Remove tag alexa
article thumbnail

Maciej Ceg?owski on Privacy in the Information Age

Schneier on Security

If I'm subjected to facial recognition at the airport, or tagged on social media at a little league game, or my public library installs an always-on Alexa microphone, no one is violating my legal rights. Ambient privacy is particularly hard to protect where it extends into social and public spaces outside the reach of privacy law.

article thumbnail

Why No HTTPS? Questions Answered, New Data, Path Forward

Troy Hunt

I ran Scott's latest crawl of the Alexa Top 1M sites and grabbed the JSON for sites served over HTTP (he makes all of these publicly accessible so you can follow along if you'd like). Consequently, the HTTP list alone won't cut it and the Alexa Top 1M list minus the HTTPS list also won't cut it either, so what are we left with?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Container Security and Cloud Native Best Practices

Security Boulevard

Alexa Cardenas. Appropriately name and tag each container image. Alexa Hernandez. Container Security and Cloud Native Best Practices. Fri, 12/09/2022 - 11:15. What Is a Container? A container is one standard, standalone unit of software. Containers contain container images. The Importance of Ecosystem for Cloud Native Solutions.

article thumbnail

Subresource Integrity and Upgrade-Insecure-Requests are Now Supported in Microsoft Edge

Troy Hunt

Edge now joins the other major browsers in rejecting any script which doesn't hash down to the value specified in the integrity tag. Now consider a feature like Upgrade-Insecure-Requests in the content of Scott Helme's Alexa Top 1 Million analysis from Feb : We've got less than 2.5% In short - prioritisation.

article thumbnail

HUMAN Cements Leadership Position in Bot Mitigation and Fight Against Fraud

CyberSecurity Insiders

HUMAN expanded its leadership team with the addition of Alexa Raad as the company’s first Chief People, Purpose and Policy Officer.

InfoSec 52
article thumbnail

Why No HTTPS? Here's the World's Largest Websites Not Redirecting Insecure Requests to HTTPS

Troy Hunt

For the last few years, Scott has been continuously crawling the Alexa Top Million websites and publishing 6-monthly reports on their security things. I started by setting the domain's country per Alexa's definition. I used that to help fill in a bunch of the gaps left after the Alexa data was pulled in. Data Source. American!

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Vamosi: In the fall of 2019, viewers of Good Morning America awoke to hear the following: Good Morning America: [Alexa, dim the lights] There’s a new warning this morning for everyone using Alexa, Siri, Google Home, or any of those wildly popular voice-controlled digital assistants. TheHackerMind.com.

Hacking 52