use the following search parameters to narrow your results:
e.g. subreddit:pics site:imgur.com dog
subreddit:pics site:imgur.com dog
advanced search: by author, sub...
~1 user here now
Authelia is an open-source full-featured authentication server
submitted 1 year ago by [deleted] from authelia.com
The Secret Security Wiki
submitted 1 year ago by [deleted] from doubleoctopus.com
Hetzner Cloud Firewall
submitted 1 year ago by [deleted] from console.hetzner.cloud
Privacy Plus 2.0 - a non-caching security proxy based on the open-source software Privoxy
submitted 1 year ago by [deleted] from nextvectorsecurity.com
Link Lock is a tool for adding a password to a link; in other words, for encrypting and decrypting URLs.
submitted 1 year ago by [deleted] from github.com
If you use Encryptr password manager app, today is the last day for users to migrate their data off
submitted 1 year ago by [deleted] from spideroak.support
Secure Password reGenerator
submitted 1 year ago by [deleted] from 22.00-59.com
Snort is an Open Source network intrusion prevention system capable of performing real-time traffic analysis and packet logging on IP networks.
submitted 1 year ago by [deleted] from snort.org
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications
submitted 1 year ago by [deleted] from firejail.wordpress.com
Bitwarden Send - a trusted way to securely share information directly with anyone
submitted 1 year ago by [deleted] from bitwarden.com
OWASP Cheat Sheet Series
submitted 1 year ago by [deleted] from cheatsheetseries.owasp.org
ShieldWall embraces the zero-trust principle and instruments your server firewall to block inbound connections from every IP on any port, by default
submitted 1 year ago by [deleted] from shieldwall.me
Zenlogin - suspicious login detection in minutes
submitted 1 year ago by [deleted] from zenlogin.co
Cloaker.mobi - a simple in-browser file encryption
submitted 1 year ago by [deleted] from cloaker.mobi
Nzyme is a free and open WiFi defense system that detects and physically locates threats using an easy to build and deploy sensor system
submitted 1 year ago by [deleted] from nzyme.org
A Valentine from the NSA...
submitted 3 years ago by JasonCarswell from cdn.discordapp.com
U.S. airline accidentally exposes ‘No Fly List’ on unsecured server
submitted 13 days ago by TheRealPanzer from dailydot.com
The world's best password advice
submitted 5 months ago by TheRealPanzer from michaelhorowitz.com
iOS VPNs have leaked traffic for more than 2 years, researcher claims
submitted 5 months ago by TheRealPanzer from arstechnica.com
Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
submitted 6 months ago by TheRealPanzer from arstechnica.com
All Chromium browsers store passwords and sensitive data in clear text in memory
submitted 7 months ago by TheRealPanzer from borncity.com
JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection
submitted 11 months ago by TheRealPanzer from jshelter.org
Irish police to be given powers over passwords
submitted 1 year ago by Drewski from bbc.com
Windows 10: HOSTS file blocking telemetry is now flagged as a 'Severe' security risk
submitted 2 years ago by [deleted] from bleepingcomputer.com
UK Police's Facial Recognition System has an 81% Error Rate
submitted 3 years ago by Stankmango from engadget.com
Hackers now use Microsoft OneNote attachments to spread malware
submitted 12 days ago by TheRealPanzer from bleepingcomputer.com
Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer
submitted 4 months ago by TheRealPanzer from thehackernews.com
The most secure cloud is your computer
submitted 4 months ago by TheRealPanzer from anita-app.com
We can make our phones harder to hack but complete security is a pipe dream
submitted 5 months ago by TheRealPanzer from theguardian.com
NthLink VPN found to be using same pre-shared keys for all users
submitted 5 months ago by TheRealPanzer from twitter.com
The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.
submitted 6 months ago by TheRealPanzer from self.Security
NSA Swears It Won't Allow Backdoors in New Encryption Standards
submitted 8 months ago by Drewski from gizmodo.com
Researchers Uncover a Hardware Security Vulnerability on Android Phones
submitted 10 months ago by Drewski from cyberkendra.com
"I can probably hack your password in MINUTES!"
submitted 10 months ago by TheRealPanzer from docs.aista.com
Are Xiaomi browsers spyware? Yes, they are …
submitted 1 year ago by [deleted] from palant.info
Malware found on laptops given out by government
submitted 2 years ago by [deleted] from bbc.com
FBI and Europol Shut Down 'Bulletproof' VPN Service That Helped Criminals
submitted 2 years ago by Drewski from torrentfreak.com
Linux under WSL2 can be leaking
submitted 2 years ago by [deleted] from mullvad.net
7 Common Cyberattacks and How to Prevent Them
submitted 3 years ago by KateMC from 2muchcoffee.com
US Police Have Quietly Brought A "Terrifying" Robot Dog Into Their Ranks
submitted 3 years ago by magnora7 from zerohedge.com
Huawei's kit removed from British emergency services 4G network
submitted 4 years ago by OldManCorley from bbc.com
LastPass breach gets worse
submitted 8 days ago by Drewski from goto.com
A government watchdog spent $15,000 to crack a federal agency's passwords in minutes
submitted 21 days ago by SoCo from techcrunch.com
Passwords are weaker than you believe
submitted 25 days ago by TheRealPanzer from cendyne.dev
Consider Disabling Browser Push Notifications on Family and Friends Devices
submitted 2 months ago by Drewski from lloydatkinson.net
Heat from fingertips can be used to crack passwords
submitted 3 months ago by TheRealPanzer from archive.ph
Signal is secure, as proven by hackers
submitted 3 months ago by TheRealPanzer from kaspersky.co.uk
Google, Microsoft can get your passwords via web browser's spellcheck
submitted 4 months ago by TheRealPanzer from bleepingcomputer.com
Blocking Ads and malware with Pi-hole
submitted 5 months ago by TheRealPanzer from allthingstech.ch
Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug
submitted 5 months ago by Drewski from bleepingcomputer.com
Erik Prince wants to sell you a “secure” smartphone that’s too good to be true
submitted 5 months ago by TheRealPanzer from technologyreview.com
Firefox & AppArmor hardening - Custom rules
submitted 5 months ago by TheRealPanzer from dedoimedo.com
Netbird is an open-source VPN management platform built on top of WireGuard making it easy to create secure private networks for your organization or home.
submitted 8 months ago by TheRealPanzer from github.com
Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).
submitted 8 months ago by TheRealPanzer from tails.boum.org
The passwords most used by CEOs are startlingly dumb
submitted 8 months ago by TheRealPanzer from pcgamer.com
7-Zip up to 21.07 on Windows allows privilege escalation and command execution
submitted 9 months ago by Drewski from github.com
Lupinia Studios - I'm a Scam Prevention Expert, and I Got Scammed
submitted 10 months ago by Drewski from lupinia.net
North Korean hackers exploit Chrome zero-day weeks before patch
submitted 10 months ago by Drewski from bleepingcomputer.com
Merry Maker is a fully scalable tool to detect the presence of digital skimmers
submitted 10 months ago by TheRealPanzer from csoonline.com
LAN port scan forbidder - forbid untrusted web to scan localhost or LAN
submitted 11 months ago by TheRealPanzer from github.com
wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data
submitted 11 months ago by TheRealPanzer from wolfssl.com
SafeToOpen detects never-before-seen phishing websites by inspecting the visual and non-visual elements of the websites in real-time and preventing users give away their sensitive information
submitted 11 months ago by TheRealPanzer from safetoopen.com
Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package
submitted 1 year ago by Drewski from lunasec.io
Missouri Admits It Fucked Up In Exposing Teacher Data, Offers Apology To Teachers -- But Not To Journalists It Falsely Accused Of Hacking
submitted 1 year ago by Drewski from techdirt.com
Canary tokens are a free, quick, painless way to help you discover that you've been breached
submitted 1 year ago by [deleted] from canarytokens.org
Yes, we want cryptographic protection for email
submitted 1 year ago by [deleted] from sequoia-pgp.org
How governments and spies text each other: Matrix has become the messaging app of choice for top-secret communications
submitted 1 year ago by Drewski from wired.co.uk
HTTPS Everywhere? Let's not
submitted 1 year ago by [deleted] from changelog.com
Secure Network - tools to protect yourself
submitted 1 year ago by [deleted] from matteoguadrini.github.io
Scientists harness chaos to protect devices from hackers
submitted 1 year ago by [deleted] from news.osu.edu
(in)security - Yet another blog with some security related posts
submitted 1 year ago by [deleted] from insecurity.blog
How us shady geeks put others off security
submitted 1 year ago by [deleted] from consult.sauvik.me
Smart Homes Can Easily Be Hacked and Most Internet of Things Devices Don’t Have Any Security Standards
submitted 2 years ago by Drewski from simius.ai
Kazakhstan government is intercepting HTTPS traffic in its capital
submitted 2 years ago by Drewski from zdnet.com
Boom! Hacked page on mobile phone website is stealing customers’ card data
submitted 2 years ago by [deleted] from arstechnica.com
A Security Flaw Could Send Your Dick to Jail Forever
submitted 2 years ago by [deleted] from gizmodo.com
Apple's Operating Systems Are Malware
submitted 2 years ago by [deleted] from gnu.org
Not all attacks are equal: understanding and preventing DoS in web applications
submitted 2 years ago by [deleted] from r2c.dev
Check if your IP is exposing any ports. If you see 404 page, nothing is exposed.
submitted 2 years ago by [deleted] from me.shodan.io
Fail2ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time.
submitted 2 years ago by [deleted] from fail2ban.org
China Has Weaponized The Smartphone: Here’s Why You Should Be Concerned
submitted 2 years ago by christnmusicreleases from forbes.com
Running your own secure communication service with Matrix and Jitsi
submitted 2 years ago by [deleted] from matrix.org
Fake privacy/security initiatives
submitted 2 years ago by [deleted] from digdeeper.neocities.org
TV stations – stop broadcasting your passwords!
submitted 2 years ago by [deleted] from grahamcluley.com
They Who Control Encryption
submitted 2 years ago by [deleted] from qvault.io
Phishing 101 – Everything You Need to Know About Phishing Attacks and Their Solutions
For deep security, use ARM, avoid Intel & AMD processors
submitted 3 years ago by fred_red_beans from chiefio.wordpress.com
Rootkit Hunter scans systems for known and unknown rootkits, backdoors, sniffers and exploits
submitted 5 days ago by TheRealPanzer from rkhunter.sourceforge.net
A network of knockoff apparel stores exposed 330,000 customer credit cards
submitted 7 days ago by TheRealPanzer from techcrunch.com
NortonLifeLock warns that hackers breached Password Manager accounts
submitted 17 days ago by SoCo from bleepingcomputer.com
Android TV box on Amazon came pre-installed with malware
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More
submitted 23 days ago by SoCo from samcurry.net
Threema Messenger billed as better than Signal is riddled with vulnerabilities
submitted 23 days ago by Drewski from arstechnica.com
Rackspace says hackers accessed customer data (of their antiquated hosted email services) during ransomware attack
submitted 24 days ago by SoCo from techcrunch.com
Watch out for QR code scams being sent through email
submitted 1 month ago by TheRealPanzer from komando.com
The Man Who Angered Anonymous And Lived To Regret It (25:17) ~ KiraTV
submitted 1 month ago by JasonCarswell from youtube.com
SSH server hardening
submitted 1 month ago by TheRealPanzer from ittavern.com
It’s time to stop ignoring the risks of passwords
submitted 1 month ago by TheRealPanzer from venturebeat.com
Apple fixes ‘actively exploited’ zero-day affecting most iPhones
submitted 1 month ago by Drewski from techcrunch.com
How North Korea’s Hackers Became Dangerously Good
submitted 1 month ago by Drewski from wsj.com