Web 3.0’s Crypto Winter Mission: Keep Our Heads Above the Hype

Despite the gloomy narratives, 2018 was hugely productive for teams building the decentralized web, says Parity’s Jutta Steiner. Source: Web...

U.S. Government Shutdown Leaves Dozens of .Gov Websites Vulnerable

As the shutdown continues into its 21st day, dozens of .gov websites haven’t renewed their TLS certificates. Source: U.S. Government...

DNS over HTTPS seeks to make internet use more private

The IETF has standardized DNS over HTTPS (DOH), which encrypts DNS queries so eavesdroppers can’t tell what sites users connect...

From Reactive to Proactive: Security as the Bedrock of the SDLC process

Secure code development should be a priority, not an afterthought, and adopting the software development life cycle process is a...

HTTP/3: Come for the speed, stay for the security

Key personnel at the Internet Engineering Task Force (IETF) have suggested basing the next version of a core web protocol...

What is WPA3? Wi-Fi security protocol strengthens connections

The Wi-Fi Alliance has introduced the first major security improvement to Wi-Fi in about 14 years: WPA3. Learn how it...

Download Winamp 5.8 with Windows 8/10 compatibility

A leaked version of Winamp 5.8 recently spread over the Internet. Consequently, we have decided to make this new version...

Finally, a fix for the encrypted web’s Achilles’ heel

Everyone knew that SNI needed to be fixed sooner or later, but nobody was quite sure how. Source: Finally, a...

Smarter analytics for big data in banking

Banks have a strong foundation in using data. New research reveals how they can get even more from their analytics...

TLS 1.3 Won’t Break Everything

The newest version of TLS won’t break everything in your security infrastructure, but you do need to be prepared for...

1 2 3 4 5 10