use the following search parameters to narrow your results:
e.g. subreddit:pics site:imgur.com dog
subreddit:pics site:imgur.com dog
advanced search: by author, sub...
~2 users here now
Authelia is an open-source full-featured authentication server
submitted 3 years ago by [deleted] from authelia.com
The Secret Security Wiki
submitted 3 years ago by [deleted] from doubleoctopus.com
Hetzner Cloud Firewall
submitted 3 years ago by [deleted] from console.hetzner.cloud
Privacy Plus 2.0 - a non-caching security proxy based on the open-source software Privoxy
submitted 3 years ago by [deleted] from nextvectorsecurity.com
Link Lock is a tool for adding a password to a link; in other words, for encrypting and decrypting URLs.
submitted 3 years ago by [deleted] from github.com
If you use Encryptr password manager app, today is the last day for users to migrate their data off
submitted 3 years ago by [deleted] from spideroak.support
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications
submitted 3 years ago by [deleted] from firejail.wordpress.com
Bitwarden Send - a trusted way to securely share information directly with anyone
submitted 3 years ago by [deleted] from bitwarden.com
OWASP Cheat Sheet Series
submitted 3 years ago by [deleted] from cheatsheetseries.owasp.org
Secure Password reGenerator
submitted 3 years ago by [deleted] from 22.00-59.com
Snort is an Open Source network intrusion prevention system capable of performing real-time traffic analysis and packet logging on IP networks.
submitted 2 years ago by [deleted] from snort.org
ShieldWall embraces the zero-trust principle and instruments your server firewall to block inbound connections from every IP on any port, by default
submitted 2 years ago by [deleted] from shieldwall.me
Nzyme is a free and open WiFi defense system that detects and physically locates threats using an easy to build and deploy sensor system
submitted 3 years ago by [deleted] from nzyme.org
Zenlogin - suspicious login detection in minutes
submitted 2 years ago by [deleted] from zenlogin.co
Cloaker.mobi - a simple in-browser file encryption
submitted 2 years ago by [deleted] from cloaker.mobi
Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
submitted 1 year ago by [deleted] from arstechnica.com
All Chromium browsers store passwords and sensitive data in clear text in memory
submitted 1 year ago by [deleted] from borncity.com
U.S. airline accidentally exposes ‘No Fly List’ on unsecured server
submitted 1 year ago by [deleted] from dailydot.com
US Police Have Quietly Brought A "Terrifying" Robot Dog Into Their Ranks
submitted 4 years ago by magnora7 from zerohedge.com
Wired Magazine suggest “Ring” cameras are bad because they could catch black people committing crimes …
submitted 8 months ago by [deleted] from revolver.news
Snowden leak: Cavium networking hardware may contain a backdoor
submitted 6 months ago by [deleted] from twitter.com
Irish police to be given powers over passwords
submitted 2 years ago by Drewski from bbc.com
Potentially millions of Android TVs and phones come with malware preinstalled
submitted 10 months ago by [deleted] from arstechnica.com
The most secure cloud is your computer
submitted 1 year ago by [deleted] from anita-app.com
A Valentine from the NSA...
submitted 5 years ago by JasonCarswell from cdn.discordapp.com
JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection
submitted 2 years ago by [deleted] from jshelter.org
Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer
submitted 1 year ago by [deleted] from thehackernews.com
Exploding USB Sticks
submitted 1 year ago by [deleted] from schneier.com
Robot can rip the data out of RAM chips with chilling technology
submitted 9 months ago by [deleted] from theregister.com
Have you heard of the AITA? Wikipedia calls them "the world aviation cartel", they control the rules for 82% of all world air traffic. They have a program called "Annex 17" that partnered airports around the world must comply with, including increased security
submitted 4 years ago by magnora7 from self.Security
Facebook Uncovers 'Security Issue' Affecting Nearly 50 Million Accounts
submitted 5 years ago by noah from newsroom.fb.com
AI cracks 51% of passwords in 1min
submitted 7 months ago by [deleted] from homesecurityheroes.com
Windows 10: HOSTS file blocking telemetry is now flagged as a 'Severe' security risk
submitted 3 years ago by [deleted] from bleepingcomputer.com
For deep security, use ARM, avoid Intel & AMD processors
submitted 5 years ago by fred_red_beans from chiefio.wordpress.com
Ring Doorbell is vulnerable to Wi-Fi deauthentication attacks. Criminals can therefore take the doorbell offline and then have their activities go unrecorded
submitted 9 months ago by [deleted] from foundation.mozilla.org
TSA now wants to scan your face at security
submitted 1 year ago by [deleted] from archive.ph
The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.
submitted 1 year ago by [deleted] from self.Security
NSA Swears It Won't Allow Backdoors in New Encryption Standards
submitted 1 year ago by Drewski from gizmodo.com
FBI and Europol Shut Down 'Bulletproof' VPN Service That Helped Criminals
submitted 3 years ago by Drewski from torrentfreak.com
The world's best password advice
submitted 1 year ago by [deleted] from michaelhorowitz.com
Malware found on laptops given out by government
submitted 3 years ago by [deleted] from bbc.com
Linux under WSL2 can be leaking
submitted 3 years ago by [deleted] from mullvad.net
Password hygiene is still shocking - the most common password is "123456"
submitted 1 month ago by PanzersGhost from gopasswordless.dev
BlackCat claims they hacked Reddit and will leak the data
submitted 9 months ago by Drewski from databreaches.net
AI can fool voice recognition used to verify identity by Centrelink and Australian tax office
submitted 1 year ago by Drewski from theguardian.com
LastPass breach gets worse
submitted 1 year ago by Drewski from goto.com
iOS VPNs have leaked traffic for more than 2 years, researcher claims
Firefox & AppArmor hardening - Custom rules
submitted 1 year ago by [deleted] from dedoimedo.com
Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).
submitted 1 year ago by [deleted] from tails.boum.org
Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package
submitted 2 years ago by Drewski from lunasec.io
Check if your IP is exposing any ports. If you see 404 page, nothing is exposed.
submitted 3 years ago by [deleted] from me.shodan.io
Fail2ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time.
submitted 3 years ago by [deleted] from fail2ban.org
They Who Control Encryption
submitted 3 years ago by [deleted] from qvault.io
UK Police's Facial Recognition System has an 81% Error Rate
submitted 4 years ago by Stankmango from engadget.com
Until further notice, think twice before using Google to download software
NthLink VPN found to be using same pre-shared keys for all users
submitted 1 year ago by [deleted] from twitter.com
Researchers Uncover a Hardware Security Vulnerability on Android Phones
submitted 1 year ago by Drewski from cyberkendra.com
Are Xiaomi browsers spyware? Yes, they are …
submitted 3 years ago by [deleted] from palant.info
Twitter Has "Struggled For Years" To Control The Number Of Employees Who Have The Ability To Reset Accounts
submitted 3 years ago by [deleted] from zerohedge.com
"The TSA (and other experiments in evil)" by Corbett Report (2019-02-01) on YouTube
submitted 5 years ago by JasonCarswell from youtube.com
Wyze says camera breach let 13,000 customers briefly see into other people’s homes
submitted 1 month ago by PanzersGhost from theverge.com
How I got scammed on Facebook Marketplace
submitted 1 month ago by Drewski from ben.page
Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios
submitted 8 months ago by Drewski from vice.com
Legit app in Google Play turns malicious and sends mic recordings every 15 minutes
Intel OEM Private Key Leak: A Blow to UEFI Secure Boot Security
submitted 10 months ago by [deleted] from securityonline.info
Heat from fingertips can be used to crack passwords
Smart Homes Can Easily Be Hacked and Most Internet of Things Devices Don’t Have Any Security Standards
submitted 3 years ago by Drewski from simius.ai
Kazakhstan government is intercepting HTTPS traffic in its capital
submitted 3 years ago by Drewski from zdnet.com
4-year campaign backdoored iPhones using possibly the most advanced exploit ever
submitted 3 months ago by Drewski from arstechnica.com
LogoFAIL firmware attack could affect almost every Windows and Linux device
submitted 3 months ago by Drewski from bgr.com
NY AG issues $450k penalty to US Radiology after (recklessly) unpatched bug led to ransomware attack and breach of customers' personal and medical info
submitted 4 months ago by SoCo from therecord.media
A new cyberattack that is being called WiKI-Eve has been observed stealing certain passwords over Wi-Fi with a 90% success rate in most modern routers built since 2013
submitted 6 months ago by [deleted] from techradar.com
Hackers now use Microsoft OneNote attachments to spread malware
submitted 1 year ago by [deleted] from bleepingcomputer.com
How North Korea’s Hackers Became Dangerously Good
submitted 1 year ago by Drewski from wsj.com
Linux Foundation, Not ‘Supply Chain’ Nonsense, is Becoming the Biggest Threat to Linux Security and Computing Security (It’s Deliberate)
submitted 1 year ago by [deleted] from techrights.org
Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits/LKMs or by another hidden technique.
submitted 1 year ago by [deleted] from unhide-forensics.info
Confessions of a ransomware negotiator
submitted 2 years ago by Drewski from theregister.com
Secret terrorist watchlist with 2 million records exposed online
submitted 2 years ago by Drewski from bleepingcomputer.com
Huawei's kit removed from British emergency services 4G network
submitted 5 years ago by OldManCorley from bbc.com
A surprisingly simple way to foil car thieves
submitted 8 months ago by Drewski from news.umich.edu
The new USB Rubber Ducky is more dangerous than ever
submitted 8 months ago by [deleted] from theverge.com
Three ways AI chatbots are a security disaster
submitted 11 months ago by [deleted] from technologyreview.com
Google, Microsoft can get your passwords via web browser's spellcheck
7-Zip up to 21.07 on Windows allows privilege escalation and command execution
submitted 1 year ago by Drewski from github.com
North Korean hackers exploit Chrome zero-day weeks before patch
LAN port scan forbidder - forbid untrusted web to scan localhost or LAN
submitted 2 years ago by [deleted] from github.com
wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data
submitted 2 years ago by [deleted] from wolfssl.com
How us shady geeks put others off security
submitted 3 years ago by [deleted] from consult.sauvik.me
U.S. Internet Leaked Years of Internal, Customer Emails
submitted 1 month ago by Drewski from krebsonsecurity.com
'Reptar', a new CPU vulnerability
submitted 4 months ago by Drewski from lock.cmpxchg8b.com
Trojanized Free Download Manager found to contain a Linux backdoor
submitted 6 months ago by [deleted] from securelist.com
Millions of Americans' health data stolen after MOVEit hackers targeted IBM
submitted 7 months ago by SoCo from techcrunch.com
Want to pwn a satellite? Turns out it's surprisingly easy
submitted 7 months ago by [deleted] from theregister.com
The Spy Shadow Trojan: Unveiling the First UEFI Motherboard BIOS Trojan
submitted 9 months ago by [deleted] from thefinalhop.com
Government-imposed backdoors make security much worse, not better
submitted 10 months ago by [deleted] from cromwell-intl.com
Hackers stole passwords of Worldcoin Orb operators
submitted 10 months ago by [deleted] from techcrunch.com
Security Researcher Finds Coldplay Lyrics in Kingston SSD Firmware
submitted 10 months ago by [deleted] from tomshardware.com
Rootkit Hunter scans systems for known and unknown rootkits, backdoors, sniffers and exploits
submitted 1 year ago by [deleted] from rkhunter.sourceforge.net
Threema Messenger billed as better than Signal is riddled with vulnerabilities
submitted 1 year ago by Drewski from arstechnica.com
Apple fixes ‘actively exploited’ zero-day affecting most iPhones
submitted 1 year ago by Drewski from techcrunch.com