Remove tag
article thumbnail

Hack Yourself First Workshops in Australia, Denmark and Portugal (Virtually, of Course)

Troy Hunt

I want to talk about 3 upcoming events which Scott Helme and I are going to be running our Hack Yourself First workshop at starting with this one: NDC Security Australia, 26-27 March, AU$800 This is an extra special event that we've only just decided to run. The website is up and running and you can go and register right now.

Hacking 253
article thumbnail

WordCamp Miami 2018 – A Tenth Anniversary Event

SiteLock

Friday Workshops. Friday was set aside for session workshops. Developers Workshop. E-commerce Workshop. The Developers Workshop focused exclusively on the new Gutenberg editor. One of the most exciting things Jamie learned about Gutenberg is the use of / shorthand to autofill tags.

Malware 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Subresource Integrity and Upgrade-Insecure-Requests are Now Supported in Microsoft Edge

Troy Hunt

Edge now joins the other major browsers in rejecting any script which doesn't hash down to the value specified in the integrity tag. I jumped into Windows Update, took the new bits and tested the version again: So the update is good, let's look at what that now means for the test: Success!

article thumbnail

Ask a Security Pro: What Is Website Encryption?

SiteLock

Over the last year I’ve led a multitude of security workshops aimed to educate entry-level WordPress users about website security. Some of the questions I regularly field in these workshops are related to the mechanics of SSL certificates, and their role in protecting website data from prying eyes.

article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

There's a verification process where control of the domain needs to be demonstrated (email to a WHOIS address, DNS entry or a file or meta tag on the site), after which all aliases on the domain and the breaches they've appeared in is returned. At the time of writing, over 110k domain searches have been performed and verified.

article thumbnail

Locking Down Your Website Scripts with CSP, Hashes, Nonces and Report URI

Troy Hunt

I run a workshop titled Hack Yourself First in which people usually responsible for building web apps get to try their hand at breaking them. That's pretty much XSS 101 - just get an alert box to fire - and reflecting a script tag is one of the most fundamental techniques attackers use to run their script on your website. Using Nonces.

Hacking 219
article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

We were able to import the list of MAC addresses of the Cisco Meraki APs, to ensure that the APs were named appropriately and tagged, using a single source of truth document shared with the NOC management and partners, with the ability to update en masse at any time. This also included the Tag for the SSIDs.