Are there any security reasons against "drop-www" (using example.com instead of www.example.com)?

Are there any security reasons against "drop-www"?
In other words, are there any security reasons against using an apex [1] domain name such as example.com instead of a subdomain such as www.example.com?
Quote https://www.bjornjo… Continue reading Are there any security reasons against "drop-www" (using example.com instead of www.example.com)?

How many times need e-mail headers be signed with DKIM to mitigate DKIM header injection attacks?

Many people have written about DKIM header injection attacks. [1] The suggestion to mitigate it is to oversign headers and to rotate any DKIM keys that were previously used to sign e-mails where not all important headers have been oversign… Continue reading How many times need e-mail headers be signed with DKIM to mitigate DKIM header injection attacks?

How strong do linux user account passwords have to be when using Full Disk Encryption (FDE) too?

Suppose a non-root user was compromised over remote by malware that is now using su (tty or similar) trying to login as root, trying every possible password by bruteforcing.

assume: full disk encryption with a strong passsword is in place… Continue reading How strong do linux user account passwords have to be when using Full Disk Encryption (FDE) too?

Is it possible to use systemd seccomp filtering for running applications from command line?

Example systemd unit file, what I mean by “seccomp”.

ProtectSystem=full
ProtectHome=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectControlGroups=true
PrivateTmp=true
PrivateMounts=true
PrivateDevices=true
MemoryDenyWrite… Continue reading Is it possible to use systemd seccomp filtering for running applications from command line?

How to secure a domain name from insider threats, domain hijacking in a corperate context?

Usually there’s just one e-mail / e-mail password / domain registrar username / password. And perhaps one 2FA (google authenticator) device and a 2FA recovery code.

Either an employee has access to these credentials or not. … Continue reading How to secure a domain name from insider threats, domain hijacking in a corperate context?