jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net TechSec
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

TechSec

unsubscribesubscribe34,945 readers

~1 user here now

Information Security Technology sub. For resources, news, memes, and community.

Please review the rules before participating.

Affiliates

s/Techgore

created by BackwardsCompatiblea community for 3 years
message the moderators

MODERATORS

  • BackwardsCompatible
  • moderation team • moderation log
links from:
all time
past hour
past 24 hours
past week
past month
past year

36
-

Facebook Still Tracks You After You Deactivate Account

submitted 3 years ago by BackwardsCompatible from cnet.com

  • 29 comments
loading...

25
5

Youtube's blocking of Tor and how to work around it

submitted 2 years ago by LarrySwinger2 from self.TechSec

  • 14 comments
loading...

22
3

New ‘Meow’ attack has deleted almost 4,000 unsecured databases

submitted 2 years ago by magnora7 from bleepingcomputer.com

  • 6 comments
loading...

18
1

Adblock Plus Exploit Allows Threat Actors to Read Gmail and Other Google Services | SC Media

submitted 3 years ago by BackwardsCompatible from scmagazine.com

  • 10 comments
loading...

17
2

Google Just Gave 2 Billion Chrome Users A Reason To Switch To Firefox | Ad Blocker Restriction

submitted 3 years ago by BackwardsCompatible from forbes.com

  • 8 comments
loading...

14
4

TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch

submitted 1 year ago by asterias from techcrunch.com

  • 4 comments
loading...

14
13

Best Programming Languages to Learn in 2021

submitted 1 year ago by jamessidis from learnandmakeit.com

  • 2 comments
loading...

13
1

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

submitted 2 years ago by HearSmarter from cybernews.com

  • 7 comments
loading...

12
5

Samsung: Anyone's thumbprint can unlock S10 phone

submitted 3 years ago by Mnemonic from bbc.com

  • 2 comments
loading...

12
-

4 New Vulnerabilities in Most Intel CPUs

submitted 3 years ago by BackwardsCompatible from engadget.com

  • 8 comments
loading...

11
2

Misuse of Israeli Surveillance Tech for Massive Violation of Human Rights

submitted 2 years ago by nsopegasusyou from self.TechSec

  • comment
loading...

11
1

Multiple Tor security issues disclosed, more to come

submitted 2 years ago by quipu from zdnet.com

  • 5 comments
loading...

11
3

Garmin obtains decryption key after ransomware attack

submitted 2 years ago by magnora7 from news.sky.com

  • comment
loading...

11
-

At Least 186 EU ISPs Use Deep-Packet Inspection to Shape Traffic, Break Net Neutrality

submitted 3 years ago by BackwardsCompatible from zdnet.com

  • 1 comment
loading...

11
-

Mozilla Will Block Firefox Add-Ons That Contain Obfuscated Code -

submitted 3 years ago by BackwardsCompatible from helpnetsecurity.com

  • 5 comments
loading...

10
1

WhatsApp Discovers Surveillance Attack

submitted 3 years ago by BackwardsCompatible from bbc.com

  • 2 comments
loading...

9
1

TikTok Is China’s Trojan Horse

submitted 7 months ago by cottoneyejoe from nationalreview.com

  • 8 comments
loading...

9
2

One in ten shopping ads promoted on Google potentially lead to phishing sites

submitted 2 years ago by BeatFour444 from cybernews.com

  • 4 comments
loading...

9
1

You Might Want to Uninstall VLC. Immediately.

submitted 3 years ago by Mnemonic from gizmodo.com

  • 3 comments
loading...

9
-

DNS Over HTTPS is Coming Whether ISPs and Governments Like It or Not

submitted 3 years ago by BackwardsCompatible from nakedsecurity.sophos.com

  • 3 comments
loading...

8
1

An FCC commissioner calls on Apple and Google to remove TikTok from their app stores, saying it's a national security risk

submitted 7 months ago by cottoneyejoe from businessinsider.com

  • 2 comments
loading...

8
-

'Matrix'-Themed Ransomware Variant Spreads

submitted 3 years ago by BackwardsCompatible from darkreading.com

  • comment
loading...

8
-

Mac Malware Jumps More Than 60% in Three Months, Massive Uptick in Adware

submitted 3 years ago by BackwardsCompatible from iphone.appleinsider.com

  • comment
loading...

7
-

Critical Flaws in Millions of IoT Devices May Never Get Fixed

submitted 2 years ago by HearSmarter from wired.com

  • 4 comments
loading...

7
1

3 interesting features of MySQL I bet you didn't know about

submitted 2 years ago by D0z from d0z.me

  • 1 comment
loading...

7
-

British Airways Faces Record-breaking GDPR Fine [£183 Million] after Data Breach

submitted 3 years ago by BackwardsCompatible from theverge.com

  • 1 comment
loading...

7
-

CrossFit Shutters Facebook, Instagram Accounts Amid Data Privacy Concerns

submitted 3 years ago by BackwardsCompatible from morningchalkup.com

  • comment
loading...

7
-

Microsoft warns of major WannaCry-like Windows security exploit, releases XP patches

submitted 3 years ago by Mnemonic from theverge.com

  • 8 comments
loading...

6
-

Apple turned off a private communication tool in China just before major protests broke out

submitted 2 months ago by chottohen from reclaimthenet.org

  • comment
loading...

6
3

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show

submitted 2 years ago by JasonCarswell from youtube.com

  • 6 comments
loading...

6
1

How The Android Malware That Survives Factory Reset Works

submitted 2 years ago by LarrySwinger2 from fossbytes.com

  • 5 comments
loading...

6
-

Mozilla Patches Firefox Zero-day Abused in the Wild

submitted 3 years ago by BackwardsCompatible from google.com

  • 1 comment
loading...

6
-

Amazon in line to get £300M contract to store your biometric data ~ Gordon Dimmack

submitted 3 years ago by JasonCarswell from youtube.com

  • 1 comment
loading...

6
-

Hackers Have Taken Over Baltimore Infrastructure, US Cities Need Better Cybersecurity ~ Subverse

submitted 3 years ago by JasonCarswell from youtube.com

  • comment
loading...

6
-

Top Cybersecurity Experts stand up for Digital Right to Repair

submitted 3 years ago by BackwardsCompatible from darkreading.com

  • comment
loading...

6
1

Security Flaws in P2P [iLnkP2P] Leave IoT Devices Vulnerable

submitted 3 years ago by BackwardsCompatible from infosecurity-magazine.com

  • 1 comment
loading...

5
1

Binance hit by $100 million blockchain bridge hack

submitted 4 months ago by GeorgeCarlin from techcrunch.com

  • comment
loading...

5
1

Cybersecurity Day: Let’s Celebrate All Together!

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

5
-

Artificial Intelligence, Machine Learning, and Deep Learning ( Complete Guide )

submitted 2 years ago by jamessidis from learnandmakeit.com

  • comment
loading...

5
-

Security Posture Methods You Should Follow

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

5
-

Serious Zoom Security Flaw Could Let Websites Hijack Mac Cameras

submitted 3 years ago by BackwardsCompatible from theverge.com

  • comment
loading...

5
-

Netflix Content Compromised in Widevine DRM Hack

submitted 3 years ago by BackwardsCompatible from threatpost.com

  • 2 comments
loading...

5
-

Cloud Database Removed After Exposing Details on 80 Million US Households

submitted 3 years ago by BackwardsCompatible from cnet.com

  • comment
loading...

5
-

GitHub-Hosted Magecart Card Skimmer Found on Hundreds of Stores

submitted 3 years ago by BackwardsCompatible from bleepingcomputer.com

  • 1 comment
loading...

4
-

Oracle Class-Action Lawsuit: 5 Billion tracked - "Surveillance Machine" complaint filing

submitted 1 month ago by Gaydolf_Titler from docketalarm.com

  • 1 comment
loading...

4
1

Uber hacked, internal systems breached and vulnerability reports stolen

submitted 4 months ago by unbanned from bleepingcomputer.com

  • comment
loading...

4
1

Hacking the PS4 / PS5 through the PS2 Emulator - Part 1 - Escape

submitted 4 months ago by GeorgeCarlin from cturt.github.io

  • comment
loading...

4
1

Mystique in the House: The Droid Vulnerability Chain that Owns All Your Applications

submitted 5 months ago by GeorgeCarlin from dawnslab.jd.com

  • comment
loading...

4
-

How to Enable Global Privacy Control

submitted 7 months ago by cottoneyejoe from firewallsdontstopdragons.com

  • comment
loading...

4
-

Is a Self-Encrypting Drive Necessary for You?

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

4
-

How Artificial Intelligence Transforming Businesses

submitted 2 years ago by jamessidis from jamessidis.medium.com

  • comment
loading...

4
-

We infiltrated an IRC botnet. Here’s what we found

submitted 2 years ago by HearSmarter from cybernews.com

  • comment
loading...

4
2

Two Chinese Hackers Indicted for Stealing Terabytes of Data Over Eleven Years

submitted 2 years ago by hennaojichan from cryptome.org

  • 1 comment
loading...

4
2

CacheOut - Leaking Data on Intel CPUs via Cache Evictions

submitted 3 years ago by Mnemonic from cacheoutattack.com

  • comment
loading...

4
-

Do People Realize They Are Creating Their Own Overlords? ~ Truthstream Media (43:59)

submitted 3 years ago by JasonCarswell from youtube.com

  • comment
loading...

4
2

Firefox's Enhanced Tracking Protection whitelists Google, Instagram... and Winamp? ~ Bryan Lunduke - [ If you haven't been paying attention, Firefox has been compromised. ]

submitted 3 years ago by JasonCarswell from youtube.com

  • 6 comments
loading...

4
1

China Uses Biometrics and Digital Scanning 'Data Dlors' to Track Muslim Minority

submitted 3 years ago by BackwardsCompatible from zdnet.com

  • comment
loading...

4
-

Hackers Impersonate Microsoft More Than Any Other Brand in Phishing attacks

submitted 3 years ago by BackwardsCompatible from techrepublic.com

  • comment
loading...

4
-

Fake Windows PC Cleaner Drops AZORult Info-Stealing Trojan

submitted 3 years ago by BackwardsCompatible from bleepingcomputer.com

  • comment
loading...

3
-

Execution Unit Scheduler Contention Side-Channel Vulnerability on AMD Processors (SQUIP)

submitted 6 months ago by GeorgeCarlin from amd.com

  • comment
loading...

3
-

AEPIC Leak

submitted 6 months ago by GeorgeCarlin from aepicleak.com

  • comment
loading...

3
-

Deepfakes Can Fool Biometric Checks Used By Banks, Research Finds

submitted 8 months ago by asterias from greatgameindia.com

  • comment
loading...

3
-

PrivacyTools - Encryption Against Global Mass Surveillance

submitted 1 year ago by cottoneyejoe from privacytools.io

  • 3 comments
loading...

3
1

ProtonMail Logged IP Addresses For The Government! Can You Still Trust Them? -Surveillance Report 54

submitted 1 year ago by lastwords from youtu.be

  • 2 comments
loading...

3
1

Is AdGuard Safe to Use?

submitted 1 year ago by Oppossum from utopia.fans

  • 1 comment
loading...

3
1

Is Advanced SystemCare safe?

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

3
-

Secure and Anonymous P.O. Box: The Most Reliable Options

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
-

What is Phishing and How Do You Prevent It?

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
-

The Issue of Cyber Resilience

submitted 2 years ago by Oppossum from utopia.fans

  • 1 comment
loading...

3
-

Which add blockers works best with twitch new add system?

submitted 2 years ago by Akali from self.TechSec

  • 1 comment
loading...

3
-

Remove “Save Yourself Email” Scam

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
1

iOS 14 Has Been Hacked in 10 Seconds

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
-

"In Complete Shock": China's Lead Chip Maker Denies PLA Military Ties As Trump Mulls Blacklisting

submitted 2 years ago by typhoon from zerohedge.com

  • comment
loading...

3
-

Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide

submitted 2 years ago by LarrySwinger2 from blog.checkpoint.com

  • 1 comment
loading...

3
1

Instagram is hiding the number of likes on posts partially because of a ‘Black Mirror’ episode

submitted 3 years ago by supertms38 from themilsource.com

  • comment
loading...

3
1

With warshipping, hackers ship their exploits directly to their target’s mail room

submitted 3 years ago by Mnemonic from techcrunch.com

  • comment
loading...

3
-

A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts

submitted 3 years ago by Mnemonic from wired.com

  • 1 comment
loading...

3
-

Critical, Remote, ‘Wormable’ Windows Vulnerability

submitted 3 years ago by BackwardsCompatible from nakedsecurity.sophos.com

  • comment
loading...

3
-

Update Regarding Add-ons in Firefox

submitted 3 years ago by BackwardsCompatible from blog.mozilla.org

  • 1 comment
loading...

3
-

New Facebook Messenger Malware [NSFD] [Awareness]

submitted 3 years ago by BackwardsCompatible from mobile.twitter.com

  • 1 comment
loading...

3
-

The World's Password Security is Still Atrocious

submitted 3 years ago by BackwardsCompatible from theinquirer.net

  • comment
loading...

3
-

FBI Solves Mystery Surrounding 15-Year-Old Fruitfly Mac Malware

submitted 3 years ago by BackwardsCompatible from google.com

  • comment
loading...

2
-

Complete website voor je restaurant

submitted 3 months ago by Jevynl from jevy.nl

  • comment
loading...

2
-

Timing Attacks on WhatsApp, Signal, and Threema can Reveal User Location

submitted 3 months ago by jumba_jukiba from restoreprivacy.com

  • 1 comment
loading...

2
-

Lenovo: Multi-Vendor BIOS Security Vulnerabilities (September 2022)

submitted 4 months ago by GeorgeCarlin from support.lenovo.com

  • comment
loading...

2
-

i would love a free robot wife

submitted 6 months ago by yelgy from self.TechSec

  • 11 comments
loading...

2
-

iPhone Cracked Screen Repair Bournemouth

submitted 9 months ago by andresapplerepairs from andresapplerepairs.co.uk

  • comment
loading...

2
-

TriggerMesh - Cloud-native serverless integration

submitted 11 months ago by markhinkle from triggermesh.com

  • comment
loading...

2
-

Future of CMS Industry: Facts, Figures, Trends and Statistics

submitted 1 year ago by stephen110 from openxcell.com

  • comment
loading...

2
-

Token Auth- Pros and Cons

submitted 1 year ago by lynncobb12 from loginradius.com

  • comment
loading...

2
-

Technology Against Human Rights: Cellebrite’s Surveillance Software

submitted 1 year ago by BillyMildish from thebattleground.eu

  • comment
loading...

2
-

Chinese Hackers Carry Out Attacks on Linux

submitted 1 year ago by Oppossum from utopia.fans

  • 1 comment
loading...

2
-

How to protect unified cloud?

submitted 1 year ago by scottrobin from loginradius.com

  • comment
loading...

2
1

Okta acquires Auth0

submitted 1 year ago by scottrobin from loginradius.com

  • comment
loading...

2
-

The Danger of Social Engineering to Watch Out For

submitted 1 year ago by Oppossum from utopia.fans

  • 1 comment
loading...

2
-

A Full Guide to Cybersecurity Framework

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

The Danger of the Secured Search Extension

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

What banks can do to protect clients from Pegasus spyware?

submitted 2 years ago by lastwords from self.TechSec

  • comment
loading...

2
-

Essential Security Metrics You Should Track

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

List of Hacked Organizations Tops 200 in SolarWinds Case

submitted 2 years ago by FootballViking from govtech.com

  • 1 comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2023 SaidIt