Zero-Day Vulnerabilities: User Defence Guide
TL;DR Unpatched zero-day vulnerabilities are a serious threat. This guide gives you practical steps to reduce […]
Zero Knowledge Voting with Trusted Server
TL;DR Yes, a zero knowledge proof of voting can be made using a trusted authentication server […]
ZeroNet: 51% Attack Risks & Mitigation
TL;DR Yes, ZeroNet websites *are* susceptible to a 51% control attack (also known as a majority […]
Zip Codes & PII: Are They Personal Data?
TL;DR Generally, a single zip code on its own isn’t usually considered directly personal identifying information […]
YouTube Stream Hacking: Am I at Risk?
TL;DR Watching a hacked YouTube stream directly won’t usually hack *you*. However, it’s possible for malicious […]
Yubikey 2FA: Can Providers Track You?
TL;DR Yes, a provider using Yubikey for two-factor authentication (2FA) can potentially identify you even if […]
Yubikey Key Theft: Endpoint Risks
TL;DR An infected endpoint can potentially steal private keys from a FIDO U2F Hardware Token (like […]
YubiKey Security: Initial Setup with Yubi Cloud
TL;DR No, YubiKeys aren’t fully secure immediately after purchase for use with Yubi Cloud. While they […]
ZAP: Brute Force Passwords
TL;DR This guide shows you how to use OWASP ZAP to brute force alphanumeric passwords between […]
ZAP Script Authentication: A Step-by-Step Guide
TL;DR This guide shows you how to authenticate with OWASP ZAP using a script, allowing it […]