Is it really safe to pass sensitive data to another script via stdin, compared to passing via arguments (Linux)

Yes, the transfer to the script via arguments is visible through ps -ax, /proc/<pid>/cmdline etc., BUT if someone has already gained access to your account from the outside (e.g. by hacking your browser) he will have no trouble looki… Continue reading Is it really safe to pass sensitive data to another script via stdin, compared to passing via arguments (Linux)

Why do some password fields allow users to see what they type while others do not?

When I type a password somewhere, I see placeholders (black dots) in place of characters. But sometimes, there is also a toggle button to view the password like in a regular input field (typically an icon with the shape of an eye, or a tex… Continue reading Why do some password fields allow users to see what they type while others do not?

Password hashing algorithms that can transform an existing hash to a different cost setting without knowledge of the password

The password hashing competition, started in 2014 and Argon2 was the winner in 2015, listed evaluation criteria for the competition. There is an interesting one in the Functionality section;

Ability to transform an existing hash to a diff… Continue reading Password hashing algorithms that can transform an existing hash to a different cost setting without knowledge of the password

Is it a good idea to check if the password provided at registration is leaked on any lists? And then, prevent the user from using it?

A while ago, I was tipped off that it’s a good idea to check if the password provided at registration is contained in any list of leaked passwords. I’m not in the information security field, but I really like to take aspects like this seri… Continue reading Is it a good idea to check if the password provided at registration is leaked on any lists? And then, prevent the user from using it?

The 5 Most Hotly Contested Security Trends and Questions

The worst thing that organizations can do is take a hard stance with their cybersecurity efforts. The digital threat landscape is constantly evolving. If organizations settle into a viewpoint, they could elevate one source of risk into something unrealistic—all while missing other digital threats. This reflects just how much assumptions drive cybersecurity-related decisions. Forbes put […]

The post The 5 Most Hotly Contested Security Trends and Questions appeared first on Security Intelligence.

Continue reading The 5 Most Hotly Contested Security Trends and Questions