Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity How does TLS 1.3 differ from TLS 1.2? 05 Dec 2018 SearchSecurity How do L1TF vulnerabilities compare to Spectre? 04 Dec 2018 SearchSecurity What are the security risks of third-party app stores? 04 Dec 2018 SearchSecurity How to configure browsers to avoid web cache poisoning 15 Nov 2018 SearchSecurity How is Plead malware used for cyberespionage attacks? 09 Nov 2018 SearchSecurity What is behind the growing trend of BEC attacks? 08 Nov 2018 SearchSecurity How does site isolation defend against Spectre vulnerabilities? 07 Nov 2018 SearchSecurity How does the public Venmo API pose a threat for users? 06 Nov 2018 SearchSecurity How can U2F authentication end phishing attacks? 05 Nov 2018 SearchSecurity The implications of the NetSpectre vulnerability 18 Oct 2018 SearchSecurity How does Apple's Quick Look endanger user privacy? 12 Oct 2018 SearchSecurity How did Netflix phishing attacks use legitimate TLS certificates? 11 Oct 2018 SearchSecurity How do hackers use legitimate admin tools to compromise networks? 10 Oct 2018 SearchSecurity How was Google Firebase security bypassed? 09 Oct 2018 SearchSecurity How does TLBleed abuse the Hyper-Threading feature in Intel chips? 08 Oct 2018 SearchSecurity How does the SynAck ransomware use Process Doppelgänging? 14 Sep 2018 SearchSecurity How does Telegram malware bypass end-to-end encryption? 13 Sep 2018 SearchSecurity How does Android Protected Confirmation provide security for users? 12 Sep 2018 SearchSecurity What issues can arise from hardware debug exception flaws? 11 Sep 2018 SearchSecurity How does the Android Rowhammer exploit affect users? 10 Sep 2018 SearchSecurity How the STARTTLS Everywhere initiative will affect surveillance 06 Sep 2018 SearchSecurity How to find the best privileged identity management tool 24 Aug 2018 SearchSecurity Weighing privileged identity management tools' pros and cons 24 Aug 2018 SearchSecurity How to mitigate the Efail flaws in OpenPGP and S/MIME 16 Aug 2018 SearchSecurity Facebook user data: How do malicious apps steal user data? 10 Aug 2018 SearchSecurity UPnP vulnerability: How is the UPnP protocol being misused? 09 Aug 2018 SearchSecurity How do SDKs for ad networks cause data leaks? 08 Aug 2018 SearchSecurity What does the expansion of MANRS mean for BGP security? 07 Aug 2018 SearchSecurity Microsoft's NTFS flaw: What are the potential consequences? 06 Aug 2018 SearchSecurity Domain fronting: Why cloud providers are concerned about it 19 Jul 2018 SearchSecurity Drupalgeddon 2.0: Why is this vulnerability highly critical? 13 Jul 2018 SearchSecurity How can cryptojacking attacks in Chrome be stopped? 12 Jul 2018 SearchSecurity What are the implications of DNS over HTTPS for privacy? 11 Jul 2018 SearchSecurity What effect does GDPR have on the WHOIS database? 10 Jul 2018 SearchSecurity How did an old, unpatched Firefox bug expose master passwords? 09 Jul 2018 SearchSecurity How can domain generation algorithms be used to bypass ad blockers? 08 Jun 2018 SearchSecurity How does a SAML vulnerability affect single sign-on systems? 07 Jun 2018 SearchSecurity How lattice-based cryptography will improve encryption 07 Jun 2018 SearchSecurity How did cryptomining malware exploit a Telegram vulnerability? 06 Jun 2018 SearchSecurity What risks do untrusted certificates pose to enterprises? 05 Jun 2018 SearchSecurity How bad is the iBoot source code leak for Apple security? 04 Jun 2018 SearchSecurity Are Meltdown and Spectre real vulnerabilities or mere flaws? 17 May 2018 SearchSecurity How will the new WPA3 protocol strengthen password security? 04 May 2018 SearchSecurity IoT botnets: How are new Mirai variants impacting systems? 03 May 2018 SearchSecurity How were Android Pixel vulnerabilities exploited? 02 May 2018 SearchSecurity How did an Electron framework flaw put Slack at risk? 01 May 2018 SearchSecurity What is included in the mPOS security standard from PCI SSC? 30 Apr 2018 SearchSecurity How a Blizzard DNS rebinding flaw put millions of gamers at risk 05 Apr 2018 SearchSecurity How can improper certificate pinning be stopped by the Spinner tool? 09 Mar 2018 SearchSecurity How does a WPAD attack work and how can it be prevented? 08 Mar 2018 SearchSecurity How can users deal with app trackers that collect customer data? 07 Mar 2018 SearchSecurity How does Tizi spyware affect Android apps? 06 Mar 2018 SearchSecurity The Keeper browser extension flaw: How can users stay secure? 05 Mar 2018 SearchSecurity Why the Bleichenbacher attack is still around 01 Mar 2018 SearchSecurity Fight a targeted cyberattack with network segmentation, monitoring 05 Feb 2018 SearchSecurity Bypassing facial recognition: The means, motive and opportunity 01 Feb 2018 SearchSecurity The ROCA vulnerability: How it works and what to do about it 04 Jan 2018 SearchSecurity How machine learning-powered password guessing impacts security 07 Dec 2017 SearchSecurity How does the GhostHook attack bypass Microsoft PatchGuard? 01 Dec 2017 SearchSecurity Use caution with OAuth 2.0 protocol for enterprise logins 30 Nov 2017 SearchSecurity How can Intel AMT be used to bypass the Windows firewall? 30 Nov 2017 SearchSecurity How do source code reviews of security products work? 29 Nov 2017 SearchSecurity How can attacks like the Cherry Blossom project be prevented? 28 Nov 2017 SearchSecurity How does the Stack Clash vulnerability target Unix-based OSes? 27 Nov 2017 SearchSecurity How to prepare for potential IPv6 DDoS attacks 09 Nov 2017 SearchSecurity What knowledge factors qualify for true two-factor authentication? 20 Oct 2017 SearchSecurity Running a private certificate authority: What are the risks? 19 Oct 2017 SearchSecurity How app libraries share user data, even without permission 19 Oct 2017 SearchSecurity How did an ImageMagick vulnerability endanger Yahoo servers? 17 Oct 2017 SearchSecurity How does Google Play Protect aim to improve Android security? 16 Oct 2017 SearchSecurity How the Docker REST API can be turned against enterprises 05 Oct 2017 SearchSecurity Securing endpoints with supplementary tools protects data 02 Oct 2017 SearchSecurity How can users detect dangerous open ports in mobile apps? 14 Sep 2017 SearchSecurity How can memory corruption attacks threaten smartphones? 13 Sep 2017 SearchSecurity How do code-reuse attacks bypass Windows 10 security features? 12 Sep 2017 SearchSecurity How is Pegasus malware different on Android than on iOS? 11 Sep 2017 SearchSecurity How NotPetya ransomware used legitimate tools to move laterally 31 Aug 2017 SearchSecurity Libpurple flaw: How does it affect connected IM clients? 10 Aug 2017 SearchSecurity Are biometric authentication methods and systems the answer? 09 Aug 2017 SearchSecurity What tools can bypass Google's CAPTCHA challenges? 09 Aug 2017 SearchSecurity How did a Moodle security vulnerability enable remote code execution? 08 Aug 2017 SearchSecurity How did flaws in WhatsApp and Telegram enable account takeovers? 07 Aug 2017 SearchSecurity Samsung Knox platform: Can it improve Android device security? 28 Jul 2017 SearchSecurity SHA-1 collision: How the attack completely breaks the hash function 27 Jul 2017 SearchSecurity Android sandboxing tools: How can work data separation be bypassed? 14 Jul 2017 SearchSecurity How are forged cookies used in attacks on online user accounts? 13 Jul 2017 SearchSecurity What made iOS apps handling sensitive data vulnerable to MitM attacks? 12 Jul 2017 SearchSecurity Ticketbleed flaw: How can SSL session identities be protected? 11 Jul 2017 SearchSecurity WordPress REST API flaw: How did it lead to widespread attacks? 10 Jul 2017 SearchSecurity How the use of invalid certificates undermines cybersecurity 22 Jun 2017 SearchSecurity How can a NULL pointer dereference flaw create a DoS attack? 09 Jun 2017 SearchSecurity The Apple Notify flaw: How does it allow malicious script injection? 08 Jun 2017 SearchSecurity How does Facebook's Delegated Recovery enable account verification? 07 Jun 2017 SearchSecurity Adobe Acrobat Chrome extension: What are the risks? 06 Jun 2017 SearchSecurity Cisco WebEx extension flaw: How does the patch fall short? 05 Jun 2017 SearchSecurity How SSH key management and security can be improved 25 May 2017 SearchSecurity Avoid privilege creep from the software development team 10 May 2017 SearchSecurity How effective is geofencing technology as a security method? 05 May 2017 SearchSecurity Why did the PHPMailer library vulnerability have to be patched twice? 04 May 2017 SearchSecurity Same-origin policy: How did Adobe Flash Player's implementation fail? 03 May 2017 1 2 3 4