reboot5853@lemmy.mlEnglish · 2 months agoELI5 Seedphrase Cryptographyplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareELI5 Seedphrase Cryptographyplus-squarereboot5853@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 4 months agoiOS more prone to attack than Android reveal analystsplus-squarewww.phonearena.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkiOS more prone to attack than Android reveal analystsplus-squarewww.phonearena.com💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 4 months agomessage-square0linkfedilink
💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 4 months agoAI Agents Will Be Manipulation Enginesplus-squareproreader.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAI Agents Will Be Manipulation Enginesplus-squareproreader.io💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 4 months agomessage-square0linkfedilink
positive_intentions@lemmy.mlEnglish · edit-28 months agoRoast the security of my appplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareRoast the security of my appplus-squarepositive_intentions@lemmy.mlEnglish · edit-28 months agomessage-square0linkfedilink
fubarx@lemmy.ml · edit-29 months agoWatch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokesplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWatch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokesplus-squarewww.wired.comfubarx@lemmy.ml · edit-29 months agomessage-square0linkfedilink
maltfield@monero.town · 9 months ago3TOFU: Verifying Unsigned Releasesplus-squaretech.michaelaltfield.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link3TOFU: Verifying Unsigned Releasesplus-squaretech.michaelaltfield.netmaltfield@monero.town · 9 months agomessage-square0linkfedilink
h0bbl3s@lemmy.world · 9 months agoVulnerability scanning with vulsplus-squareh0bbl3s.port0.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability scanning with vulsplus-squareh0bbl3s.port0.orgh0bbl3s@lemmy.world · 9 months agomessage-square0linkfedilink
Cedric@lemmy.ml · 9 months agoRelease 1.3.0 of Vulnerability Lookup with many improvementsplus-squarelemmy.mlimagemessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageRelease 1.3.0 of Vulnerability Lookup with many improvementsplus-squarelemmy.mlCedric@lemmy.ml · 9 months agomessage-square0linkfedilink
cerement@slrpnk.net · 9 months ago[Kevin Beaumont] What I learned from the ‘Microsoft global IT outage’plus-squaredoublepulsar.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link[Kevin Beaumont] What I learned from the ‘Microsoft global IT outage’plus-squaredoublepulsar.comcerement@slrpnk.net · 9 months agomessage-square0linkfedilink
Cedric@lemmy.ml · 9 months agoVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comCedric@lemmy.ml · 9 months agomessage-square0linkfedilink
kryllic@programming.dev · 10 months agoCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comkryllic@programming.dev · 10 months agomessage-square0linkfedilink
badelf@lemmy.ml · 11 months agoPayPal Is Planning an Ad Business Using Data on Its Millions of Shoppersplus-squarewww.wsj.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPayPal Is Planning an Ad Business Using Data on Its Millions of Shoppersplus-squarewww.wsj.combadelf@lemmy.ml · 11 months agomessage-square0linkfedilink
ylai@lemmy.mlEnglish · 1 year agoJetBrains TeamCity under attack by ransomware thugs after disclosure messplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJetBrains TeamCity under attack by ransomware thugs after disclosure messplus-squarewww.theregister.comylai@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
𝘋𝘪𝘳𝘬@lemmy.mlEnglish · 1 year agoWas there a recent hack/leak affecting Spotify?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWas there a recent hack/leak affecting Spotify?plus-square𝘋𝘪𝘳𝘬@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
birdcat@lemmy.ml · 1 year agoemail TLS questionplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareemail TLS questionplus-squarebirdcat@lemmy.ml · 1 year agomessage-square0linkfedilink
PenguinCoder@beehaw.orgEnglish · 1 year agoAn alternative approach to incident reportingplus-squarearchive.todayexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn alternative approach to incident reportingplus-squarearchive.todayPenguinCoder@beehaw.orgEnglish · 1 year agomessage-square0linkfedilink
mheld@infosec.pubEnglish · edit-21 year agoThe Most Significant AI-related Risks in 2024plus-squareblog.held.codesexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Most Significant AI-related Risks in 2024plus-squareblog.held.codesmheld@infosec.pubEnglish · edit-21 year agomessage-square0linkfedilink
chobeat@lemmy.mlEnglish · 1 year agoMobile reverse engineering to empower the gig economy workers and labor unionsplus-squaremedia.ccc.deexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMobile reverse engineering to empower the gig economy workers and labor unionsplus-squaremedia.ccc.dechobeat@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
krigo666@lemmy.world · 1 year agoJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackplus-squarearstechnica.comkrigo666@lemmy.world · 1 year agomessage-square0linkfedilink
kixik@lemmy.ml · 2 years agoMozilla patches Firefox, Thunderbird against zero-day exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMozilla patches Firefox, Thunderbird against zero-day exploited in attacksplus-squarewww.bleepingcomputer.comkixik@lemmy.ml · 2 years agomessage-square0linkfedilink