An Introduction to HTTP Response Headers for Security

HTTP response headers aim to help protect web applications from cross-site scripting (XSS), man-in-the-middle (MitM) attacks, clickjacking, cross-site request forgery and other threat vectors.

The post An Introduction to HTTP Response Headers for Security appeared first on Security Intelligence.

Continue reading An Introduction to HTTP Response Headers for Security

ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned?

ADS-B technology supplements pilots’ situational awareness and provides valuable weather data, but it remains to be seen whether it will impact aviation cybersecurity and passengers’ data privacy.

The post ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned? appeared first on Security Intelligence.

Continue reading ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned?

A Primer on IoT Security Risks

IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.

The post A Primer on IoT Security Risks appeared first on Security Intelligence.

Continue reading A Primer on IoT Security Risks

Are Drone-Led Cyberattacks the Wave of the Future?

As technology evolves and becomes increasingly available to consumers and fraudsters, drone-led cyberattacks may become more common.

The post Are Drone-Led Cyberattacks the Wave of the Future? appeared first on Security Intelligence.

Continue reading Are Drone-Led Cyberattacks the Wave of the Future?