jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net TechSec
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

sub:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. sub:pics site:imgur.com dog

advanced search: by author, sub...

reset password
Submit a new link
Submit a new text post

TechSec

unsubscribesubscribe32,396 readers

~4 users here now

Information Security Technology sub. For resources, news, memes, and community.

Please review the rules before participating.

Affiliates

s/Techgore

created by BackwardsCompatiblea community for 1 year
message the moderators

MODERATORS

  • BackwardsCompatible
  • moderation team • moderation log

2
-

A Full Guide to Cybersecurity Framework

submitted 12 days ago by Oppossum from utopia.fans

  • comment
loading...

1
-

Safety Guide: What Is an Anonymizer gadget?

submitted 13 days ago by Oppossum from utopia.fans

  • comment
loading...

3
1

Is Advanced SystemCare safe?

submitted 22 days ago by Oppossum from utopia.fans

  • comment
loading...

2
-

The Danger of the Secured Search Extension

submitted 25 days ago by Oppossum from utopia.fans

  • comment
loading...

11
2

Misuse of Israeli Surveillance Tech for Massive Violation of Human Rights

submitted 1 month ago by nsopegasusyou from self.TechSec

  • comment
loading...

3
-

Secure and Anonymous P.O. Box: The Most Reliable Options

submitted 1 month ago by Oppossum from utopia.fans

  • comment
loading...

5
1

Cybersecurity Day: Let’s Celebrate All Together!

submitted 1 month ago by Oppossum from utopia.fans

  • comment
loading...

2
-

What banks can do to protect clients from Pegasus spyware?

submitted 1 month ago by lastwords from self.TechSec

  • comment
loading...

3
-

What is Phishing and How Do You Prevent It?

submitted 1 month ago by Oppossum from utopia.fans

  • comment
loading...

5
-

Artificial Intelligence, Machine Learning, and Deep Learning ( Complete Guide )

submitted 1 month ago by jamessidis from learnandmakeit.com

  • comment
loading...

4
-

How Artificial Intelligence Transforming Businesses

submitted 1 month ago by jamessidis from jamessidis.medium.com

  • comment
loading...

5
-

Security Posture Methods You Should Follow

submitted 1 month ago by Oppossum from utopia.fans

  • comment
loading...

9
2

One in ten shopping ads promoted on Google potentially lead to phishing sites

submitted 2 months ago by BeatFour444 from cybernews.com

  • 4 comments
loading...

2
-

Essential Security Metrics You Should Track

submitted 2 months ago by Oppossum from utopia.fans

  • comment
loading...

3
-

The Issue of Cyber Resilience

submitted 2 months ago by Oppossum from utopia.fans

  • 1 comment
loading...

2
-

List of Hacked Organizations Tops 200 in SolarWinds Case

submitted 2 months ago by FootballViking from govtech.com

  • 1 comment
loading...

2
-

The Most Famous Hackers of All Time

submitted 2 months ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Dozens of Al Jazeera journalists targeted in apparent iOS spyware attack

submitted 2 months ago by HearSmarter from theverge.com

  • 2 comments
loading...

25
5

Youtube's blocking of Tor and how to work around it

submitted 2 months ago by LarrySwinger2 from self.TechSec

  • 14 comments
loading...

3
-

Which add blockers works best with twitch new add system?

submitted 2 months ago by Akali from self.TechSec

  • 1 comment
loading...

7
-

Critical Flaws in Millions of IoT Devices May Never Get Fixed

submitted 2 months ago by HearSmarter from wired.com

  • 4 comments
loading...

3
-

Remove “Save Yourself Email” Scam

submitted 2 months ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Razer keyboard

submitted 3 months ago by iblog from plaza.ir

  • comment
loading...

13
1

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

submitted 3 months ago by HearSmarter from cybernews.com

  • 7 comments
loading...

2
-

Email Security Solutions for 2020

submitted 3 months ago by Oppossum from utopia.fans

  • comment
loading...

2
-

30% of top online shopping domains are vulnerable to BEAST SSL attack

submitted 3 months ago by Satircato from cybernews.com

  • comment
loading...

4
-

We infiltrated an IRC botnet. Here’s what we found

submitted 3 months ago by HearSmarter from cybernews.com

  • comment
loading...

2
-

David Geer’s Interview: Cybersecurity Now and In The Future

submitted 3 months ago by Oppossum from utopia.fans

  • comment
loading...

3
1

iOS 14 Has Been Hacked in 10 Seconds

submitted 3 months ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Privacy in iOS 14: Nine Main Features

submitted 3 months ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Working Methods of DNS Poisoning Protection

submitted 3 months ago by Oppossum from utopia.fans

  • comment
loading...

2
-

the businesssitebook

submitted 4 months ago by Johnchen969 from self.TechSec

  • comment
loading...

2
-

The Main Difference Between Virus and Worm

submitted 4 months ago by Oppossum from utopia.fans

  • comment
loading...

3
-

"In Complete Shock": China's Lead Chip Maker Denies PLA Military Ties As Trump Mulls Blacklisting

submitted 5 months ago by typhoon from zerohedge.com

  • comment
loading...

3
-

Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide

submitted 6 months ago by LarrySwinger2 from blog.checkpoint.com

  • 1 comment
loading...

11
1

Multiple Tor security issues disclosed, more to come

submitted 7 months ago by quipu from zdnet.com

  • 5 comments
loading...

1
-

If you need any help regarding smart devices then please visit us easily by calling on Toll-Free no.8884030508. Here we will provide our best assistance for your troubles.

submitted 7 months ago by justinmartin from 360smartdevice.blogspot.com

  • comment
loading...

21
3

New ‘Meow’ attack has deleted almost 4,000 unsecured databases

submitted 7 months ago by magnora7 from bleepingcomputer.com

  • 6 comments
loading...

11
3

Garmin obtains decryption key after ransomware attack

submitted 7 months ago by magnora7 from news.sky.com

  • comment
loading...

2
-

Handy Troubleshooting Guide For Ring Doorbell Issues-Smart Device Help

submitted 7 months ago by Jeorgesmith from self.TechSec

  • comment
loading...

1
-

Contact Us To Get Brilliant Assistance On Smart Device 360

submitted 7 months ago by Jeorgesmith from self.TechSec

  • comment
loading...

1
-

Brilliant Assistance On Smart Device 360- Smart Device

submitted 7 months ago by Jeorgesmith from self.TechSec

  • comment
loading...

4
2

Two Chinese Hackers Indicted for Stealing Terabytes of Data Over Eleven Years

submitted 7 months ago by hennaojichan from cryptome.org

  • 1 comment
loading...

7
1

3 interesting features of MySQL I bet you didn't know about

submitted 7 months ago by D0z from d0z.me

  • 1 comment
loading...

1
-

Is WhatsApp Safe and Secure? | Utopia.Fans

submitted 7 months ago by Hrusk from utopia.fans

  • 1 comment
loading...

2
-

Duckduckgo has Android related problem

submitted 7 months ago by ElifromtheBook from github.com

  • comment
loading...

3
2

Kids Need Encryption in Today's Internet | Tutanota Blog

submitted 9 months ago by DeWhoDeWho from tutanota.com

  • 2 comments
loading...

6
3

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show

submitted 10 months ago by JasonCarswell from youtube.com

  • 6 comments
loading...

2
1

Techno-Tyranny: How The US National Security State Is Using COVID-19 To Fulfill An Orwellian Vision [with Whitney Webb] (32:27) ~ The Last American Vagabond

submitted 10 months ago by JasonCarswell from youtube.com

  • comment
loading...

6
1

How The Android Malware That Survives Factory Reset Works

submitted 10 months ago by LarrySwinger2 from fossbytes.com

  • 5 comments
loading...

2
-

UN, WHO & Mila Map the AI vs COVID-19 Battlefield

submitted 11 months ago by Maruko from medium.com

  • 1 comment
loading...

2
1

New LVI Intel CPU Data Theft Vulnerability Requires Hardware Fix | BleepingComputer

submitted 11 months ago by DeWhoDeWho from bleepingcomputer.com

  • 1 comment
loading...

2
-

India under self-imposed quarantine due to Coronavirus. - InsightsSuccess

submitted 11 months ago by insightsmanoj from insightssuccess.com

  • comment
loading...

1
-

Augmented Training Scheme Fixes CNN Texture Bias

submitted 11 months ago by Maruko from medium.com

  • comment
loading...

1
-

Job Interviews turn Virtual due to Coronavirus

submitted 11 months ago by insightsmanoj from insightssuccess.com

  • comment
loading...

1
-

Airlines hit due to Coronavirus, 25 passengers on a 256 passengers

submitted 11 months ago by insightsmanoj from insightssuccess.com

  • comment
loading...

1
-

Does Samsung’s new Galaxy Z Flip phone mean we’re still hung up on flip phones?

submitted 1 year ago by fanterbanter from screenshot-magazine.com

  • comment
loading...

3
-

Don't lose your privacy with Utopia p2p

submitted 1 year ago by Hrusk from i.imgur.com

  • 1 comment
loading...

4
2

CacheOut - Leaking Data on Intel CPUs via Cache Evictions

submitted 1 year ago by Mnemonic from cacheoutattack.com

  • comment
loading...

3
1

Instagram is hiding the number of likes on posts partially because of a ‘Black Mirror’ episode

submitted 1 year ago by supertms38 from themilsource.com

  • comment
loading...

3
1

CIA is not omnipotent anymore :)

submitted 1 year ago by Hrusk from i.imgur.com

  • 1 comment
loading...

2
2

United States Government-Funded Phones come Pre-Installed with Unremovable Malware | Malwarebytes Labs

submitted 1 year ago by DeWhoDeWho from blog.malwarebytes.com

  • comment
loading...

2
-

Introducing BusKill: A Kill Cord for your Laptop

submitted 1 year ago by Drewski from tech.michaelaltfield.net

  • comment
loading...

1
-

Histoire de la langue Bulgare

submitted 1 year ago by hassen_webcom from tradlibre.fr

  • comment
loading...

2
1

Plundervolt [Intel vul.]

submitted 1 year ago by Mnemonic from plundervolt.com

  • comment
loading...

1
-

Do you also choose online privacy?

submitted 1 year ago by Hrusk from i.imgur.com

  • comment
loading...

1
-

ATTK of the Pwns: Trend Micro's antivirus tools 'will run malware – if its filename is cmd.exe'

submitted 1 year ago by Mnemonic from theregister.co.uk

  • comment
loading...

12
5

Samsung: Anyone's thumbprint can unlock S10 phone

submitted 1 year ago by Mnemonic from bbc.com

  • 2 comments
loading...

1
-

Cloud Pricing 101: Public vs. Private

submitted 1 year ago by justintime from vexxhost.com

  • comment
loading...

2
-

Why is MEAN Stack for App Development the Smart Choice?

submitted 1 year ago by digifutura from digifutura.com

  • comment
loading...

2
-

Why is UX-UI Design important in Banking & Financial Service?

submitted 1 year ago by digifutura from digifutura.com

  • comment
loading...

1
-

23 Texas Towns Hit by Coordinated Ransomware Attack

submitted 1 year ago by BackwardsCompatible from theverge.com

  • comment
loading...

3
1

With warshipping, hackers ship their exploits directly to their target’s mail room

submitted 1 year ago by Mnemonic from techcrunch.com

  • comment
loading...

3
-

A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts

submitted 1 year ago by Mnemonic from wired.com

  • 1 comment
loading...

1
-

Porn Bots on Instagram Switch to More Guileful Tactics [Redirects, Shortened URLs, DMs]

submitted 1 year ago by BackwardsCompatible from bleepingcomputer.com

  • comment
loading...

9
1

You Might Want to Uninstall VLC. Immediately.

submitted 1 year ago by Mnemonic from gizmodo.com

  • 3 comments
loading...

1
-

Hackers breach FSB contractor, expose Tor deanonymization project and more

submitted 1 year ago by BackwardsCompatible from zdnet.com

  • comment
loading...

4
-

Do People Realize They Are Creating Their Own Overlords? ~ Truthstream Media (43:59)

submitted 1 year ago by JasonCarswell from youtube.com

  • comment
loading...

2
-

The Infallible AI "Oracle" and the Future of "One Shot" Answers ~ Truthstream Media (28:59)

submitted 1 year ago by JasonCarswell from youtube.com

  • comment
loading...

5
-

Serious Zoom Security Flaw Could Let Websites Hijack Mac Cameras

submitted 1 year ago by BackwardsCompatible from theverge.com

  • comment
loading...

7
-

British Airways Faces Record-breaking GDPR Fine [£183 Million] after Data Breach

submitted 1 year ago by BackwardsCompatible from theverge.com

  • 1 comment
loading...

6
-

Mozilla Patches Firefox Zero-day Abused in the Wild

submitted 1 year ago by BackwardsCompatible from google.com

  • 1 comment
loading...

1
-

New Plurox Malware is a Backdoor, Cryptominer, and Worm, all Packed Into One

submitted 1 year ago by BackwardsCompatible from zdnet.com

  • comment
loading...

1
-

Irked Researcher Discloses Facebook WordPress Plugin Flaws

submitted 1 year ago by BackwardsCompatible from threatpost.com

  • comment
loading...

2
-

Hackers Release Border Control Data on Dark Web ~ Subverse - [ A hacked federal contractor’s DB was on the dark web. Microsoft recently purged their facial recognition DB. Detroit lawmakers and citizens finally address widespread facial recognition operated by law enforcement. Windsor is...? ]

submitted 1 year ago by JasonCarswell from youtube.com

  • comment
loading...

1
-

Retro Gaming Site Emuparadise Suffered Data Breach Exposing Account Details of 1.1 Million Members

submitted 1 year ago by BackwardsCompatible from cyware.com

  • comment
loading...

4
2

Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp? ~ Bryan Lunduke - [ If you haven't been paying attention, Firefox has been compromised. ]

submitted 1 year ago by JasonCarswell from youtube.com

  • 6 comments
loading...

1
-

Two-thirds of iOS Apps Disable ATS, an iOS Security Feature

submitted 1 year ago by BackwardsCompatible from zdnet.com

  • comment
loading...

17
2

Google Just Gave 2 Billion Chrome Users A Reason To Switch To Firefox | Ad Blocker Restriction

submitted 1 year ago by BackwardsCompatible from forbes.com

  • 8 comments
loading...

1
-

Ben Swann ON: Bi-Partisan Push for Facial Recognition Bans for Law Enforcement ~ Ben Swann

submitted 1 year ago by JasonCarswell from youtube.com

  • comment
loading...

2
-

Israel Tech Takeover - playlist by/of Know More News

submitted 1 year ago by JasonCarswell from youtube.com

  • 4 comments
loading...

1
-

Cory Doctorow: Big Tech, EU Copyright Directive, & the Chinafication of the Internet ~ Geopolitics & Empire - [ Cory is one of my heroes. More details in comments. ]

submitted 1 year ago by JasonCarswell from youtube.com

  • 2 comments
loading...

7
-

CrossFit Shutters Facebook, Instagram Accounts Amid Data Privacy Concerns

submitted 1 year ago by BackwardsCompatible from morningchalkup.com

  • comment
loading...

2
-

Amazon Shareholders Reject Concern Over Facial Recognition, AI National Strategy Bill ~ Subverse

submitted 1 year ago by JasonCarswell from youtube.com

  • comment
loading...

6
-

Amazon in line to get £300M contract to store your biometric data ~ Gordon Dimmack

submitted 1 year ago by JasonCarswell from youtube.com

  • 1 comment
loading...

1
-

Soaring Cryptocurrency Prices Draw Malicious Apps, Malware

submitted 1 year ago by BackwardsCompatible from threatpost.com

  • comment
loading...

6
-

Hackers Have Taken Over Baltimore Infrastructure, US Cities Need Better Cybersecurity ~ Subverse

submitted 1 year ago by JasonCarswell from youtube.com

  • comment
loading...

1
-

Safari Test Points to a Future with Tracker-Free Ads

submitted 1 year ago by BackwardsCompatible from nakedsecurity.sophos.com

  • comment
loading...

1
-

Epic Games Allegedly Sent a Player's Personal GDPR Data to a 'Random p Person'

submitted 1 year ago by BackwardsCompatible from techspot.com

  • 1 comment
loading...

1
-

Vulnerabilities, Government Surveillance and Bans: WhatsApp and Huawei

submitted 1 year ago by BackwardsCompatible from blog.cylab.co

  • comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2021 SaidIt