jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net Security
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

sub:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. sub:pics site:imgur.com dog

advanced search: by author, sub...

reset password
Submit a new link
Submit a new text post

Security

subscribeunsubscribe19,007 readers

~4 users here now

created by noaha community for 2 years
message the moderators

MODERATORS

  • noah
  • moderation team • moderation log

3
1

Smart Homes Can Easily Be Hacked and Most Internet of Things Devices Don’t Have Any Security Standards

submitted 1 day ago by Drewski from simius.ai

  • comment
loading...

5
1

Malware found on laptops given out by government

submitted 1 day ago by Panzerfaust from bbc.com

  • comment
loading...

2
-

DDoSers are abusing Microsoft RDP to make attacks more powerful

submitted 1 day ago by Panzerfaust from arstechnica.com

  • comment
loading...

1
-

Haxcan - Free WordPress Malware Scanner

submitted 1 day ago by Panzerfaust from haxcan.com

  • comment
loading...

1
-

The Average American's Password Could Be Hacked in Under One Hour

submitted 2 days ago by Panzerfaust from safety.com

  • comment
loading...

1
-

Malvuln - Finding and exploiting vulnerable Malware

submitted 2 days ago by Panzerfaust from malvuln.com

  • comment
loading...

1
-

Cryptohack - a fun platform for learning modern cryptography

submitted 6 days ago by Panzerfaust from cryptohack.org

  • comment
loading...

2
-

Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats

submitted 8 days ago by Panzerfaust from smashingsecurity.com

  • comment
loading...

1
-

Becoming physically immune to brute-force attacks

submitted 9 days ago by Panzerfaust from seirdy.one

  • comment
loading...

1
-

dismail.de - secure private messaging

submitted 9 days ago by Panzerfaust from dismail.de

  • comment
loading...

3
2

Stealing Your Private YouTube Videos, One Frame at a Time

submitted 14 days ago by diogenesjunior from bugs.xdavidhu.me

  • comment
loading...

1
-

How to Choose a Secure Password in 2021

submitted 13 days ago by jackforbes from loginradius.com

  • 1 comment
loading...

1
-

ArmbianTV developer admits putting malicious code in own builds

submitted 13 days ago by Panzerfaust from forum.armbian.com

  • comment
loading...

1
-

Boundary provides a secure way to access hosts and critical systems without having to manage credentials or expose your network

submitted 13 days ago by Panzerfaust from boundaryproject.io

  • comment
loading...

2
1

Early Bird Catches the Worm: New Golang Worm Drops XMRig Miner on Servers | Intezer

submitted 24 days ago by DeWhoDeWho from intezer.com

  • comment
loading...

3
-

NZBgeek Has Been Hacked Leaving Private User Data Exposed

submitted 27 days ago by Drewski from torrentfreak.com

  • comment
loading...

7
2

FBI and Europol Shut Down 'Bulletproof' VPN Service That Helped Criminals

submitted 1 month ago by Drewski from torrentfreak.com

  • 1 comment
loading...

4
-

Double Blind Passwords (aka Horcruxing)

submitted 1 month ago by Drewski from kaizoku.dev

  • comment
loading...

2
1

No One Knows How Deep Russia's Hacking Rampage Goes | WIRED

submitted 1 month ago by DeWhoDeWho from wired.com

  • comment
loading...

4
-

Adding Encrypted Group Calls to Signal

submitted 1 month ago by Drewski from signal.org

  • comment
loading...

2
-

The Cyberpandemic has Begun: SolarWinds + FireEye - Anything can happen now (15:00) ~ Ice Age Farmer

submitted 1 month ago by JasonCarswell from youtube.com

  • comment
loading...

3
-

German court forces encrypted email provider Tutanota to create backdoor for blackmail case

submitted 1 month ago by Drewski from cyberscoop.com

  • comment
loading...

2
-

E-commerce Security: 5 Ways to Enhance Data Protection During the Shopping Season

submitted 1 month ago by jackforbes from loginradius.com

  • comment
loading...

5
1

Kazakhstan government is intercepting HTTPS traffic in its capital

submitted 1 month ago by Drewski from zdnet.com

  • comment
loading...

4
-

Source code used by Central Banks and Stock Exchanges leaked online

submitted 1 month ago by Drewski from securityreport.com

  • comment
loading...

2
-

Report Claims CIA Controlled Second Swiss Encryption Firm

submitted 1 month ago by Drewski from courthousenews.com

  • comment
loading...

3
-

Jeffrey Paul: Your Computer Isn't Yours

submitted 2 months ago by Drewski from sneak.berlin

  • comment
loading...

3
-

When Encryption Was a Crime: The 1990s Battle for Free Speech in Software

submitted 2 months ago by Drewski from youtube.com

  • comment
loading...

3
-

Combating abuse in Matrix - without backdoors.

submitted 3 months ago by Drewski from matrix.org

  • comment
loading...

2
-

Suspected Chinese Hackers Unleash Malware That Can Survive OS Reinstalls

submitted 3 months ago by [deleted] from pcmag.com

  • comment
loading...

2
-

CLODIAL allows you to send and/or request private information in a highly secure way.

submitted 3 months ago by [deleted] from clodial.com

  • comment
loading...

2
-

Today, Nobody is Going to Attack You

submitted 3 months ago by [deleted] from isc.sans.edu

  • comment
loading...

2
-

Phishtrack free monitors domains for your keywords, so you know about new issues before they affect you.

submitted 3 months ago by [deleted] from phishtrack.net

  • comment
loading...

2
-

Hotel Wi-Fi is unsafe for your work, according to FBI

submitted 3 months ago by [deleted] from windowsreport.com

  • comment
loading...

3
-

It’s never too early to teach your kids about cybersecurity

submitted 3 months ago by [deleted] from thenextweb.com

  • comment
loading...

2
-

Firebase - Google Cloud’s Evil Twin

submitted 3 months ago by [deleted] from sans.org

  • comment
loading...

2
-

The Truecrypt Mystery and Intelligence Agencies' Fixation with Decrypting Your Hard Drive

submitted 3 months ago by [deleted] from cheapskatesguide.org

  • comment
loading...

3
1

Boom! Hacked page on mobile phone website is stealing customers’ card data

submitted 3 months ago by [deleted] from arstechnica.com

  • 1 comment
loading...

3
1

A Security Flaw Could Send Your Dick to Jail Forever

submitted 3 months ago by [deleted] from gizmodo.com

  • 1 comment
loading...

2
-

Does custom firmware jeopardize the security of gaming consoles?

submitted 3 months ago by [deleted] from decoded.avast.io

  • comment
loading...

2
-

Web Analytics Company, RudderStack, Accidentally Collecting Passwords

submitted 3 months ago by [deleted] from freshpaint.io

  • comment
loading...

2
-

UHS says all U.S. facilities affected by apparent ransomware attack

submitted 3 months ago by [deleted] from healthcareitnews.com

  • comment
loading...

2
-

Complexity has broken computer security, says academic who helped spot Meltdown and Spectre flaws

submitted 3 months ago by [deleted] from theregister.com

  • comment
loading...

3
1

Apple's Operating Systems Are Malware

submitted 3 months ago by [deleted] from gnu.org

  • comment
loading...

3
1

Not all attacks are equal: understanding and preventing DoS in web applications

submitted 3 months ago by [deleted] from r2c.dev

  • comment
loading...

4
-

Phishing with Worms – The Greatest Password Theft I’ve Ever Seen

submitted 3 months ago by [deleted] from craighays.com

  • comment
loading...

2
-

Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints

submitted 3 months ago by [deleted] from research.checkpoint.com

  • comment
loading...

2
-

Make your Ubuntu Server VPS more secure against unauthorized access

submitted 3 months ago by [deleted] from phiilu.com

  • comment
loading...

2
-

Flatpak - a security nightmare - 2 years later

submitted 3 months ago by [deleted] from flatkill.org

  • comment
loading...

6
2

Linux under WSL2 can be leaking

submitted 3 months ago by [deleted] from mullvad.net

  • comment
loading...

2
-

GitHub code scanning is a developer-first, GitHub-native approach to easily find security vulnerabilities before they reach production.

submitted 3 months ago by [deleted] from github.blog

  • comment
loading...

3
-

How hackers steal your keys and secrets

submitted 3 months ago by [deleted] from dev.to

  • comment
loading...

2
-

email-security-scans - We are conducting a study to understand how well and secure email systems are configured. For that, we need to receive emails from as many different mail providers around the world as possible.

submitted 3 months ago by [deleted] from email-security-scans.org

  • comment
loading...

3
-

Burp Suite is a leading range of cybersecurity tools.

submitted 3 months ago by [deleted] from portswigger.net

  • comment
loading...

2
-

TinyWall is a lightweight, user-friendly, and secure firewall.

submitted 4 months ago by [deleted] from tinywall.pados.hu

  • comment
loading...

2
-

WiseVector StopX is an AI-based malware suite that provides multi-layered protection, including Realtime Protection, Advanced Detection, Memory Inspection, and Instruction Tracer.

submitted 4 months ago by [deleted] from wisevector.com

  • comment
loading...

2
-

Autorun Angel is a powerful cloud autorun manager and security analyzer that will help protect your computer from spyware and other malicious software by allowing you to analyze and control Windows startup sections.

submitted 4 months ago by [deleted] from nictasoft.com

  • comment
loading...

3
-

Phantom Malware - Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity

submitted 4 months ago by [deleted] from ieeexplore.ieee.org

  • comment
loading...

2
-

Testing IP Camera Account Security

submitted 4 months ago by [deleted] from decoded.avast.io

  • comment
loading...

4
-

Let's talk about safety of Pinephone

submitted 4 months ago by [deleted] from xnux.eu

  • comment
loading...

2
-

Some ways to improve Pinephone safety

submitted 4 months ago by [deleted] from xnux.eu

  • comment
loading...

2
-

New virus from the domain "js.donatelloflowfirstly.ga" is infecting many WordPress sites. You will have to remove it manually.

submitted 4 months ago by [deleted] from waikey.com

  • comment
loading...

2
-

Microsoft leaks 6.5TB in Bing search data via unsecured Elastic server. *Insert 'Wow... that much?' joke here*

submitted 4 months ago by [deleted] from theregister.com

  • comment
loading...

6
1

Check if your IP is exposing any ports. If you see 404 page, nothing is exposed.

submitted 4 months ago by [deleted] from me.shodan.io

  • comment
loading...

4
-

The EU is set to declare war on encryption

submitted 4 months ago by [deleted] from tech.newstatesman.com

  • comment
loading...

3
-

How to Secure Your Home Network Against Threats

submitted 4 months ago by [deleted] from restoreprivacy.com

  • comment
loading...

2
-

New Router Hack Discovered That Targets Port 7547

submitted 4 months ago by [deleted] from liquidvpn.com

  • comment
loading...

2
-

Can a Windows wallpaper really hijack your Microsoft account password?

submitted 4 months ago by [deleted] from securityreport.com

  • comment
loading...

2
-

Transport Layer Security Is Not A Substitute For Virtual Private Networks

submitted 4 months ago by [deleted] from medium.com

  • comment
loading...

2
-

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.

submitted 4 months ago by [deleted] from github.com

  • comment
loading...

2
-

WiFi Hacking 101 – How to Secure Your Wifi Networks With Aircrack-NG

submitted 4 months ago by [deleted] from freecodecamp.org

  • comment
loading...

2
-

Phantom Malware - Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity

submitted 4 months ago by [deleted] from ieeexplore.ieee.org

  • comment
loading...

2
-

Bitwarden leaks password to other subdomains

submitted 4 months ago by [deleted] from twitter.com

  • comment
loading...

2
-

Whalescan is a vulnerability scanner for Windows containers.

submitted 4 months ago by [deleted] from github.com

  • comment
loading...

3
-

Multiple DNS providers were attacked to take down Tutanota

submitted 4 months ago by [deleted] from tutanota.com

  • comment
loading...

3
-

A Dangerous “Text Bomb” is Spreading Through WhatsApp

submitted 4 months ago by [deleted] from utopia.fans

  • comment
loading...

2
-

h2c Smuggling - A New 'Devastating' Kind of HTTP Request

submitted 4 months ago by [deleted] from darkreading.com

  • comment
loading...

2
-

Firewall ban-sharing across machines - How can you block one IP simultaneously on multiple machines?

submitted 4 months ago by [deleted] from chown.me

  • comment
loading...

2
-

Secretive Pentagon research program looks to replace human hackers with AI

submitted 4 months ago by Drewski from msn.com

  • comment
loading...

3
-

Your Phone Is Your Castle

submitted 4 months ago by [deleted] from puri.sm

  • comment
loading...

2
-

Internet Society launches toolkit to safeguard open, secure ‘network of networks’

submitted 4 months ago by [deleted] from portswigger.net

  • comment
loading...

2
-

Hardentools is a simple utility designed to disable a number of "features" exposed by Microsoft Windows, and primary consumer applications.

submitted 4 months ago by [deleted] from securitywithoutborders.org

  • comment
loading...

2
-

The problem with cyberhygiene

submitted 4 months ago by [deleted] from cloudtweaks.com

  • comment
loading...

2
-

Giggle; laughable security

submitted 4 months ago by [deleted] from research.digitalinterruption.com

  • comment
loading...

2
-

The complete list of alternatives to all Google products - Parallel universe for the super security conscious

submitted 4 months ago by [deleted] from techspot.com

  • comment
loading...

2
-

97% of the leading cybersec companies had their data exposed on the Dark Web

submitted 4 months ago by [deleted] from immuniweb.com

  • comment
loading...

2
-

Cloud-Based Security Cameras - The Beautiful Illusion of Security

submitted 4 months ago by [deleted] from hawaiigentech.com

  • comment
loading...

2
-

The problem with cheap (all?) Android smartphones

submitted 4 months ago by [deleted] from iafrikan.com

  • comment
loading...

2
-

Linux kernel security fixes spotted before release with side channel attack on...developer mailing lists

submitted 4 months ago by [deleted] from theregister.com

  • comment
loading...

2
-

USB keys will end you

submitted 4 months ago by [deleted] from foundersec.substack.com

  • comment
loading...

6
1

Fail2ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time.

submitted 4 months ago by [deleted] from fail2ban.org

  • comment
loading...

3
-

Flaws in DVB-T2 set-top boxes exposed

submitted 4 months ago by [deleted] from decoded.avast.io

  • comment
loading...

3
-

Windows Computers Were Targets of 83% of All Malware Attacks in Q1 2020

submitted 4 months ago by [deleted] from pcmag.com

  • comment
loading...

3
-

A secure operating system

submitted 4 months ago by [deleted] from fantasycookie17.onederfultech.com

  • comment
loading...

3
-

10 Simple Steps to Secure Your Home Router and Protect Your Home

submitted 4 months ago by [deleted] from darkrebel.net

  • comment
loading...

3
-

Jolly Roger’s Security Thread for Beginners

submitted 4 months ago by [deleted] from darkrebel.net

  • comment
loading...

3
-

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

submitted 4 months ago by [deleted] from gchq.github.io

  • comment
loading...

4
-

Any encryption backdoor would do more harm than good.

submitted 4 months ago by [deleted] from tutanota.com

  • 3 comments
loading...

2
1

China Has Weaponized The Smartphone: Here’s Why You Should Be Concerned

submitted 4 months ago by christnmusicreleases from forbes.com

  • comment
loading...

2
-

Diario - a malware detector that respects users’ privacy

submitted 5 months ago by [deleted] from diario.elevenpaths.com

  • comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2021 SaidIt