Tech does not just watch: Take action against Russia’s war on Ukraine 🇺🇦, and take action against Israel’s oppression and killing of Palestinians and the occupation and destruction of Palestine (history) 🇵🇸 Hide

Frontend Dogma

“security” News Archive (2)

Entry (Sources) and Other Related TopicsDate#
Understanding CSRF Attacks (zel)205
npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git)204
, , ,
Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (sny)203
, ,
Unexpectedly HTTPS?202
How to Respond to Growing Supply Chain Security Risks?201
, , ,
The Web Is for Everyone: Our Vision for the Evolution of the Web (moz)200
, , , , ,
Using HTTPS in Your Development Environment199
,
How to Prevent SQL Injection Attacks in Node.js198
, , ,
Can You Get Pwned With CSS?197
How to Fix Your Security Vulnerabilities With npm Override196
, , ,
Never, Ever, Ever Use Pixelation for Redacting Text195
, ,
Accessibly Insecure194
Lessons Learned From Publishing a Content Security Policy193
,
Ain’t No Party Like a Third Party (ada/css)192
,
Security (htt)191
, , ,
GitHub’s Commitment to npm Ecosystem Security (git)190
,
Understanding and Implementing OAuth2 in Node.js (hon)189
, ,
How to Win at CORS (jaf)188
, , ,
The Options for Password-Revealing Inputs (chr/css)187
, , ,
npm Security Best Practices (owa)186
,
Encoding Data for POST Requests (jaf)185
,
NPM Global Audit184
, , ,
Understanding and Preventing Common Security Vulnerabilities183
Open Source Insights182
, , ,
I Learned to Love the Same-Origin Policy (eee/css)181
Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of180
TLS and mTLS Demystified179
,
Best Practices for Inclusive Textual Websites178
, ,
What Is mTLS and How Does It Work?177
Mutual TLS: Stuff You Should Know176
,
Don’t Try to Sanitize Input—Escape Output175
,
Encrypting DNS Query Bad for Performance? (erw)174
, , ,
Apple Joins FIDO Alliance, Commits to Getting Rid of Passwords (zdn)173
, , ,
How to Automatically Update Your JavaScript Dependencies (spa/clo)172
, , , ,
What SSL Is, and Which Certificate Type Is Right for You171
, , ,
Usability and Security; Better Together (24w)170
,
Server-Side Includes (SSI) Injection (owa)169
How Internet Security Works: TLS, SSL, and CA (osd)168
, , ,
Security and Privacy for Our Times (luk/w3c)167
,
Web Feature Developers Told to Dial Up Attention on Privacy and Security (rip/tec)166
, ,
CSS Security Vulnerabilities (chr/css)165
, ,
Understanding Subresource Integrity (dre/sma)164
,
W3C Strategic Highlights: Web for All (Security, Privacy, Identity) (w3c)163
, ,
Guide to Web Authentication162
, , ,
It’s Beginning to Look a Lot Like XSSmas (24w)161
, ,
Protecting Your Site With Feature Policy (rac/sma)160
,
AWS Security Guide: 7 Best Practices to Avoid Security Risks (wom)159
, ,
WebAuthn, FIDO2 Infuse Browsers, Platforms With Strong Authentication (dar)158
, , , ,
In Your Face, Passwords: Big Three Browsers All Adopt Authentication API157
, , , , , , , , ,
HTTPS Is Easy (tro)156
,
WordPress Security as a Process (sma)155
,
Making Your Website Faster and Safer With Cloudflare154
, ,
Validating Dependencies in the Project With npm-check and depcheck153
, , , ,
Third Party CSS Is Not Safe (jaf)152
, ,
Attackers Can Steal Sensitive Data by Abusing CSS—CSS Exfil Vulnerability151
,
Building Secure JavaScript Applications150
, , , ,
Creating Secure Password Resets With JSON Web Tokens (sma)149
, ,
The Complete Guide to Switching From HTTP to HTTPS (sma)148
,
How (Not) to Control Your CDN (mno)147
, ,
How to Secure WordPress With SSL146
, ,
Encrypting IP Addresses (ber)145
, , ,
How to Secure Your Web App With HTTP Headers (sma)144
, , , ,
Just Another HTTPS Nudge (chr/css)143
On EME in HTML5 (tim/w3c)142
, , , , ,
Using SSH Securely (ann)141
More Than 300 Federal Gov Websites Fail to Meet Domain Encryption Deadline140
, , ,
Content Security Policy Level 2 (mik+/w3c)139
,
Content Security Policy, Your Future Best Friend (sma)138
,
A Refined Content Security Policy (web)137
, , , , ,
The Performance Benefits of “rel=noopener” (jaf)136
, ,
Web Platform Security Boundaries (ann)135
Subresource Integrity (dev+/w3c)134
, ,
W3C Looks to Secure the Web (sdt)133
,
Distribution Packages Considered Insecure132
,
The Current State of Web Security (An Interview With Anselm Hannemann) (hel+/css)131
, , , , ,
Eliminating Known Vulnerabilities With Snyk (sma)130
,
10 Web Predictions for 2016 (cra)129
, , , , , , , ,
HSTS and “Let’s Encrypt” (tka)128
, ,
An in-Depth Look at CORS127
, ,
Why Passwordless Authentication Works (cra)126
,
Introduction to TLS and SSL (ope)125
, , , ,
A Simple Developer Error Is Exposing Private Information on Thousands of Websites (owe)124
, , ,
More Tips to Further Secure WordPress (eli)123
, ,
Improving Web Security With the Content Security Policy122
,
Deprecating HTTP (yoa)121
, ,
Mozilla Wants to Deprecate Non-Secure HTTP, Will Make Proposals to W3C “Soon” (epr/ven)120
, ,
Want Fancy Firefox Features? Secure Your Website (sts/cne)119
, , ,
WordPress Front End Security: CSRF and Nonces (css)118
,
Introduction to WordPress Front End Security: Escaping the Things (css)117
, ,
What Are the Security Risks of HTML5 Apps?116
,
Moving to HTTPS on WordPress (chr/css)115
,
Same-Origin Policy (ann)114
,
Securing the Web (w3c)113
mXSS (gaz)112
,
It’s Time to Encrypt the Entire Internet (kli/wir)111
, , ,
Cross-Origin Resource Sharing (ann/w3c)110
,
Despite Automatic Updates, Old Browsers Are Still a Problem (edb/zdn)109
, , , , , , , , ,
Cross-Origin Resource Sharing on Track to Become a W3C Recommendation (sdt)108
, ,
Bid to Kill CAPTCHA Security Test Gains Momentum107
,
We Should All Have Something to Hide106
Mobile Website Security105
, ,
WordPress Security Tips104
,
Brad Hill: “HTML5 Security Realities” (chr/css)103
, ,
Bulletproof Your Drupal Website102
Top 10 PHP Security Vulnerabilities101
,
A Front End Engineer’s Manifesto (zac)100
, , , , , , , ,
A JavaScript Security Flaw99
The Secure Programmer’s Pledge98
An Introduction to Content Security Policy (mik/dev)97
,
Cross-Site Scripting Attacks (XSS)96
,
How to Secure Your WordPress Website (sma)95
, ,
Using CORS (dev)94
Some Notes on the Recent XML Encryption Attack (w3c)93
,
XML Encryption Flaw Leaves Web Services Vulnerable (eur)92
, ,
HTTPS Is More Secure, So Why Isn’t the Web Using It? (ars)91
, ,
Web Cryptography: Salted Hash and Other Tasty Dishes (ali)90
What Are the JSON Security Concerns in Web Development? (sim)89
What Is Cross Site Scripting or XSS? (chr/css)88
, ,
Web Developers Accountable for HTML 5 Security87
HTML5 Raises New Security Issues86
,
10 Useful WordPress Security Tweaks (sma)85
Web Security: Are You Part of the Problem? (cod/sma)84
, ,
Full Frontal ’09: Chris Heilmann on JavaScript Security (mic/aja)83
Finally Something to Get a Few More Users Off of IE 6? (dal/aja)82
, ,
The Internet Is Closing to Innovation (zit/new)81
You Could Be Getting Clickjacked (tec)80
, ,
Video and Audio Tags and Cross Origin Access (dal/aja)79
,
Dumb Security Tips: Think Before You Follow Online Guides (tan)78
Simon Willison, @Media Ajax (mic/aja)77
, , , ,
Evil GIFs: Hiding Java in Your Image (dal/aja)76
, ,
What’s in a “window.name”? (cod/aja)75
Internet Explorer 8 Promises Better Standards Compliance… and a Whole Lot More (est/cio)74
, , ,
Ajaxian Roundup for January 2008: JavaScript Turtles and IE 8 (dal/aja)73
, , , , , , , , , , , , , , , , , ,
Book Recommendation: AJAX Security by Hoffman and Sullivan72
, ,
Ajaxian Roundup for December 2007: It’s the End of the Year as We Know It (dal/aja)71
, , , , , , , , , , , , , ,
Cross Site Scripting Joy (tri)70
Making JavaScript Safe With No Script (dal/aja)69
Automated Security Scanners Choke on AJAX (rey/aja)68
,
How to Protect a JSON or JavaScript Service67
, ,
Securing Your JSON66
, ,
CSRF Protection Idea (dal/aja)65
JavaScript Security Experiments (mar)64
,
Prepare for Attack—Making Your Web Applications More Secure63
, , ,
JSON vs. XML: Browser Security Model (car)62
, , ,
The Dangers of Cross-Domain AJAX With Flash (shi)61
, ,
DOM vs. Web (mno)60
,
AJAX: Is Your Application Secure Enough?59
, ,
Top 7 PHP Security Blunders58
, ,
Validate Your Input!57
JavaScript Security56
File Upload Security (lac)55
,
Spot the Security Hole54
JavaScript and Security (sim)53
Handling Content From Strangers52
Web Services Security Gets Serious51
Getting Started With XML Security50
,
Sorting Out the Web Services Security Landscape (tec)49
, ,
Website Experience Analyzer48
, , ,
Server Port Scanner47
, , ,
Abuse Contact Lookup46
, ,
Content Security Policy Validator (CSP Validator)45
, , ,
Content Security Policy Validator (Google)44
, , ,
Cookie Use Checker43
, ,
Cross-Site WebSocket Hijacking Tester42
,
DNSSEC Checker41
, ,
Domain or IP Spam Checker40
, , ,
Email Blacklist Checker39
, ,
Malware and Security Scanner38
,
Site and Origin Comparer37
, ,
SPF Record Checker36
, , ,
SSL Checker (Qualys)35
, , ,
SSL Checker (SSL Shopper)34
, , ,
Virus Scanner33
,
Website Certificate Fingerprint Checker32
, ,
Website Headers Analyzer (Mozilla) (moz)31
, , ,
Website Headers Analyzer (Security Headers)30
, , ,
Website Scam Checker29
,
Website Security Checker (Google)28
,
Website Security Checker (Norton)27
,
AES Encrypter and Decrypter26
, ,
Blowfish Hash Generator25
, ,
Browser Fingerprint Checker24
, ,
“chmod” Calculator23
, ,
CSR Decoder22
,
Device Vulnerability Checker21
, ,
Executable File Analyzer20
,
Hash Generator19
, ,
HMAC Checker18
,
MD5 Hash Generator17
, ,
Password Generator (Arantius.com)16
, ,
Password Generator (Frontend Dogma) (fro)15
, , ,
Password Generator (Gibson Research Corporation)14
, ,
Password Security Checker and Generator13
, ,
Password Security Checker12
, ,
Security Leak Victim Checker11
,
SHA-512 Hash Generator10
, ,
SPF Record Generator9
, , ,
SSL Client Checker8
, , ,
Subresource Integrity Hash Generator (moz)7
, ,
User Identity Generator6
, , ,
Website Headers Analyzer (Dries Buytaert) (dri)5
, , ,
WebRTC and IP Address Leak Checker4
, , , , ,
security.txt Generator3
, ,
ASCII to Unicode Encoder and Decoder2
, , , ,
SSL Checker (EXPERTE.com)1
, , ,