Quantcast
Channel: Security Musings » cool
Browsing latest articles
Browse All 12 View Live

Image may be NSFW.
Clik here to view.

Product Review: The hiddn Crypto Adapter Offers Secure USB Storage

Recently I had the chance to test out a clever little device called the hiddn Crypto Adapter. Made by Norway-based High Density Devices, the adapter looks somewhat like a miniature desk calculator with...

View Article



Image may be NSFW.
Clik here to view.

Crockford’s History of JavaScript

Ever wonder about how we came to have the technologies and programming languages used today? Yahoo’s senior JavaScript architect Douglas Crockford gave a presentation in early 2010 that traces the...

View Article

Image may be NSFW.
Clik here to view.

Apricorn Aegis Padlock Review

Disclaimer: I requested and received an evaluation version of the Apricorn Aegis Padlock. I was sent the 250GB AES-256 version, and I need to return it to the company in 30 days. This is a pretty sweet...

View Article

Image may be NSFW.
Clik here to view.

Can Client-Side JavaScript Protect Itself?

Security researcher Mario Heiderich (also creator of the HTML5 Security Cheatsheet and lead developer for PHPIDS) has been posting some interesting cross-site scripting challenges lately that highlight...

View Article

Image may be NSFW.
Clik here to view.

How a Platform Using HTML5 Can Affect the Security of Your Website

tl;dr Abstract To improve performance, particularly for mobile users, many websites have started caching app logic on client devices via HTML5 local storage. Unfortunately, this can make common...

View Article


Image may be NSFW.
Clik here to view.

The Rise of Two Factor Authentication

It’s a little embarrassing to admit, but it seems that the mistakes of one person globally syndicated columnist have led to a rapid increase in the acceptance and use of two-factor authentication...

View Article

Image may be NSFW.
Clik here to view.

Keeping Up-to-date

Yesterday, this story on Wired was making the rounds: How a Google Headhunter’s E-mail Unraveled a Massive Net Security Hole. Sure, the title is probably hyperbole, but it is an interesting story. At a...

View Article

Image may be NSFW.
Clik here to view.

Encryption Math(s)

Numberphile recently posted a video about the math behind RSA encryption.  In the video below, a brief description of public key cryptography is given and then we are shown a simple example of the math...

View Article


Image may be NSFW.
Clik here to view.

Windows 8 Authentication and Compliance

Two weeks ago, I finally got a chance to try out a Windows 8 system. First, I have to give huge kudos to Dell, who makes the XPS 12 system I’m playing with. This system seems to be the ideal platform...

View Article


Image may be NSFW.
Clik here to view.

Second Factor FTW

On Saturday I was saved by a second factor of authentication. I was playing the new SimCity game on my home computer in the basement, when my gaming session (surprisingly, it was playable that day) was...

View Article
Browsing latest articles
Browse All 12 View Live




Latest Images