Security Alerts & News
by Tymoteusz A. Góral

#219 How to Safely Store a Password in 2016
Proactively upgrading legacy hashes is a security win over an opportunistic strategy (rehashing when the user logs in, but leave the insecure hashes in the database for inactive users): With a proactive strategy, if your server gets compromised before everyone logs in again, their passwords are already using an acceptable algorithm.
Read more
#224 Wearable warning: IEEE highlights top security risks for fitness trackers
#223 Honeypots illustrate scores of vulnerabilities in medical devices
#222 The Secret Behind CryptoWall’s Success - IMPERVA report (PDF)
#221 Apple rejects order to unlock gunman's iPhone
#220 How to bypass LG V10 smartphone’s fingerprint security in just 30 seconds
#219 How to Safely Store a Password in 2016
#218 Russian cyberspy group uses simple yet effective Linux Trojan
#217 FBI: Apple ordered to unlock San Bernardino gunman's iPhone
#216 Australia: WA Parliament experiences cybersecurity breach: Report
#215 Massive US-planned cyberattack against Iran went well beyond Stuxnet
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12