Old and new resources, about computer security:
Experts Recover AES256 Encryption Key From a PC’s Electromagnetic Emissions
https://www.bleepingcomputer.com/news/security/experts-recover-aes256-encryption-key-from-a-pcs-electromagnetic-emissions/
Critical Vulnerability in JSON Web Encryption
https://auth0.com/blog/critical-vulnerability-in-json-web-encryption/
Differential Fault Attacks on Elliptic Curve Cryptosystems
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.107.3920&rep=rep1&type=pdf
Hackers’ Own Tools Are Full of Vulnerabilities
https://motherboard.vice.com/en_us/article/59pvp8/hackers-own-tools-are-full-of-vulnerabilities
Massive Database Leak Gives Us a Window into China’s Digital Surveillance State
https://www.eff.org/deeplinks/2019/03/massive-database-leak-gives-us-window-chinas-digital-surveillance-state
New TLS Padding Oracles
https://github.com/RUB-NDS/TLS-Padding-Oracles
@try_to_hack Makes History as First Bug Bounty Hacker to Earn Over $1 Million
https://www.hackerone.com/blog/trytohack-Makes-History-First-Bug-Bounty-Hacker-Earn-over-1-Million
How one teenager is making millions by hacking legally
https://www.bbc.com/news/av/technology-47407609/how-one-teenager-is-making-millions-by-hacking-legally
Angel “Java” Lopez
https://github.com/ajlopez
http://www.ajlopez.com
http://twitter.com/ajlopez
Pingback: Computer Security, Links and Resources (2) | Angel ”Java” Lopez on Blog