Skip to main content

Home/ InnoDev/ Group items tagged security

Rss Feed Group items tagged

anonymous

Google Infrastructure Security Design Overview | Google Infrastructure Security Design ... - 0 views

  •  
    Learn how security is designed into Google's technical infrastructure. Google uses this infrastructure to build its internet services, including both consumer and enterprise services.
Stano Bocinec

Zaujimave security linky #1 - 2 views

http://sakurity.com/blog/2015/02/28/openuri.html - "Ruby: Using open-uri? Check your code - you're playing with fire! " http://blog.honeybadger.io/ruby-security-tutorial-and-rails-security-guide/ "...

security ssh programming linux android

started by Stano Bocinec on 04 Mar 15 no follow-up yet
Michal Holub

Hakiri Facets - 0 views

  •  
    How secure are your Ruby projects? Scan Gemfile.lock for vulnerabilities, take action, and ship secure apps!
Stano Bocinec

Ruby Security Have You Not! - Hakiri - 0 views

  •  
    The first metric I was wondering about is the distribution of gems in Gemfiles. How many gems does a common Ruby developer use in their projects? The numbers are somewhat expected: the average number of gems per Gemfile is 113.08 with the standard deviation of 52.19.... The next question I had was how many of those gems contain at least one vulnerability? The numbers are staggering! 1,333 Gemfiles, or 66% of the total, are affected! I definitely didn't expect that two thirds of all projects would contain at least one publicly known vulnerability.
Stano Bocinec

BSides Vienna - 0 views

  •  
    zajtra (v sobotu) sa vo Viedni chysta BSides - zaujimava security konferencia, tak ak nahodou nemate co robit, mozete ist zadarmo rozsirovat security obzory :) http://bsidesvienna.at/talks/
Peter Vojtek

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle (Gemalto) - 2 views

  •  
    AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards.
Stano Bocinec

Fingerprints are Usernames, not Passwords - 2 views

  •  
    jedna pekna prednaska z 2015 len pre pripomenutie, ze fingerprinty ani ine casti biometrie nie je vhodne pouzivat na autentifikaciu
  •  
    Presne tak, ja som sa to este na skole u doc Jana Hudeca ucil. Ten vzdy srandoval ze ako presvedcit pouzivatelov, aby to neakceptovali je strasit ich moznostou odseknutia prstov. Len ked chce niekto nieco kupit tak to niekto vyroby a preda.
Juraj Visnovsky

Image Tragick - 0 views

  •  
    There are multiple vulnerabilities in ImageMagick, a package commonly used by web services to process images. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted images. The exploit for this vulnerability is being used in the wild.
Peter Vojtek

Apple explains how the iPhone's fingerprint sensor keeps your info secure - 3 views

  •  
    su tam fajn informacie, napriklad: "With one finger enrolled, the chance of a random match with someone else is 1 in 50,000. ". (to je FAR).
zajac_polny

D-Link backdoor - 0 views

Trosku off topic, ale myslim ze dolezite vediet: Niektore D-Link routre maju jednoduchy backdoor, takze ak ho najdete v nasledujucom zozname, odporucam co najskor preinstalovat firmware. DIR-100 D...

security

started by zajac_polny on 16 Oct 13 no follow-up yet
Stano Bocinec

I was just asked to crack a program in a job interview - 1 views

  •  
    + part 2 http://erenyagdiran.github.io/I-was-just-asked-to-crack-a-program-Part-2/ zaujimavy kratky clanok o crackovani neznameho programu.
Stano Bocinec

LibreSSL - an OpenSSL replacement - the first 30 days - 1 views

  •  
    zaujimava comicsans prezentacia o OpenSSL a potencialnom nastupcovi LibreSSL.
Stano Bocinec

A look inside Facebook's source code - 2 views

  •  
    So what have we learnt today? I think the main thing to take away from this is you shouldn't use public services such as Pastebin to post internal source code. Some creepy guy like me is going to collect it all and write about it. Another thing is to make sure debug information is never pushed to production. I didn't put much effort in to this but there will be more of Facebook's source code floating around out there.
Stano Bocinec

Hacking Unicode - 3 views

  •  
    Unicode has always been a bit misunderstood even by professionals. This is why several years ago we pulled these slides together to clear things up. The presentation is a bit old but still relevant. You may still learn a few things about Unicode that you did not know.
Stano Bocinec

How to take over the computer of any Java (or Clojure or Scala) developer - 3 views

  •  
    mozno trosku bulvarny titulok tykajuci sa beznej http komunikacie, ale je zaujimave to vidiet, ako lahko sa da v tomto svete modulov prist k nestastiu :) myslim,ze sa to rovnako tyka ruby gemov, chef receptov a vsetkeho dalsieho, co obycajne automatizovane tahame cez http..
Peter Vojtek

Don't leave developers in the dark - 0 views

  •  
    Need-to-know (like other security measures) can be misused by persons who wish to refuse others access to information they hold in an attempt to increase their personal power or prevent unwelcome review of their work.
Juraj Visnovsky

Support for Ruby 1.9.3 has ended - 1 views

  •  
    As of today, all support for Ruby 1.9.3 has ended. Bug and security fixes from more recent Ruby versions will no longer be backported to 1.9.3.
  •  
    necakane skoro :| som zvedavy, pri ktorej verzii zakotvia nase projekty. Ruby v2.1 ma nejake problemy s GC http://stackoverflow.com/questions/27102565/memory-usage-increase-with-ruby-2-1-versus-ruby-2-0-or-1-9 a webafis uz podporuje Ruby 2.0+ ?
1 - 18 of 18
Showing 20 items per page