Do we allow our applications too much?
Many people have photos of their passport, driver's license, and child's birth certificate on their phone. But not everyone realizes how easy it is to access them. One…
Many people have photos of their passport, driver's license, and child's birth certificate on their phone. But not everyone realizes how easy it is to access them. One…
The world of vulnerabilities is quite diverse. Usually, hackers try to achieve their goals using arbitrary code execution vulnerabilities, the very abbreviation RCE.…
Anastasia Vazhinskaya is an information security engineer, not a front-end developer, but her presentation became the most important for the main hall of the FrontendConf…
tekkix, hello! I am Alexander Leonov, leading expert of the PT Expert Security Center laboratory. Every month, my team of analysts at Positive Technologies researches…
In this article, we will look at how to organize simple secrets management for applications in Kubernetes using the GitOps approach. We store secrets in git securely…
This article is a translation of the Password Security Guidance from the National Cyber Security Centre of Canada. There is a lot of information about passwords available…
In this article, we have collected the main "symptoms" of mobile surveillance that we found on the Internet. Each of them is commented on by a specialist in the field…
In the article, I will tell a case from the practice of analyzing the protection of Android applications. Names and places of events have been changed. Any coincidences…