

Usman Rahim
Digital Security and Operations Manager /*=$expert->feature_status*/ ?>
The Media Trust
Comments Dotted :
4
September 20, 2019
The only way to protect users is to know who’s providing what code and what that code does to users.
Managing the digital supply chain is difficult because it requires the right tools and expertise. When third party code suppliers deliver code to users through browser and not through a tool that the website publisher/owner uses, the owner has little control of what happens and can't monitor when something's afoot. If a third party provides or supports the web application, iframes will fall victim to attack. The only way to protect users is to know who’s providing what code and what that code .....Read More

September 02, 2019
The notion that only you can access your device is far from the truth.
The identification of these exploits targeting iOS devices prove that even products designed from the ground up to protect your privacy aren’t 100% secure. The notion that only you can access your device is far from the truth. Your device and the apps that run on it are supported by many third-parties who can potentially access your behavioral and personal information, from how many steps you’ve taken this morning to where you bought your coffee to which article you read on which online.....Read More

August 22, 2019
Developers use CSPs to enforce a white list of resources that a client browser can load resources from and sites that can interact with their site.
The hacking of a popular site and software reveals the growing popularity of combining two attack methods: (1) compromising websites that use outdated versions of their content management platforms and (2) injecting credit card skimmers on to the page. Bad actors know too well the vulnerabilities of web content platforms. And, even when those platforms release new versions to address vulnerabilities, website operators often neglect making the needed updates. While the site has made.....Read More

August 12, 2019
Our digital elections system doesn’t have a single point of failure.
Our digital elections system doesn’t have a single point of failure—it has many - largely because the system appears to have been designed without prioritizing security and privacy. What’s most disturbing is that even as vendors claim the system isn’t connected to the internet, they provide documents that show otherwise. In addition, there’s the potential for configuration problems—an all too frequent error--USB drives infected with malware, brute force attacks to get around.....Read More
