Smashing Security podcast #382: CrowdStrike, Dark Wire, and the Paris Olympics

Computers blue-screen-of-death around the world! The Paris Olympics is at risk of attack! And the FBI pull off the biggest sting operation in history by running a secret end-to-end encrypted messaging app! All this and much much more is discussed in th… Continue reading Smashing Security podcast #382: CrowdStrike, Dark Wire, and the Paris Olympics

Is local password recovery for each device a viable security approach?

I’m developing a multi-platform application using Flutter, which involves sensitive user data and requires both online and offline accessibility. To enhance security and usability, I am considering implementing a local password recovery me… Continue reading Is local password recovery for each device a viable security approach?

Overlooked essentials: API security best practices

In this Help Net Security, Ankita Gupta, CEO at Akto, discusses API security best practices, advocating for authentication protocols like OAuth 2.0 and OpenID Connect, strict HTTPS encryption, and the use of JWTs for stateless authentication. Gupta rec… Continue reading Overlooked essentials: API security best practices

How safe are my app’s keys inside the TPM against other apps trying to impersonate mine?

This is a follow-up of these two questions about using the TPM to store application’s keys. While both have great answers, there is a specific aspect I am missing:
How safe are the keys inside the TPM against another (malicious) app trying… Continue reading How safe are my app’s keys inside the TPM against other apps trying to impersonate mine?

Encrypted traffic: A double-edged sword for network defenders

Organizations are ramping up their use of encrypted traffic to lock down data. Could they be making it easier to hide threats in the process? On one hand, encryption means enhanced privacy, but it can also make the job of security analysts much harder…. Continue reading Encrypted traffic: A double-edged sword for network defenders