TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 7)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

What are the security risks of allowing users to add iframes?

In my web app I'm using a good sanitizer which let's me to whitelist some specific html tags.I'd like to allow <iframe> so that users can...

Asked on 11/21/2021

1 answer

FIDO2 - Where do Android and IOS platform authenticators store private key credentials?

I'm new to FIDO2 specification. I'm aware that Android and IOS devices support FIDO2 protocols (even Android phones could act as a physical key for FIDO2 authentication). However, Could anyone...

Asked on 11/21/2021 by Danh Thanh Nguyen

0 answer

Nginx module security

Im considering using this nginx module https://github.com/leev/ngx_http_geoip2_module to get the Information from which Country the IP is.My question is since im compiling the module by myself,...

Asked on 11/21/2021 by member2

1 answer

Third party cookies - does secure, httponly matter?

Was viewing this page on cookies and wondering for those under Third party cookies, such as TS*, TS01*, TSXXXXXXX_d, what does it mean by them being a...

Asked on 11/21/2021 by Pang Ser Lark

1 answer

Emergency method to erase all data off a machine within seconds

Imagine you are carrying highly sensitive information with you, maybe on a mission in a war zone. You get in an ambush and quickly need to erase all the files...

Asked on 11/21/2021 by user238815

15 answer

As of 2020, is there any fix for 802.11w deadlock?

This is an old 802.11w issue that has been documented and it's a very big issue as clients can be selectively attacked and enter a deadlock, where only disabling and...

Asked on 11/19/2021 by Motheus

0 answer

Can input value escape a JSON object?

I am passing value from input filled directly into a script function inside a JSON object. I was thinking, is it possible that this input can escape this object and...

Asked on 11/16/2021

0 answer

What's the actual danger of public key spoofing?

I am reading an excellent beginner's cryptography tutorial, and on this page there is the following blurb:Public-key cryptosystems have one significant challenge − the user needs to trust...

Asked on 11/14/2021

2 answer

Why would PayPal send messages from another domain?

I have just received a message asking to consent to PayPal policy updates from the domain:https://epl.paypal-communication.comThe actual link is full of trackers. Given the domain name, it sounds like...

Asked on 11/14/2021

2 answer

How should we respond to a root CA breach?

In the unlikely event that a root CA is breached (eg. Comodo, DigiNotar), how should people and companies respond? (Assume the people responding practice infosec & are aware of...

Asked on 11/11/2021

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP