security
!security
#

SolarWinds: it’s the hack that keeps on growing. On Monday, researchers announced the discovery of yet another malware strain used by foreign hackers to infiltrate a wide milieu of American government agencies and companies…



Question: How much entropy should a password have to ensure it will never be vulnerable to a brute-force attack? Can an impossibly efficient computer–the MOAC–crack your password? …



Google can sometimes serve as a tool for hackers to gain sensitive information from the Internet. …


Storing plain text passwords is one of the worst habits of our time. Don’t store plain text passwords, instead use passwords hashing…







Why do we still need Root CAs?

Most root store have between 50 and 150 CAs. If any of them is compromised, it could be very quickly lead to MITM on any website. Certificate Transparency goes a long way to limit the damage, but it only allows detecting fraud, but by the time it is detected, it might very well be too late and the f…










Confidentiality Integrity Availability