Cybersecurity
Application security, threat analysis, secure coding practices, and the evolving cybersecurity landscape.
6 Articles
Your Fitness App Is a Surveillance Tool
A French newspaper recently tracked the real-time location of France's only aircraft carrier — the Charles de Gaulle, one of the most strategically sensitive...
The Evolution of sudo: Unix su to Modern Privileges
Here's a fact that surprises most people: when you type your password into sudo, you don't see any feedback at all. No asterisks, no dots, nothing. The cursor...
When Internet Safety Laws Become Censorship Tools
In 2023, a domestic violence support forum was blocked by a major UK ISP's content filter. The filter, designed to protect children from harmful content, had...
Quantum Cryptography: What Developers Actually Need to Know
Charles Bennett and Gilles Brassard won the Turing Award for their foundational work on quantum information science — specifically, for the BB84 quantum key...
What the Xbox Hack Teaches About Hardware Security Models
Microsoft designed the Xbox One's security architecture to be impenetrable. A hardware root of trust. A custom hypervisor. Encrypted storage with per-console...
The Blind Spots in Cloud Authentication Logging
A security team at TrustedSec recently disclosed their third and fourth methods for bypassing Azure sign-in logging. That's four independent techniques for...