Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
public:crocs:securityfeeds [2015-01-12 12:44] petrspublic:crocs:securityfeeds [2015-01-13 09:45] petrs
Line 4: Line 4:
   * Our lab twitter https://twitter.com/CRoCS_MUNI   * Our lab twitter https://twitter.com/CRoCS_MUNI
  
-General security blogs:+**General security blogs:**
   * Schneier on Security https://www.schneier.com/. Bruce Schneier's posts    * Schneier on Security https://www.schneier.com/. Bruce Schneier's posts 
-  * Naked Security - Sophos https://nakedsecurity.sophos.com/ - frequent posts on security related topics 
   * Krebs on Security https://krebsonsecurity.com/. Brian Krebs's in depth posts about spam ecosystem, banking scams, underground forums, skimmers...   * Krebs on Security https://krebsonsecurity.com/. Brian Krebs's in depth posts about spam ecosystem, banking scams, underground forums, skimmers...
   * Light Blue Touchpaper https://www.lightbluetouchpaper.org/. Security Group at the University of Cambridge Computer Laboratory   * Light Blue Touchpaper https://www.lightbluetouchpaper.org/. Security Group at the University of Cambridge Computer Laboratory
   * Freedom to Tinker blogs https://freedom-to-tinker.com/. Princeton's Center for Information Technology Policy   * Freedom to Tinker blogs https://freedom-to-tinker.com/. Princeton's Center for Information Technology Policy
 +  * Naked Security - Sophos https://nakedsecurity.sophos.com/ - frequent posts on security related topics
  
-Cryptography:+**Cryptography:**
   * A Few Thoughts on Cryptographic Engineering http://blog.cryptographyengineering.com/. Matthew Green's in depth descriptions of various cryptography topics    * A Few Thoughts on Cryptographic Engineering http://blog.cryptographyengineering.com/. Matthew Green's in depth descriptions of various cryptography topics 
  
  
-Network security:+**Network security:**
   * TaoSecurity http://taosecurity.blogspot.com/ - network security blog by Richard Bejtlich    * TaoSecurity http://taosecurity.blogspot.com/ - network security blog by Richard Bejtlich 
   * CERT twitters: https://twitter.com/CERT_Polska_en, https://twitter.com/circl_lu, https://twitter.com/certbe - nice analysis of selected issues   * CERT twitters: https://twitter.com/CERT_Polska_en, https://twitter.com/circl_lu, https://twitter.com/certbe - nice analysis of selected issues
 +  * Malware-related posts: http://contagiodump.blogspot.com, https://malwr.com/, http://www.sans.org/newsletters/at-risk, http://www.secureworks.com/resources/blog/  
  
-Software security:+**Software security:**
   * Coverity's software testing blog http://blog.coverity.com/   * Coverity's software testing blog http://blog.coverity.com/
  
-Secure hardware: +**Secure hardware:** 
-  * Ludovic Rousseau blog  http://ludovicrousseau.blogspot.com/+  * Ludovic Rousseau blog  http://ludovicrousseau.blogspot.com/ - smart card related posts
   * Hack a Day http://hackaday.com/ - hardware and sometimes also secure hardware   * Hack a Day http://hackaday.com/ - hardware and sometimes also secure hardware