use the following search parameters to narrow your results:
e.g. subreddit:pics site:imgur.com dog
subreddit:pics site:imgur.com dog
advanced search: by author, sub...
~4 users here now
Information Security Technology sub. For resources, news, memes, and community.
Please review the rules before participating.
Affiliates
s/Techgore
Best Programming Languages to Learn in 2021
submitted 4 years ago by jamessidis from learnandmakeit.com
Youtube's blocking of Tor and how to work around it
submitted 4 years ago by LarrySwinger2 from self.TechSec
Samsung: Anyone's thumbprint can unlock S10 phone
submitted 5 years ago by Mnemonic from bbc.com
TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch
submitted 3 years ago by asterias from techcrunch.com
The Cryptographer Who Ensures We Can Trust Our Computers | Quanta Magazine
submitted 1 year ago by boston_blackie from quantamagazine.org
Reddit systems were hacked
submitted 2 years ago by [deleted] from old.reddit.com
Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide
submitted 4 years ago by LarrySwinger2 from blog.checkpoint.com
New ‘Meow’ attack has deleted almost 4,000 unsecured databases
submitted 4 years ago by magnora7 from bleepingcomputer.com
Garmin obtains decryption key after ransomware attack
submitted 4 years ago by magnora7 from news.sky.com
Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show
submitted 4 years ago by JasonCarswell from youtube.com
ProtonMail Logged IP Addresses For The Government! Can You Still Trust Them? -Surveillance Report 54
submitted 3 years ago by lastwords from youtu.be
Misuse of Israeli Surveillance Tech for Massive Violation of Human Rights
submitted 4 years ago by nsopegasusyou from self.TechSec
One in ten shopping ads promoted on Google potentially lead to phishing sites
submitted 4 years ago by BeatFour444 from cybernews.com
Two Chinese Hackers Indicted for Stealing Terabytes of Data Over Eleven Years
submitted 4 years ago by hennaojichan from cryptome.org
CacheOut - Leaking Data on Intel CPUs via Cache Evictions
submitted 5 years ago by Mnemonic from cacheoutattack.com
Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp? ~ Bryan Lunduke - [ If you haven't been paying attention, Firefox has been compromised. ]
submitted 5 years ago by JasonCarswell from youtube.com
Google Just Gave 2 Billion Chrome Users A Reason To Switch To Firefox | Ad Blocker Restriction
submitted 5 years ago by BackwardsCompatible from forbes.com
DEF CON 31 - An Audacious Plan to Halt the Internet's Enshittification - Cory Doctorow
submitted 1 year ago by hfxB0oyA from youtu.be
Binance hit by $100 million blockchain bridge hack
submitted 2 years ago by [deleted] from techcrunch.com
Uber hacked, internal systems breached and vulnerability reports stolen
submitted 2 years ago by unbanned from bleepingcomputer.com
Hacking the PS4 / PS5 through the PS2 Emulator - Part 1 - Escape
submitted 2 years ago by [deleted] from cturt.github.io
Mystique in the House: The Droid Vulnerability Chain that Owns All Your Applications
submitted 2 years ago by [deleted] from dawnslab.jd.com
Execution Unit Scheduler Contention Side-Channel Vulnerability on AMD Processors (SQUIP)
submitted 2 years ago by [deleted] from amd.com
An FCC commissioner calls on Apple and Google to remove TikTok from their app stores, saying it's a national security risk
submitted 2 years ago by cottoneyejoe from businessinsider.com
TikTok Is China’s Trojan Horse
submitted 2 years ago by cottoneyejoe from nationalreview.com
YubiKey 4C vs. Nitrokey Pro: Stalemate
submitted 3 years ago by LarrySwinger2 from web.archive.org
What to do with these cards?
submitted 3 years ago by soap39524 from self.TechSec
Is AdGuard Safe to Use?
submitted 4 years ago by Oppossum from utopia.fans
Is Advanced SystemCare safe?
Cybersecurity Day: Let’s Celebrate All Together!
Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices
submitted 4 years ago by HearSmarter from cybernews.com
iOS 14 Has Been Hacked in 10 Seconds
Multiple Tor security issues disclosed, more to come
submitted 4 years ago by quipu from zdnet.com
3 interesting features of MySQL I bet you didn't know about
submitted 4 years ago by D0z from d0z.me
Techno-Tyranny: How The US National Security State Is Using COVID-19 To Fulfill An Orwellian Vision [with Whitney Webb] (32:27) ~ The Last American Vagabond
How The Android Malware That Survives Factory Reset Works
submitted 4 years ago by LarrySwinger2 from fossbytes.com
Instagram is hiding the number of likes on posts partially because of a ‘Black Mirror’ episode
submitted 5 years ago by supertms38 from themilsource.com
Plundervolt [Intel vul.]
submitted 5 years ago by Mnemonic from plundervolt.com
With warshipping, hackers ship their exploits directly to their target’s mail room
submitted 5 years ago by Mnemonic from techcrunch.com
You Might Want to Uninstall VLC. Immediately.
submitted 5 years ago by Mnemonic from gizmodo.com
A Laptop With 6 Of The Most Destructive Malware Threats Ever Is Up For Auction
WhatsApp Discovers Surveillance Attack
submitted 5 years ago by BackwardsCompatible from bbc.com
China Uses Biometrics and Digital Scanning 'Data Dlors' to Track Muslim Minority
submitted 5 years ago by BackwardsCompatible from zdnet.com
Security Flaws in P2P [iLnkP2P] Leave IoT Devices Vulnerable
submitted 5 years ago by BackwardsCompatible from infosecurity-magazine.com
Adblock Plus Exploit Allows Threat Actors to Read Gmail and Other Google Services | SC Media
submitted 5 years ago by BackwardsCompatible from scmagazine.com
How Facebook is Spying on You, and What You Can do to Stop It
submitted 6 years ago by BackwardsCompatible from blog.hotspotshield.com
The US Is Considering a TP-Link Router Ban—Should You Worry?
submitted 1 month ago by IncontinentiaButtoks from wired.com