use the following search parameters to narrow your results:
e.g. subreddit:pics site:imgur.com dog
subreddit:pics site:imgur.com dog
advanced search: by author, sub...
~5 users here now
Authelia is an open-source full-featured authentication server
submitted 1 year ago by [deleted] from authelia.com
The Secret Security Wiki
submitted 1 year ago by [deleted] from doubleoctopus.com
Hetzner Cloud Firewall
submitted 1 year ago by [deleted] from console.hetzner.cloud
Privacy Plus 2.0 - a non-caching security proxy based on the open-source software Privoxy
submitted 1 year ago by [deleted] from nextvectorsecurity.com
Link Lock is a tool for adding a password to a link; in other words, for encrypting and decrypting URLs.
submitted 1 year ago by [deleted] from github.com
If you use Encryptr password manager app, today is the last day for users to migrate their data off
submitted 1 year ago by [deleted] from spideroak.support
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications
submitted 1 year ago by [deleted] from firejail.wordpress.com
Bitwarden Send - a trusted way to securely share information directly with anyone
submitted 1 year ago by [deleted] from bitwarden.com
OWASP Cheat Sheet Series
submitted 1 year ago by [deleted] from cheatsheetseries.owasp.org
Secure Password reGenerator
submitted 1 year ago by [deleted] from 22.00-59.com
Snort is an Open Source network intrusion prevention system capable of performing real-time traffic analysis and packet logging on IP networks.
submitted 1 year ago by [deleted] from snort.org
ShieldWall embraces the zero-trust principle and instruments your server firewall to block inbound connections from every IP on any port, by default
submitted 1 year ago by [deleted] from shieldwall.me
Nzyme is a free and open WiFi defense system that detects and physically locates threats using an easy to build and deploy sensor system
submitted 1 year ago by [deleted] from nzyme.org
Zenlogin - suspicious login detection in minutes
submitted 1 year ago by [deleted] from zenlogin.co
Cloaker.mobi - a simple in-browser file encryption
submitted 1 year ago by [deleted] from cloaker.mobi
Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
submitted 6 months ago by TheRealPanzer from arstechnica.com
All Chromium browsers store passwords and sensitive data in clear text in memory
submitted 7 months ago by TheRealPanzer from borncity.com
U.S. airline accidentally exposes ‘No Fly List’ on unsecured server
submitted 13 days ago by TheRealPanzer from dailydot.com
US Police Have Quietly Brought A "Terrifying" Robot Dog Into Their Ranks
submitted 3 years ago by magnora7 from zerohedge.com
Irish police to be given powers over passwords
submitted 1 year ago by Drewski from bbc.com
The most secure cloud is your computer
submitted 4 months ago by TheRealPanzer from anita-app.com
A Valentine from the NSA...
submitted 3 years ago by JasonCarswell from cdn.discordapp.com
JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection
submitted 11 months ago by TheRealPanzer from jshelter.org
Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer
submitted 4 months ago by TheRealPanzer from thehackernews.com
Have you heard of the AITA? Wikipedia calls them "the world aviation cartel", they control the rules for 82% of all world air traffic. They have a program called "Annex 17" that partnered airports around the world must comply with, including increased security
submitted 3 years ago by magnora7 from self.Security
Facebook Uncovers 'Security Issue' Affecting Nearly 50 Million Accounts
submitted 4 years ago by noah from newsroom.fb.com
Windows 10: HOSTS file blocking telemetry is now flagged as a 'Severe' security risk
submitted 2 years ago by [deleted] from bleepingcomputer.com
For deep security, use ARM, avoid Intel & AMD processors
submitted 3 years ago by fred_red_beans from chiefio.wordpress.com
TSA now wants to scan your face at security
submitted 2 months ago by TheRealPanzer from archive.ph
The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.
submitted 6 months ago by TheRealPanzer from self.Security
NSA Swears It Won't Allow Backdoors in New Encryption Standards
submitted 8 months ago by Drewski from gizmodo.com
FBI and Europol Shut Down 'Bulletproof' VPN Service That Helped Criminals
submitted 2 years ago by Drewski from torrentfreak.com
The world's best password advice
submitted 5 months ago by TheRealPanzer from michaelhorowitz.com
Malware found on laptops given out by government
submitted 2 years ago by [deleted] from bbc.com
Linux under WSL2 can be leaking
submitted 2 years ago by [deleted] from mullvad.net
LastPass breach gets worse
submitted 8 days ago by Drewski from goto.com
iOS VPNs have leaked traffic for more than 2 years, researcher claims
submitted 5 months ago by TheRealPanzer from arstechnica.com
Firefox & AppArmor hardening - Custom rules
submitted 5 months ago by TheRealPanzer from dedoimedo.com
Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).
submitted 8 months ago by TheRealPanzer from tails.boum.org
Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package
submitted 1 year ago by Drewski from lunasec.io
Check if your IP is exposing any ports. If you see 404 page, nothing is exposed.
submitted 2 years ago by [deleted] from me.shodan.io
Fail2ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time.
submitted 2 years ago by [deleted] from fail2ban.org
They Who Control Encryption
submitted 2 years ago by [deleted] from qvault.io
UK Police's Facial Recognition System has an 81% Error Rate
submitted 3 years ago by Stankmango from engadget.com
NthLink VPN found to be using same pre-shared keys for all users
submitted 5 months ago by TheRealPanzer from twitter.com
Researchers Uncover a Hardware Security Vulnerability on Android Phones
submitted 10 months ago by Drewski from cyberkendra.com
Are Xiaomi browsers spyware? Yes, they are …
submitted 1 year ago by [deleted] from palant.info
Twitter Has "Struggled For Years" To Control The Number Of Employees Who Have The Ability To Reset Accounts
submitted 2 years ago by [deleted] from zerohedge.com
"The TSA (and other experiments in evil)" by Corbett Report (2019-02-01) on YouTube
submitted 4 years ago by JasonCarswell from youtube.com
Heat from fingertips can be used to crack passwords
submitted 3 months ago by TheRealPanzer from archive.ph
Smart Homes Can Easily Be Hacked and Most Internet of Things Devices Don’t Have Any Security Standards
submitted 2 years ago by Drewski from simius.ai
Kazakhstan government is intercepting HTTPS traffic in its capital
submitted 2 years ago by Drewski from zdnet.com
Hackers now use Microsoft OneNote attachments to spread malware
submitted 12 days ago by TheRealPanzer from bleepingcomputer.com
How North Korea’s Hackers Became Dangerously Good
submitted 1 month ago by Drewski from wsj.com
Linux Foundation, Not ‘Supply Chain’ Nonsense, is Becoming the Biggest Threat to Linux Security and Computing Security (It’s Deliberate)
submitted 3 months ago by TheRealPanzer from techrights.org
Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits/LKMs or by another hidden technique.
submitted 5 months ago by TheRealPanzer from unhide-forensics.info
Confessions of a ransomware negotiator
submitted 1 year ago by Drewski from theregister.com
Secret terrorist watchlist with 2 million records exposed online
submitted 1 year ago by Drewski from bleepingcomputer.com
Huawei's kit removed from British emergency services 4G network
submitted 4 years ago by OldManCorley from bbc.com
Google, Microsoft can get your passwords via web browser's spellcheck
submitted 4 months ago by TheRealPanzer from bleepingcomputer.com
7-Zip up to 21.07 on Windows allows privilege escalation and command execution
submitted 9 months ago by Drewski from github.com
North Korean hackers exploit Chrome zero-day weeks before patch
submitted 10 months ago by Drewski from bleepingcomputer.com
LAN port scan forbidder - forbid untrusted web to scan localhost or LAN
submitted 11 months ago by TheRealPanzer from github.com
wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data
submitted 11 months ago by TheRealPanzer from wolfssl.com
How us shady geeks put others off security
submitted 1 year ago by [deleted] from consult.sauvik.me
Rootkit Hunter scans systems for known and unknown rootkits, backdoors, sniffers and exploits
submitted 5 days ago by TheRealPanzer from rkhunter.sourceforge.net
Threema Messenger billed as better than Signal is riddled with vulnerabilities
submitted 23 days ago by Drewski from arstechnica.com
Apple fixes ‘actively exploited’ zero-day affecting most iPhones
submitted 1 month ago by Drewski from techcrunch.com
Lastpass says hackers accessed customer data in new breach
submitted 2 months ago by Drewski from bleepingcomputer.com
Security Vulnerabilities in Covert CIA Websites
submitted 4 months ago by TheRealPanzer from schneier.com
We can make our phones harder to hack but complete security is a pipe dream
submitted 5 months ago by TheRealPanzer from theguardian.com
More Pixel 6a owners find that any fingerprint can unlock the phone
submitted 6 months ago by TheRealPanzer from 9to5google.com
Critical flaws in GPS tracker enable “disastrous” and “life-threatening” hacks
Researchers Identify ‘Master Problem’ Underlying All Cryptography
submitted 8 months ago by Drewski from quantamagazine.org
Another data-leaking Spectre bug found, smashes Intel, Arm defenses
submitted 10 months ago by TheRealPanzer from theregister.com
"I can probably hack your password in MINUTES!"
submitted 10 months ago by TheRealPanzer from docs.aista.com
‘Master Faces’ That Can Bypass Over 40% Of Facial ID Authentication Systems
submitted 1 year ago by Drewski from unite.ai
With help from Google, impersonated Brave.com website pushes malware
submitted 1 year ago by [deleted] from arstechnica.com
What is Lacking in Linux Security and What Are or Should We be Doing about This
submitted 1 year ago by [deleted] from youtube.com
Spectre exploits in the "wild"
submitted 1 year ago by Drewski from dustri.org
Double Blind Passwords (aka Horcruxing)
submitted 2 years ago by Drewski from kaizoku.dev
Adding Encrypted Group Calls to Signal
submitted 2 years ago by Drewski from signal.org
Source code used by Central Banks and Stock Exchanges leaked online
submitted 2 years ago by Drewski from securityreport.com
Phishing with Worms – The Greatest Password Theft I’ve Ever Seen
submitted 2 years ago by [deleted] from craighays.com
Let's talk about safety of Pinephone
submitted 2 years ago by [deleted] from xnux.eu
The EU is set to declare war on encryption
submitted 2 years ago by [deleted] from tech.newstatesman.com
Any encryption backdoor would do more harm than good.
submitted 2 years ago by [deleted] from tutanota.com
Shieldon is a Web Application Firewall for PHP, with a beautiful and useful control panel that helps you easily manage the firewall rules and security settings.
submitted 2 years ago by [deleted] from shieldon.io
Hackers can now clone your keys just by listening to them with a smartphone
submitted 2 years ago by [deleted] from mashable.com
7 Common Cyberattacks and How to Prevent Them
submitted 3 years ago by KateMC from 2muchcoffee.com
Why Cyber Command’s Latest Warning is a Win for the Government's Information Sharing Efforts
submitted 3 years ago by Stankmango from cyberscoop.com
"The Age of Surveillance Capitalism" by Ralph Nader Radio Hour (2019-01-26)
submitted 3 years ago by JasonCarswell from youtube.com
Will extra-strenght padlocks withstand a cheap hydraulic bolt cutter? Spoilers: No.
submitted 4 years ago by OldManCorley from youtu.be
A government watchdog spent $15,000 to crack a federal agency's passwords in minutes
submitted 21 days ago by SoCo from techcrunch.com
Passwords are weaker than you believe
submitted 25 days ago by TheRealPanzer from cendyne.dev
Signal is secure, as proven by hackers
submitted 3 months ago by TheRealPanzer from kaspersky.co.uk
Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug
submitted 5 months ago by Drewski from bleepingcomputer.com
Netbird is an open-source VPN management platform built on top of WireGuard making it easy to create secure private networks for your organization or home.
submitted 8 months ago by TheRealPanzer from github.com
The passwords most used by CEOs are startlingly dumb
submitted 8 months ago by TheRealPanzer from pcgamer.com
Lupinia Studios - I'm a Scam Prevention Expert, and I Got Scammed
submitted 10 months ago by Drewski from lupinia.net