a thoughtful web.
comments
posts
badges
Good ideas and conversation. No ads, no tracking.
Login
or
Take a Tour
!
#security
followers: 198
activity
·
time
Retrieving cryptographic keys from your phone via the power led on your charger
0
aperson
nassiben.com
·
#security
·
#cryptography
Passkey standard is finally agreed upon, and may make passwords obsolete
c_hawkthorne
3
goobster
arstechnica.com
·
#security
Zero Day exploit affecting Apple devices.
0
steve
apple.com
·
#security
·
#apple
Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective
0
mk
signal.org
·
#privacy
·
#security
Nation-state backed hackers going after COVID vaccine supply chain
0
am_Unition
arstechnica.com
·
#internet
·
#security
I just got hacked
bhrgunatha
7
goobster
text
·
#security
·
#tellhubski
WordPress and Apache Struts account for 55% of all weaponized vulnerabilities
0
johnnyFive
zdnet.com
·
#security
·
#internets
Facebook launches an app for couples to talk to each other
0
steve
theverge.com
·
#privacy
·
#security
White house cybersecurity team resigns
0
ilex
axios.com
·
#security
·
#whiterabbit
For your privacy, and to kill monetizing users with ads: BRAVE
johnnyFive
9
goobster
theverge.com
·
#security
·
#technology
·
#brave
Intel CPUs are more vulnerable than most of us thought
0
johnnyFive
theregister.co.uk
·
#security
·
#doom
Influence Operations Kill Chain
am_Unition
2
johnnyFive
·
schneier.com
·
#security
Safe deposit boxes aren’t safe
wasoxygen
1
mk
nytimes.com
·
#banks
·
#security
Problems that forced me to leave Dashlane for 1Password
0
kevinhq
kevinhq.com
·
#security
·
#privacy
RAMBleed: Method for reading arbitrary parts of RAM
0
johnnyFive
rambleed.com
·
#security
·
#pwned
New Security Model: Just pay off the hackers
user-inactivated
1
goobster
propublica.org
·
#security
·
#hacking
Malicious Tampering of 3D Medical Imagery using Deep Learning
OftenBen
1
johnnyFive
arxiv.org
·
#medicine
·
#security
Single group gets malware on 1,300 computers in 30 countries, probably Chinese
0
johnnyFive
nytimes.com
·
#security
·
#hax
ASUS's software update process compromised, installs malware
0
johnnyFive
kaspersky.com
·
#tech
·
#security
Privacy and Big Data Have Tactical Implications Too
0
johnnyFive
text
·
#security
·
#privacy
New Intel CPU bug found: Like Spectre, only worse
user-inactivated
5
johnnyFive
theregister.co.uk
·
#security
·
#securityfail
Extracting a 19 Year Old Code Execution from WinRAR
bryson1216
2
Devac
checkpoint.com
·
#security
·
#programming
Apple blocks Facebook from running its internal iOS apps
kleinbl00
2
veen
theverge.com
·
#techhnology
·
#security
Do I need password manager? Let's find out
0
kevinhq
kevinhq.com
·
#security
·
#privacy
·
#spam
House Committee on Government Oversight's report on the Equifax breach
0
johnnyFive
house.gov
[PDF] ·
#security
·
#fail
CRYPTO-GRAM | November 2015 (my synopsis)
0
johnnyFive
text
·
#security
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
legend
1
mk
bloomberg.com
·
#china
·
#security
·
#technology
Exploiting Decades-Old Tech (AT Commands) to Break Into Android Devices
0
galen
wired.com
·
#security
·
#hacking
Why Scarlett Johansson’s Picture Got My Postgres Database to Start Mining Monero
legend
1
veen
imperva.com
·
#security
·
#technology
Password on Post-It featured in articles about Hawaii false alarm
kleinbl00
2
goobster
boingboing.net
·
#security
·
#insecurity
more
about
tutorial
faq
rss
tmi
random
privacy & terms
weather
donate
login