tags: security
- Microsoft Buys corp.com So Bad Guys Can’t
7 April 2020 |
comments |
krebsonsecurity.com |
tags: domain, microsoft, and security - Getting Started with WireGuard
7 April 2020 |
comments |
miguelmota.com |
tags: guide, security, and software - How I Lost Control of Our Bank Accounts To a Phone Scammer
4 April 2020 |
comments |
robservatory.com |
tags: security, and story - SpaceX Bans Zoom Over Privacy Concerns
2 April 2020 |
comments |
reuters.com |
tags: productivity, and security - FullStory – Private-by-Default Mobile Analytics
31 March 2020 |
comments |
bionic.fullstory.com |
tags: mobile-phone, and security - SpicyPass: A Light-Weight Password Manager With Focus on Simplicity and Security
29 March 2020 |
comments |
github.com |
tags: open-source, security, and software - Zoom iOS App Sends Data To Facebook Even If You Don’t Have a Facebook Account
27 March 2020 |
comments |
vice.com |
tags: facebook, ios, and security - I Got My File From Clearview AI, and It Freaked Me Out
25 March 2020 |
comments |
onezero.medium.com |
tags: internet, security, and story - Windows Code-Execution Zeroday Is Under Active Exploit, Microsoft Warns
24 March 2020 |
comments |
arstechnica.com |
tags: bugs, leaks, microsoft, os, and security - How Tailscale Works
22 March 2020 |
comments |
tailscale.com |
tags: internet, and security - Slack Account Takeovers Using HTTP Request Smuggling
14 March 2020 |
comments |
hackerone.com |
tags: security - AvastSvc.exe Contains a Full, Unsandboxed Javascript/DOM Implementation
12 March 2020 |
comments |
github.com |
tags: leaks, security, and software - Session: An Open Source Private Messenger That Doesn’t Need Your Phone Number
8 March 2020 |
comments |
itsfoss.com |
tags: security, social, and software - Firecracker: Secure and Fast MicroVMs for Serverless Computing
8 March 2020 |
comments |
firecracker-microvm.github.io |
tags: dev, security, server, and virtual-machine - Dangerzone: Convert Potentially Dangerous PDFs, Documents, or Images to Safe PDF
8 March 2020 |
comments |
github.com |
tags: security, and software - Intel x86 Root of Trust: Loss of Trust
6 March 2020 |
comments |
blog.ptsecurity.com |
tags: intel, leaks, and security - HiddenVM — Use Any Desktop OS Without Leaving a Trace
6 March 2020 |
comments |
github.com |
tags: open-source, os, security, and virtual-machine - Introduction to Malware Analysis and Reverse Engineering
5 March 2020 |
comments |
class.malware.re |
tags: guide, learning, and security - Project Svalbard, Have I Been Pwned and its Ongoing Independence
3 March 2020 |
comments |
troyhunt.com |
tags: security - Aleph: A Suite of Data Analysis Tools for Investigators
2 March 2020 |
comments |
docs.alephdata.org |
tags: security, and software - A Journey To Searching Have I Been Pwned Database In 49μs
2 March 2020 |
comments |
stryku.pl |
tags: leaks, security, and story - How a Hacker's Mom Broke Into a Prison—and the Warden's Computer
1 March 2020 |
comments |
wired.com |
tags: security, and story - Let's Encrypt Has Issued a Billion Certificates
29 February 2020 |
comments |
letsencrypt.org |
tags: internet, and security - A Group of Amateur Astronomers Around The World Hunt and Track Government Spy Satellites. Governments Classify These Top-Secret Missions, But a Group of Dedicated Spy Hunters Tracks The Satellites and Publishes The Data For Fun
27 February 2020 |
comments |
supercluster.com |
tags: security, and today-i-learned - PCILeech: Direct Memory Access (DMA) Attack Software
26 February 2020 |
comments |
github.com |
tags: hardware, open-source, and security - Defeating a Laptop's BIOS Password
25 February 2020 |
comments |
github.com |
tags: security - Haven: Turn Old Android Phones Into Security Cameras
24 February 2020 |
comments |
github.com |
tags: android, open-source, and security - Don’t Rely on Someone Else to Protect Your Software
20 February 2020 |
comments |
blog.ndepend.com |
tags: security, and software - Pay Up, Or We’ll Make Google Ban Your Ads
18 February 2020 |
comments |
krebsonsecurity.com |
tags: internet, and security - JWT is Awesome: Here's Why
18 February 2020 |
comments |
thehftguy.com |
tags: internet, opinion, and security - 7 Open Source Cloud Security Tools You Should Know
14 February 2020 |
comments |
blog.runpanther.io |
tags: open-source, security, and software - Linux Kernel Runtime Guard
13 February 2020 |
comments |
whonix.org |
tags: linux, and security - Trying to Sneak in a Sketchy .so Over The Weekend
10 February 2020 |
comments |
rachelbythebay.com |
tags: dev, security, and story - Dangerous Domain Corp.com Goes Up for Sale
9 February 2020 |
comments |
krebsonsecurity.com |
tags: domain, internet, and security - Zero-days in Cisco Discovery Protocol
7 February 2020 |
comments |
armis.com |
tags: security - YaCy: Decentralized Web Search
6 February 2020 |
comments |
yacy.net |
tags: internet, and security - Wacom Drawing Tablets Track The Name of Every Application that You Open
6 February 2020 |
comments |
robertheaton.com |
tags: graphics, hardware, leaks, and security - Serious Flaw That Lurked in Sudo For 9 Years Hands Over Root Privileges
5 February 2020 |
comments |
arstechnica.com |
tags: bugs, linux, and security - Critical Security Flaw Found in WhatsApp Desktop
5 February 2020 |
comments |
perimeterx.com |
tags: bugs, facebook, and security - Critical Flaw in Trezor Hardware Wallets
1 February 2020 |
comments |
blog.kraken.com |
tags: bugs, hardware, leaks, and security - SecureStore: The Open Secrets Container Format
30 January 2020 |
comments |
neosmart.net |
tags: dev, and security - Building a Simple VPN with WireGuard with a Raspberry Pi as Server
30 January 2020 |
comments |
snikt.net |
tags: raspberry-pi, security, and server