use the following search parameters to narrow your results:
e.g. sub:pics site:imgur.com dog
sub:pics site:imgur.com dog
advanced search: by author, sub...
~4 users here now
Information Security Technology sub. For resources, news, memes, and community.
Please review the rules before participating.
Best Programming Languages to Learn in 2021
submitted 10 months ago by jamessidis from learnandmakeit.com
Youtube's blocking of Tor and how to work around it
submitted 1 year ago by LarrySwinger2 from self.TechSec
Samsung: Anyone's thumbprint can unlock S10 phone
submitted 2 years ago by Mnemonic from bbc.com
TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch
submitted 7 months ago by asterias from techcrunch.com
New ‘Meow’ attack has deleted almost 4,000 unsecured databases
submitted 1 year ago by magnora7 from bleepingcomputer.com
Garmin obtains decryption key after ransomware attack
submitted 1 year ago by magnora7 from news.sky.com
Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show
submitted 1 year ago by JasonCarswell from youtube.com
Misuse of Israeli Surveillance Tech for Massive Violation of Human Rights
submitted 12 months ago by nsopegasusyou from self.TechSec
One in ten shopping ads promoted on Google potentially lead to phishing sites
submitted 1 year ago by BeatFour444 from cybernews.com
Two Chinese Hackers Indicted for Stealing Terabytes of Data Over Eleven Years
submitted 1 year ago by hennaojichan from cryptome.org
CacheOut - Leaking Data on Intel CPUs via Cache Evictions
submitted 1 year ago by Mnemonic from cacheoutattack.com
Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp? ~ Bryan Lunduke - [ If you haven't been paying attention, Firefox has been compromised. ]
submitted 2 years ago by JasonCarswell from youtube.com
Google Just Gave 2 Billion Chrome Users A Reason To Switch To Firefox | Ad Blocker Restriction
submitted 2 years ago by BackwardsCompatible from forbes.com
ProtonMail Logged IP Addresses For The Government! Can You Still Trust Them? -Surveillance Report 54
submitted 4 months ago by lastwords from youtu.be
YubiKey 4C vs. Nitrokey Pro: Stalemate
submitted 5 months ago by LarrySwinger2 from web.archive.org
What to do with these cards?
submitted 6 months ago by soap39524 from self.TechSec
Is AdGuard Safe to Use?
submitted 10 months ago by Oppossum from utopia.fans
Okta acquires Auth0
submitted 10 months ago by scottrobin from loginradius.com
Is Advanced SystemCare safe?
submitted 11 months ago by Oppossum from utopia.fans
Cybersecurity Day: Let’s Celebrate All Together!
submitted 1 year ago by Oppossum from utopia.fans
Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices
submitted 1 year ago by HearSmarter from cybernews.com
iOS 14 Has Been Hacked in 10 Seconds
Multiple Tor security issues disclosed, more to come
submitted 1 year ago by quipu from zdnet.com
3 interesting features of MySQL I bet you didn't know about
submitted 1 year ago by D0z from d0z.me
Techno-Tyranny: How The US National Security State Is Using COVID-19 To Fulfill An Orwellian Vision [with Whitney Webb] (32:27) ~ The Last American Vagabond
How The Android Malware That Survives Factory Reset Works
submitted 1 year ago by LarrySwinger2 from fossbytes.com
Instagram is hiding the number of likes on posts partially because of a ‘Black Mirror’ episode
submitted 2 years ago by supertms38 from themilsource.com
Plundervolt [Intel vul.]
submitted 2 years ago by Mnemonic from plundervolt.com
With warshipping, hackers ship their exploits directly to their target’s mail room
submitted 2 years ago by Mnemonic from techcrunch.com
You Might Want to Uninstall VLC. Immediately.
submitted 2 years ago by Mnemonic from gizmodo.com
A Laptop With 6 Of The Most Destructive Malware Threats Ever Is Up For Auction
WhatsApp Discovers Surveillance Attack
submitted 2 years ago by BackwardsCompatible from bbc.com
China Uses Biometrics and Digital Scanning 'Data Dlors' to Track Muslim Minority
submitted 2 years ago by BackwardsCompatible from zdnet.com
Security Flaws in P2P [iLnkP2P] Leave IoT Devices Vulnerable
submitted 2 years ago by BackwardsCompatible from infosecurity-magazine.com
Adblock Plus Exploit Allows Threat Actors to Read Gmail and Other Google Services | SC Media
submitted 2 years ago by BackwardsCompatible from scmagazine.com
How Facebook is Spying on You, and What You Can do to Stop It
submitted 2 years ago by BackwardsCompatible from blog.hotspotshield.com
A Thin Client as a Very Inexpensive Low-Power Home Theater PC
submitted 1 month ago by gebTA48 from cheapskatesguide.org
PrivacyTools - Encryption Against Global Mass Surveillance
submitted 3 months ago by cottoneyejoe from privacytools.io
Guide to Digital Identity Verification
submitted 5 months ago by Louis23 from loginradius.com
Future of CMS Industry: Facts, Figures, Trends and Statistics
submitted 5 months ago by stephen110 from openxcell.com
Striking the balance between CX and Security
submitted 5 months ago by lynncobb12 from lnkd.in
How to handle risks after a data breach?
submitted 5 months ago by lynncobb12 from loginradius.com
Effective ways to scale your business using Modern IAM
Token Auth- Pros and Cons
To find out how to get Cash App Refund from the application in cash?
submitted 7 months ago by brayden95400 from experts-support.com
How does Cash App really give away money if bank subtleties added? Dial helpline number to find maintain.
Technology Against Human Rights: Cellebrite’s Surveillance Software
submitted 9 months ago by BillyMildish from thebattleground.eu
Introduction to Design Systems for UX/UI Designers
submitted 10 months ago by AfifaVora from hackernoon.com
Chinese Hackers Carry Out Attacks on Linux
Is a Self-Encrypting Drive Necessary for You?
Designing for iPhone X Screen Dimensions: 9 Tips for a Great UX
How to protect unified cloud?
The Danger of Social Engineering to Watch Out For
A Full Guide to Cybersecurity Framework
Safety Guide: What Is an Anonymizer gadget?
The Danger of the Secured Search Extension
Secure and Anonymous P.O. Box: The Most Reliable Options
submitted 12 months ago by Oppossum from utopia.fans
What banks can do to protect clients from Pegasus spyware?
submitted 1 year ago by lastwords from self.TechSec
What is Phishing and How Do You Prevent It?
Artificial Intelligence, Machine Learning, and Deep Learning ( Complete Guide )
submitted 1 year ago by jamessidis from learnandmakeit.com
How Artificial Intelligence Transforming Businesses
submitted 1 year ago by jamessidis from jamessidis.medium.com
Security Posture Methods You Should Follow
Essential Security Metrics You Should Track
The Issue of Cyber Resilience
List of Hacked Organizations Tops 200 in SolarWinds Case
submitted 1 year ago by FootballViking from govtech.com
The Most Famous Hackers of All Time
Dozens of Al Jazeera journalists targeted in apparent iOS spyware attack
submitted 1 year ago by HearSmarter from theverge.com
Which add blockers works best with twitch new add system?
submitted 1 year ago by Akali from self.TechSec
Critical Flaws in Millions of IoT Devices May Never Get Fixed
submitted 1 year ago by HearSmarter from wired.com
Remove “Save Yourself Email” Scam
submitted 1 year ago by iblog from plaza.ir
Email Security Solutions for 2020
30% of top online shopping domains are vulnerable to BEAST SSL attack
submitted 1 year ago by Satircato from cybernews.com
We infiltrated an IRC botnet. Here’s what we found
David Geer’s Interview: Cybersecurity Now and In The Future
Privacy in iOS 14: Nine Main Features
Working Methods of DNS Poisoning Protection
submitted 1 year ago by Johnchen969 from self.TechSec
The Main Difference Between Virus and Worm
"In Complete Shock": China's Lead Chip Maker Denies PLA Military Ties As Trump Mulls Blacklisting
submitted 1 year ago by typhoon from zerohedge.com
Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide
submitted 1 year ago by LarrySwinger2 from blog.checkpoint.com
If you need any help regarding smart devices then please visit us easily by calling on Toll-Free no.8884030508. Here we will provide our best assistance for your troubles.
submitted 1 year ago by justinmartin from 360smartdevice.blogspot.com
Contact Us To Get Brilliant Assistance On Smart Device 360
submitted 1 year ago by Jeorgesmith from self.TechSec
Handy Troubleshooting Guide For Ring Doorbell Issues-Smart Device Help
Brilliant Assistance On Smart Device 360- Smart Device
Duckduckgo has Android related problem
submitted 1 year ago by [deleted] from github.com
UN, WHO & Mila Map the AI vs COVID-19 Battlefield
submitted 1 year ago by Maruko from medium.com
India under self-imposed quarantine due to Coronavirus. - InsightsSuccess
submitted 1 year ago by insightsmanoj from insightssuccess.com
Augmented Training Scheme Fixes CNN Texture Bias
Job Interviews turn Virtual due to Coronavirus
Airlines hit due to Coronavirus, 25 passengers on a 256 passengers
Does Samsung’s new Galaxy Z Flip phone mean we’re still hung up on flip phones?
submitted 1 year ago by fanterbanter from screenshot-magazine.com
Introducing BusKill: A Kill Cord for your Laptop
submitted 2 years ago by Drewski from tech.michaelaltfield.net
Histoire de la langue Bulgare
submitted 2 years ago by hassen_webcom from tradlibre.fr
ATTK of the Pwns: Trend Micro's antivirus tools 'will run malware – if its filename is cmd.exe'
submitted 2 years ago by Mnemonic from theregister.co.uk
Cloud Pricing 101: Public vs. Private
submitted 2 years ago by justintime from vexxhost.com
Why is MEAN Stack for App Development the Smart Choice?
submitted 2 years ago by digifutura from digifutura.com
Why is UX-UI Design important in Banking & Financial Service?
23 Texas Towns Hit by Coordinated Ransomware Attack
submitted 2 years ago by BackwardsCompatible from theverge.com
A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts
submitted 2 years ago by Mnemonic from wired.com