• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
28th September 2019

Are you sure you wiped your hard drive properly?

Almost 60% of second-hand hard drives hold leftover data from previous owners, a study shows The post Are you sure you wiped your hard drive properly? appeared first on WeLiveSecurity Sourced from Editor

Read more
0 comment

27th September 2019

Frankenstein Migration: Framework-Agnostic Approach (Part 1)

Frankenstein Migration: Framework-Agnostic Approach (Part 1) Frankenstein Migration: Framework-Agnostic Approach (Part 1) Denys Mishunov 2019-09-26T12:30:59+02:00 2019-09-27T01:07:40+00:00 Migration, according to Oxford Learner’s Dictionary, is “the slow or gradual movement of something from one place to another.” This term describes many...

Read more
0 comment

27th September 2019

No summer vacations for Zebrocy

ESET researchers describe the latest components used in a recent Sednit campaign The post No summer vacations for Zebrocy appeared first on WeLiveSecurity Sourced from ESET Research

Read more
0 comment

25th September 2019

Creating Tables In Figma

Creating Tables In Figma Creating Tables In Figma Sasha Belichenko 2019-09-25T12:30:59+02:00 2019-09-25T21:05:13+00:00 In this tutorial, we will talk about how tables can be created in Figma by using components and Atomic Design methodology. We will also take a look...

Read more
0 comment

25th September 2019

Microsoft rushes out patch for Internet Explorer zero‑day

There is no word on which threat actor is abusing the severe vulnerability for attacks The post Microsoft rushes out patch for Internet Explorer zero‑day appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

24th September 2019

Designing Complex Responsive Tables In WordPress

Designing Complex Responsive Tables In WordPress Designing Complex Responsive Tables In WordPress Suzanne Scacca 2019-09-24T13:00:59+02:00 2019-09-24T17:06:04+00:00 (This is a sponsored article.) Mobile devices can be problematic for displaying complex tables and charts that would otherwise stretch the entire width...

Read more
0 comment

24th September 2019

Do companies take cybersecurity seriously enough?

Many companies are ranking cybersecurity as a top 5 priority but their actions do not measure up to the claim, a survey finds The post Do companies take cybersecurity seriously enough? appeared first on WeLiveSecurity Sourced from Editor

Read more
0 comment

23rd September 2019

Is There Such A Thing As Too Much Social Proof?

Is There Such A Thing As Too Much Social Proof? Is There Such A Thing As Too Much Social Proof? Suzanne Scacca 2019-09-23T13:30:59+02:00 2019-09-23T12:36:33+00:00 It’s very easy to start a business these days. But succeeding in that business is...

Read more
0 comment

23rd September 2019

Hacking my airplane – BlackHat edition

After welcoming hacking research, automobile technology started to get better at defending against hacks. So why has the airline industry not been as welcoming? The post Hacking my airplane – BlackHat edition appeared first on WeLiveSecurity Sourced from Cameron...

Read more
0 comment

22nd September 2019

In the Balkans, businesses are under fire from a double‑barreled weapon

ESET researchers discovered a campaign that uses two malicious tools with similar capabilities to ensure both resilience and broader potential for the attackers The post In the Balkans, businesses are under fire from a double‑barreled weapon appeared first on...

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

20 January,2021 How To Build A Node.js API For Ethereum Blockchain
20 January,2021 FBI warns of voice phishing attacks stealing corporate credentials
19 January,2021 Using Grommet In React Applications
19 January,2021 WhatsApp delays privacy policy update after confusion, backlash
18 January,2021 CES 2021: Router swarms invade your home (and know where you are)
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net