Will the new australian telecoms bill allow to compel companies to build spy functionality into their software? [migrated]

According to https://parlinfo.aph.gov.au/parlInfo/download/legislation/bills/r6195_aspassed/toc_pdf/18204b01.pdf companies could be required to enhance their software to allow for spying. They would enforce this via a “techni… Continue reading Will the new australian telecoms bill allow to compel companies to build spy functionality into their software? [migrated]

Is it poor practice to use the last 4 digits of a social security number as an identifier?

Is it poor practice to use the last 4 digits of a social security number as an identifier?

The last 4 digits of a person’s social are commonly used as a means of personal identification/authentication, but I can’t find guid… Continue reading Is it poor practice to use the last 4 digits of a social security number as an identifier?

How dangerous is it to verify my account with a Visa picture, passport, or ID card?

In order to play Poker online on some accounts you have to verify your age and identity.
And to do that, I need to email message the site with a picture of my Visa or Passport or ID card.

How dangerous is it for me to sen… Continue reading How dangerous is it to verify my account with a Visa picture, passport, or ID card?

What are the security issues of exposing default server home page in public internet?

I have seen on internet where several website companies have exposed the default home page of web server such as Tomcat, NGNIX, Apache web server. I always believe it is not the best practice to expose default web server pag… Continue reading What are the security issues of exposing default server home page in public internet?

Which protocol could have been likely candidates for leaking a laptop serial number

Having read this article, one line in particular caught my attention:

The AFP raided the boy’s family home last year and found two Apple laptops with serial numbers that matched those of the devices used in the hacking.

Continue reading Which protocol could have been likely candidates for leaking a laptop serial number