jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net Security
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

Security

subscribeunsubscribe18,961 readers

~2 users here now

created by noaha community for 4 years
message the moderators

MODERATORS

  • noah
  • moderation team • moderation log

1
-

Here is a list of proxy IPs to help block KillNet's DDoS bots

submitted 6 hours ago by TheRealPanzer from theregister.com

  • comment
loading...

3
-

Remove Online Information - Delete negative information from the internet

submitted 1 day ago by joechierotti from removeonlineinformation.com

  • comment
loading...

6
-

Until further notice, think twice before using Google to download software

submitted 2 days ago by TheRealPanzer from arstechnica.com

  • 1 comment
loading...

4
-

Rootkit Hunter scans systems for known and unknown rootkits, backdoors, sniffers and exploits

submitted 9 days ago by TheRealPanzer from rkhunter.sourceforge.net

  • comment
loading...

2
-

A network of knockoff apparel stores exposed 330,000 customer credit cards

submitted 11 days ago by TheRealPanzer from techcrunch.com

  • comment
loading...

6
1

LastPass breach gets worse

submitted 12 days ago by Drewski from goto.com

  • 2 comments
loading...

4
2

Hackers now use Microsoft OneNote attachments to spread malware

submitted 16 days ago by TheRealPanzer from bleepingcomputer.com

  • comment
loading...

12
3

U.S. airline accidentally exposes ‘No Fly List’ on unsecured server

submitted 17 days ago by TheRealPanzer from dailydot.com

  • 1 comment
loading...

2
-

NortonLifeLock warns that hackers breached Password Manager accounts

submitted 21 days ago by SoCo from bleepingcomputer.com

  • comment
loading...

3
-

Android TV box on Amazon came pre-installed with malware

submitted 21 days ago by SoCo from bleepingcomputer.com

  • 2 comments
loading...

3
1

A government watchdog spent $15,000 to crack a federal agency's passwords in minutes

submitted 25 days ago by SoCo from techcrunch.com

  • comment
loading...

4
-

Threema Messenger billed as better than Signal is riddled with vulnerabilities

submitted 27 days ago by Drewski from arstechnica.com

  • 1 comment
loading...

3
-

Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More

submitted 27 days ago by SoCo from samcurry.net

  • comment
loading...

3
-

Rackspace says hackers accessed customer data (of their antiquated hosted email services) during ransomware attack

submitted 28 days ago by SoCo from techcrunch.com

  • 1 comment
loading...

3
1

Passwords are weaker than you believe

submitted 29 days ago by TheRealPanzer from cendyne.dev

  • 1 comment
loading...

3
-

Watch out for QR code scams being sent through email

submitted 1 month ago by TheRealPanzer from komando.com

  • comment
loading...

1
-

The Man Who Angered Anonymous And Lived To Regret It (25:17) ~ KiraTV

submitted 1 month ago by JasonCarswell from youtube.com

  • comment
loading...

2
-

SSH server hardening

submitted 1 month ago by TheRealPanzer from ittavern.com

  • comment
loading...

3
-

It’s time to stop ignoring the risks of passwords

submitted 1 month ago by TheRealPanzer from venturebeat.com

  • comment
loading...

4
-

Apple fixes ‘actively exploited’ zero-day affecting most iPhones

submitted 1 month ago by Drewski from techcrunch.com

  • 1 comment
loading...

5
-

How North Korea’s Hackers Became Dangerously Good

submitted 1 month ago by Drewski from wsj.com

  • 1 comment
loading...

8
-

TSA now wants to scan your face at security

submitted 2 months ago by TheRealPanzer from archive.ph

  • 1 comment
loading...

2
1

Consider Disabling Browser Push Notifications on Family and Friends Devices

submitted 2 months ago by Drewski from lloydatkinson.net

  • 1 comment
loading...

4
-

Lastpass says hackers accessed customer data in new breach

submitted 2 months ago by Drewski from bleepingcomputer.com

  • 1 comment
loading...

2
-

URLhaus - the purpose of the project is to collect, track and share malware URLs, helping network administrators and security analysts to protect their network and customers from cyber threats

submitted 2 months ago by TheRealPanzer from urlhaus.abuse.ch

  • comment
loading...

2
-

If you see one of these area codes don’t answer — It’s probably a scam

submitted 2 months ago by TheRealPanzer from komando.com

  • comment
loading...

1
-

Accidental $70k Google Pixel Lock Screen Bypass

submitted 2 months ago by Drewski from bugs.xdavidhu.me

  • 1 comment
loading...

2
-

"Anyone running an (Mastodon) instance can see your hashed password and all user data, read all of your DMs and take over your account."

submitted 3 months ago by TheRealPanzer from twitter.com

  • 1 comment
loading...

2
-

Usenix Security 22 videos released

submitted 3 months ago by TheRealPanzer from usenix.org

  • comment
loading...

1
-

The Various Pros and Cons of Shared and VPS Hosting

submitted 3 months ago by iton12344 from sktthemes.org

  • comment
loading...

1
-

Patch OpenSSL on November 1 to avoid “Critical” Security Vulnerability

submitted 3 months ago by Drewski from globalsign.com

  • 1 comment
loading...

1
-

Big Tech is Demanding Our Personal Cell Phone Numbers but No One is Talking About it.

submitted 3 months ago * by raven9 from self.Security

  • 4 comments
loading...

5
-

Linux Foundation, Not ‘Supply Chain’ Nonsense, is Becoming the Biggest Threat to Linux Security and Computing Security (It’s Deliberate)

submitted 3 months ago by TheRealPanzer from techrights.org

  • 1 comment
loading...

2
-

Phishing works so well crims won't bother with deepfakes

submitted 3 months ago by TheRealPanzer from theregister.com

  • comment
loading...

2
-

Everyone going to the World Cup must have this app - experts are now sounding the alarm

submitted 3 months ago by TheRealPanzer from nrk.no

  • comment
loading...

3
-

Critical Remote Code Execution Vulnerability in JXPath Library (CVE-2022-41852)

submitted 3 months ago by majk from hackinglab.cz

  • comment
loading...

5
1

Heat from fingertips can be used to crack passwords

submitted 3 months ago by TheRealPanzer from archive.ph

  • comment
loading...

3
1

Signal is secure, as proven by hackers

submitted 4 months ago by TheRealPanzer from kaspersky.co.uk

  • 1 comment
loading...

8
2

Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer

submitted 4 months ago by TheRealPanzer from thehackernews.com

  • comment
loading...

4
-

Security Vulnerabilities in Covert CIA Websites

submitted 4 months ago by TheRealPanzer from schneier.com

  • comment
loading...

3
-

Serious vulnerabilities in Matrix’s end-to-end encryption have been patched

submitted 4 months ago by Drewski from arstechnica.com

  • 1 comment
loading...

4
1

Google, Microsoft can get your passwords via web browser's spellcheck

submitted 4 months ago by TheRealPanzer from bleepingcomputer.com

  • comment
loading...

3
-

Security Threats of Public Wi-Fi - Is It Just Fearmongering?

submitted 4 months ago by TheRealPanzer from zitadel.com

  • 1 comment
loading...

10
2

The most secure cloud is your computer

submitted 5 months ago by TheRealPanzer from anita-app.com

  • 2 comments
loading...

2
1

Blocking Ads and malware with Pi-hole

submitted 5 months ago by TheRealPanzer from allthingstech.ch

  • comment
loading...

1
-

PETEP (Open-Source TCP Proxy for Hacking)

submitted 5 months ago by majk from self.Security

  • comment
loading...

3
-

Hacker shows why TSA is “security theater” | Evan Booth for Heretics (5:00) ~ Freethink

submitted 5 months ago by JasonCarswell from youtube.com

  • comment
loading...

3
1

Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug

submitted 5 months ago by Drewski from bleepingcomputer.com

  • 2 comments
loading...

1
-

Streaming Service Crunchyroll Blocks Privacy-Focused Email Tutanota Because "Hackers use it"

submitted 5 months ago by TheRealPanzer from news.itsfoss.com

  • comment
loading...

2
-

An encrypted ZIP file can have two correct passwords

submitted 5 months ago by TheRealPanzer from bleepingcomputer.com

  • comment
loading...

3
2

We can make our phones harder to hack but complete security is a pipe dream

submitted 5 months ago by TheRealPanzer from theguardian.com

  • comment
loading...

5
-

Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits/LKMs or by another hidden technique.

submitted 5 months ago by TheRealPanzer from unhide-forensics.info

  • 1 comment
loading...

2
1

Erik Prince wants to sell you a “secure” smartphone that’s too good to be true

submitted 5 months ago by TheRealPanzer from technologyreview.com

  • comment
loading...

6
3

The world's best password advice

submitted 5 months ago by TheRealPanzer from michaelhorowitz.com

  • 2 comments
loading...

5
3

iOS VPNs have leaked traffic for more than 2 years, researcher claims

submitted 5 months ago by TheRealPanzer from arstechnica.com

  • comment
loading...

5
2

NthLink VPN found to be using same pre-shared keys for all users

submitted 5 months ago by TheRealPanzer from twitter.com

  • comment
loading...

2
-

Complete guide for the paranoid user

submitted 5 months ago by TheRealPanzer from eldritchdata.neocities.org

  • 1 comment
loading...

6
1

Firefox & AppArmor hardening - Custom rules

submitted 6 months ago by TheRealPanzer from dedoimedo.com

  • 3 comments
loading...

3
-

Wi-Fine - it is fine to use public Wi-Fi

submitted 6 months ago by TheRealPanzer from wifine.gitlab.io

  • 1 comment
loading...

4
-

More Pixel 6a owners find that any fingerprint can unlock the phone

submitted 6 months ago by TheRealPanzer from 9to5google.com

  • 1 comment
loading...

2
-

Router Security

submitted 6 months ago by TheRealPanzer from routersecurity.org

  • 1 comment
loading...

16
3

Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us

submitted 6 months ago by TheRealPanzer from arstechnica.com

  • 5 comments
loading...

4
-

Critical flaws in GPS tracker enable “disastrous” and “life-threatening” hacks

submitted 6 months ago by TheRealPanzer from arstechnica.com

  • comment
loading...

7
2

The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.

submitted 6 months ago by TheRealPanzer from self.Security

  • comment
loading...

2
-

Researchers have discovered a vulnerability in Honda vehicles that could allow hackers to unlock doors and start the cars remotely. Affects all Honda models released between 2012 and 2022.

submitted 7 months ago by TheRealPanzer from bogleheads.org

  • comment
loading...

2
-

Threema: Three Strikes, You’re Out

submitted 7 months ago by Drewski from soatok.blog

  • comment
loading...

3
-

Oblivious DNS-over-HTTPS - security engineers are proposing an experimental protocol that promises greater privacy in how DNS operates.

submitted 7 months ago by TheRealPanzer from portswigger.net

  • comment
loading...

3
-

The HDMI firewall prevents devices from hacking HDMI equipment, and vice-versa.

submitted 7 months ago by TheRealPanzer from git.cuvoodoo.info

  • comment
loading...

2
-

Mega says it can’t decrypt your files. New POC exploit shows otherwise.

submitted 7 months ago by TheRealPanzer from arstechnica.com

  • 1 comment
loading...

13
3

All Chromium browsers store passwords and sensitive data in clear text in memory

submitted 7 months ago by TheRealPanzer from borncity.com

  • 4 comments
loading...

2
-

LastPass no longer requires a password to access your vault, moving to flawed FIDO

submitted 8 months ago by SoCo from engadget.com

  • comment
loading...

3
-

Add Privacy and Security Using Email Aliases With Bitwarden

submitted 8 months ago by TheRealPanzer from bitwarden.com

  • comment
loading...

3
1

Netbird is an open-source VPN management platform built on top of WireGuard making it easy to create secure private networks for your organization or home.

submitted 8 months ago by TheRealPanzer from github.com

  • comment
loading...

3
-

Defending against malicious bots with a zip bomb

submitted 8 months ago by TheRealPanzer from kerkour.com

  • comment
loading...

6
1

Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).

submitted 8 months ago by TheRealPanzer from tails.boum.org

  • comment
loading...

3
1

The passwords most used by CEOs are startlingly dumb

submitted 8 months ago by TheRealPanzer from pcgamer.com

  • comment
loading...

3
-

Firefox debuts improved process isolation to reduce browser attack surface

submitted 8 months ago by TheRealPanzer from portswigger.net

  • comment
loading...

7
2

NSA Swears It Won't Allow Backdoors in New Encryption Standards

submitted 8 months ago by Drewski from gizmodo.com

  • 3 comments
loading...

3
-

Some Cryptography Books I Like - Cronokirby

submitted 8 months ago by Drewski from cronokirby.com

  • comment
loading...

4
-

Researchers Identify ‘Master Problem’ Underlying All Cryptography

submitted 8 months ago by Drewski from quantamagazine.org

  • 2 comments
loading...

2
-

deSEC is a free DNS hosting service, designed with security in mind

submitted 9 months ago by TheRealPanzer from desec.io

  • comment
loading...

2
-

Mistborn is your own virtual private cloud platform and WebUI that manages self hosted services, and secures them with firewall, Wireguard VPN w/ PiHole-DNSCrypt, and IP filtering

submitted 9 months ago by TheRealPanzer from gitlab.com

  • comment
loading...

2
-

WebApps provides a secure way to browse popular webapps by eliminating referrers, 3rd party requests, cookies, cross-site scripting, etc.

submitted 9 months ago by TheRealPanzer from f-droid.org

  • comment
loading...

4
1

7-Zip up to 21.07 on Windows allows privilege escalation and command execution

submitted 9 months ago by Drewski from github.com

  • comment
loading...

5
2

Researchers Uncover a Hardware Security Vulnerability on Android Phones

submitted 10 months ago by Drewski from cyberkendra.com

  • comment
loading...

3
1

Lupinia Studios - I'm a Scam Prevention Expert, and I Got Scammed

submitted 10 months ago by Drewski from lupinia.net

  • 1 comment
loading...

2
-

Kicksecure - a secure by default operating system

submitted 10 months ago by TheRealPanzer from kicksecure.com

  • comment
loading...

2
-

AppTotal - analyze suspicious OAuth apps to identify malicious apps, highlight risks, ...

submitted 10 months ago by TheRealPanzer from apptotal.io

  • comment
loading...

4
1

North Korean hackers exploit Chrome zero-day weeks before patch

submitted 10 months ago by Drewski from bleepingcomputer.com

  • 2 comments
loading...

2
-

A team of Ukrainian software engineers have developed a game called “Play for Ukraine” that crowdsources and gamifies participation in DDOS attacks against selected Russian government and media websites

submitted 10 months ago by TheRealPanzer from fastcompany.com

  • comment
loading...

4
-

Another data-leaking Spectre bug found, smashes Intel, Arm defenses

submitted 10 months ago by TheRealPanzer from theregister.com

  • comment
loading...

3
2

"I can probably hack your password in MINUTES!"

submitted 11 months ago by TheRealPanzer from docs.aista.com

  • 1 comment
loading...

1
-

SentryPeer - a distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot

submitted 11 months ago by TheRealPanzer from sentrypeer.org

  • 1 comment
loading...

2
1

Merry Maker is a fully scalable tool to detect the presence of digital skimmers

submitted 11 months ago by TheRealPanzer from csoonline.com

  • comment
loading...

4
1

LAN port scan forbidder - forbid untrusted web to scan localhost or LAN

submitted 11 months ago by TheRealPanzer from github.com

  • comment
loading...

4
1

wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data

submitted 11 months ago by TheRealPanzer from wolfssl.com

  • comment
loading...

2
-

Rogueport identifies network ports which are not supposed to be open

submitted 11 months ago by TheRealPanzer from github.com

  • comment
loading...

9
3

JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection

submitted 11 months ago by TheRealPanzer from jshelter.org

  • comment
loading...

2
1

SafeToOpen detects never-before-seen phishing websites by inspecting the visual and non-visual elements of the websites in real-time and preventing users give away their sensitive information

submitted 11 months ago by TheRealPanzer from safetoopen.com

  • comment
loading...

2
-

Researchers shared technical details of NSA Equation Group’s 'Bvp47' Backdoor

submitted 11 months ago by infocom6502 from cybersecurityworldconference.com

  • comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2023 SaidIt