Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:crocs:securityfeeds [2015-01-12 12:44] petrspublic:crocs:securityfeeds [2016-12-01 13:28] (current) – external edit 127.0.0.1
Line 4: Line 4:
   * Our lab twitter https://twitter.com/CRoCS_MUNI   * Our lab twitter https://twitter.com/CRoCS_MUNI
  
-General security blogs:+**General security blogs:**
   * Schneier on Security https://www.schneier.com/. Bruce Schneier's posts    * Schneier on Security https://www.schneier.com/. Bruce Schneier's posts 
-  * Naked Security - Sophos https://nakedsecurity.sophos.com/ - frequent posts on security related topics 
   * Krebs on Security https://krebsonsecurity.com/. Brian Krebs's in depth posts about spam ecosystem, banking scams, underground forums, skimmers...   * Krebs on Security https://krebsonsecurity.com/. Brian Krebs's in depth posts about spam ecosystem, banking scams, underground forums, skimmers...
   * Light Blue Touchpaper https://www.lightbluetouchpaper.org/. Security Group at the University of Cambridge Computer Laboratory   * Light Blue Touchpaper https://www.lightbluetouchpaper.org/. Security Group at the University of Cambridge Computer Laboratory
   * Freedom to Tinker blogs https://freedom-to-tinker.com/. Princeton's Center for Information Technology Policy   * Freedom to Tinker blogs https://freedom-to-tinker.com/. Princeton's Center for Information Technology Policy
 +  * Naked Security - Sophos https://nakedsecurity.sophos.com/ - frequent posts on security related topics
  
-Cryptography:+**Cryptography:**
   * A Few Thoughts on Cryptographic Engineering http://blog.cryptographyengineering.com/. Matthew Green's in depth descriptions of various cryptography topics    * A Few Thoughts on Cryptographic Engineering http://blog.cryptographyengineering.com/. Matthew Green's in depth descriptions of various cryptography topics 
  
  
-Network security:+**Network security:**
   * TaoSecurity http://taosecurity.blogspot.com/ - network security blog by Richard Bejtlich    * TaoSecurity http://taosecurity.blogspot.com/ - network security blog by Richard Bejtlich 
   * CERT twitters: https://twitter.com/CERT_Polska_en, https://twitter.com/circl_lu, https://twitter.com/certbe - nice analysis of selected issues   * CERT twitters: https://twitter.com/CERT_Polska_en, https://twitter.com/circl_lu, https://twitter.com/certbe - nice analysis of selected issues
 +  * Malware-related posts: http://contagiodump.blogspot.com, https://malwr.com/, http://www.sans.org/newsletters/at-risk, http://www.secureworks.com/resources/blog/  
  
-Software security:+**Software security:**
   * Coverity's software testing blog http://blog.coverity.com/   * Coverity's software testing blog http://blog.coverity.com/
  
-Secure hardware: +**Secure hardware:** 
-  * Ludovic Rousseau blog  http://ludovicrousseau.blogspot.com/+  * Ludovic Rousseau blog  http://ludovicrousseau.blogspot.com/ - smart card related posts
   * Hack a Day http://hackaday.com/ - hardware and sometimes also secure hardware   * Hack a Day http://hackaday.com/ - hardware and sometimes also secure hardware