Computer Security
21.9.2018
Remember "cybersecurity"?
Mysterious hooded computer guys doing mysterious hooded computer guy .. things! Who knows what kind of naughty digital mischief they might be up to?
Unfortunately, we now live in a world where this kind of digital mischief is literally rewriting the world's...
Crypto Exchange Hacks in Review: Proactive Steps and Expert Advice
31.8.2018
Only since the beginning of the year, over $742,68 million have been stolen from crypto exchanges, and a series of attacks goes on. Why does this happen and how can exchanges defend themselves?
Script & Style Show: Episode 15: CSP with Scott Helme
14.7.2018
In this episode: Todd dials in from a poppin’ KCDC while David dials in with a massive headache. Scott Helme dials in from lovely Manchester to discuss web security, specifically the criminally underused CSP API. Join us to learn what CSP is, why it’s important, how it works,...
Blockchain’s Once-Feared 51% Attack Is Now Becoming Regular
8.6.2018
At least five cryptocurrencies have recently been hit with a 51% attack, a vulnerability users used to scoff at
WDRL — Edition 229: Photo Grid, Chrome Security UX, Dark Themes with CSS and about Resumes
25.5.2018
Hey,
This week I was really not sure whether to send the newsletter or wait at least until the beginning of the week. But I think I shouldn’t hold the content I found just because of a new law called “GDPR” that forces a lot of companies to send a lot of emails regarding updated privacy...
CDN, Web Security, and DDoS Protection from Incapsula (Sponsored)
16.5.2018
There used to be day that you could have a small to large website that didn’t require protection and worldwide CDN but, with how easy it is to initiate a DDoS attack and how important website speed is for search engine placement, it’s a given that you should look for a service to handle...
Black Swan Security Congress bude řešit efekt „černé labutě“ v IT bezpečnosti
16.5.2018
Black Swan Security Congress otevře téma narůstajícího významu neznámých hrozeb nebo rizik, ke kterým dochází s malou pravděpodobností, za to jejich dopad na organizace může být zničující. O fenoménu „černých labutí“ přijedou diskutovat uznávání etičtí hackeři zejména z Česka a Slovenka. Metafora...
K čemu je soubor security.txt
9.4.2018
Přidejte si na web soubor security.txt a umístěte do něj správné kontaktní údaje, ať lidé, kteří chtějí nahlásit bezpečnostní chyby, nemusí dlouze studovat, kam report poslat. K čemu takové informace jsou vám ukážu na jednom konkrétním příkladu