Social engineering
In one of the last articles, we discussed the changes in social engineering scenarios that the global COVID-19 pandemic provoked. Of course, it is impossible to consider all the subtleties within the framework of one publication, so today we will continue our conversation and tell you about the features of the attacker's physical penetration into the company's territory. It would not be superfluous to remind once again about the security measures that everyone should take in order not to become an unwitting victim.

 

Is clean and secure code a myth or a reality?
Each programming language is designed with different operating systems, platforms, coding styles and intended use in mind. We usually hear about Python, PHP, Ruby, jаvascript, Java, C, C++ and C#, as well as more modern versions of them, such as Rust, Swift, Hack and many others.

 

March 13 2022

Digital epidemics
The first computer viruses appeared back in the 1970s. They were conceived as harmless and more like games, the purpose of which was to distribute the program to the largest number of players. The participant whose program will make more copies of its own and fill the computers of others faster was declared the winner.

 

From Prototype Pollution to RCE on ZeroNight X
As part of this article, we will look at the vulnerability of Prototype Pollution on the client and AST-injection on the server and what their joint operation can lead to, as well as how they were embedded for training in the “Hack To Be Hired” competition on ZeroNights X from the Digital Security Academy.

 

User experience and security risks
Every second Thursday in November, World Usability Day is celebrated. This holiday was established in 2005 by the Association of Professionals in the Field of User Experience to promote the practicality, convenience and ease of use of digital products and services.

We, as users, share the values of usability, and as professionals, we can't help but think about security. In this article, from the point of view of security, we will consider some of the chips that are added to products and services for our convenience.

 

The security of the metaverse utopia?
A couple of decades ago, the Internet was a concept that only a few could use, but today it is an integral part of our lives. The same thing is happening with newer trends, and what is now the subject of discussion in narrow circles of specialists may soon become our new reality

 

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    November 2024    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +15 Total articles 6747
  • +12 Comments 4077
  • +24 Users : 5841