Explore >> Select a destination


You are here

feross.org
| | textslashplain.com
3.3 parsecs away

Travel
| | One attack technique I've seen in use recently involves enticing the victim to enter their password into a locally-downloaded HTML file. The attack begins by the victim receiving an email lure with a HTML file attachment (for me, often with the .shtml file extension): When the user opens the file, a HTML-based credential prompt is...
| | tobert.github.io
3.3 parsecs away

Travel
| | [AI summary] The author advises non-technical family members to switch from Internet Explorer to a more secure browser due to its vulnerability to zero-day exploits and malware.
| | cornay.co.za
2.5 parsecs away

Travel
| | [AI summary] This article discusses recent cybersecurity developments, including Apple's expanded bug bounty program, the removal of ToTok from app stores due to potential surveillance risks, vulnerabilities in SMS-based security systems, and Microsoft's Chromium-based Edge browser and its security implications.
| | www.danstroot.com
15.4 parsecs away

Travel
| In every organization I have worked with managing user authentication and passwords was a huge challenge. The key issue was that the "old" password best practices were **failed attempts to fix the user, not the system**.