-
24 votes
-
Mom’s Meals discloses data breach impacting 1.2 million people
17 votes -
Planned Danish law will make improper treatment of the Quran or Bible a criminal offence punishable by a fine and jail sentence of up to two years
39 votes -
WinRAR zero-day exploited since April to hack trading accounts
31 votes -
Cyberattack shutters major National Science Foundation-funded telescopes for more than two weeks
18 votes -
A new weapon in the war against robocalls
42 votes -
ProtonMail complied with 5,957 data requests in 2022 – still secure and private?
24 votes -
The King of Jordan approved a cybercrime bill that will crack down on online speech deemed harmful to national unity
18 votes -
Unknown tracker alert on Android
I just received an Unknown Tracker alert on my Pixel 7 running Android 14 beta 5 for an Apple air tag that was on my son in laws key chain as I had borrowed his car. I heard this was coming but...
I just received an Unknown Tracker alert on my Pixel 7 running Android 14 beta 5 for an Apple air tag that was on my son in laws key chain as I had borrowed his car.
I heard this was coming but didn't expect it so soon!
Quite impressed with both the information given and the general advice and steps to take offered.
The first notification was "Tracker Travelling With You: Unknown Apple air tag detected. The owner can see your location."
Touching "more info" then shows a map of where the tracker has been with me and the option to make the tracker play a sound to help locate it, with a note that the owner won't know you've done that.
Then more advice and options:
- If you feel unsafe, get help.
- Get and save tracker info
- Disable the tracker (with a how-to guide on battery removal)
And a ”need more help" link.
As I said, I had heard about this coming but was pleasantly surprised at how good it was and the general advice and help offered up.
Nice seeing things like this done right.
34 votes -
A totaled Tesla was sold for parts in the US but came back online in Ukraine — here’s what happened
15 votes -
Downfall security vulnerability in Intel processors
40 votes -
The trouble with decommissioning a used FIDO security key
16 votes -
Zenbleed - Zen 2 hardware vulnerability
19 votes -
New acoustic attack steals data from keystrokes with 95% accuracy
48 votes -
FedFingerprinting: A federated learning approach to website fingerprinting attacks in Tor networks
6 votes -
Adventures with pf, nix darwin, and Tailscale on macOS Ventura
11 votes -
Hackers exploited a zero-day flaw in Ivanti's software undetected for at least three months, US and Norwegian cybersecurity agencies warn
14 votes -
Denmark is considering banning protests involving burning the Quran or other religious texts over security and diplomatic concerns – Sweden looking to follow suit
18 votes -
You've got Mali: UK Ministry of Defence accidentally emails Russia ally
18 votes -
On attestation on the web and why this could threaten the open web
13 votes -
How Chinese surveillance methods are going global
12 votes -
How do I get started in self hosting?
I'm curious on how to get started in self hosting. I have computer experience, being an Android Developer, but I hardly have experience in Linux and backend/networking work. I've been wanting to...
I'm curious on how to get started in self hosting. I have computer experience, being an Android Developer, but I hardly have experience in Linux and backend/networking work.
I've been wanting to start up a Plex/Jellyfin server for a while, and I have an old system sitting around with a Ryzen 1700 with a graphics card in there as well that's been begging for attention, and maybe I can throw on a Minecraft server in there as well. Since I travel a bunch, it would be nice too to be able to access my media for when I'm traveling, or to let my parents or friends access some shows if they so desire!
What I'm worried about is exposing my network to the internet basically. I used to run a Minecraft server with port forwarding and such on a personal computer but now I'm realizing that that's probably a bit unsafe lol.
Basically, are there any guides that I can look at, or any of your own experiences that could potentially help me or anyone who's interested?
28 votes -
Microsoft lost its keys, and the US government got hacked
25 votes -
Concerns about new facial recognition software implemented by TSA at US airports
42 votes -
Mastodon social network patches critical flaws allowing server takeover
18 votes -
Cops are already treating self-driving cars as 'surveillance cameras on wheels'
16 votes -
RowPress: Amplifying Read Disturbance in Modern DRAM Chips
6 votes -
Exclusive: CNN obtains the tape of former US President Donald Trump’s 2021 conversation about classified documents
99 votes -
NeverSSL
12 votes -
Proton Pass, open-source and encrypted password manager
17 votes -
LastPass users locked out due to MFA resets
64 votes -
Apple fixes zero-days used to deploy Triangulation spyware via iMessage
8 votes -
Phasing out passwords: Apple to automatically assign each user a Passkey
57 votes -
How to keep a secret in Python apps
5 votes -
Security expert defeats Lenovo laptop BIOS password with a screwdriver
13 votes -
The US is openly stockpiling dirt on all its citizens
25 votes -
Former US President Donald Trump indicted for second time, sources say
130 votes -
Google Authenticator now supports Google Account synchronization
After 11 years of life, Google Authenticator has added cloud backups for OTP keys in version 6.0. Google Security Blog: Google Authenticator now supports Google Account synchronization This is...
After 11 years of life, Google Authenticator has added cloud backups for OTP keys in version 6.0.
Google Security Blog: Google Authenticator now supports Google Account synchronization
This is surprising news to me, because historically Authenticator had no way to backup keys by design. Here's a 2017 quote from a Google engineer who maintains Authenticator:
There is by design NO account backups in any of the apps. [source]
This design choice always made sense to me, as the point of 2FA is that you've got (1) something you know, and (2) something you have. The second factor should be tied to a physical device. If you lose the physical device, the second factor should be gone, and you'll need to use one of those 10-ish backup codes that we all definitely keep somewhere safe. I'm quite befuddled that Google is reversing this design choice and walking back their previously strong, security-centric design for the sake of user convenience in the case of a lost phone. I used to advise my friends and family to choose Google Authenticator over Authy for this specific reason.
If you want further reading, here's a PCWorld article with an altogether different tone than Google's announcement: Google Authenticator’s long-awaited cloud 2FA feature carries hidden risk
11 votes -
Should I be using a passkey?
I saw all the hype about Google's new passkey rollout on Hacker News and Ars Technica in the past month, and have even read an article stating that, paraphrased, "I should start using passkeys...
I saw all the hype about Google's new passkey rollout on Hacker News and Ars Technica in the past month, and have even read an article stating that, paraphrased, "I should start using passkeys immediately, even if the tech is not all the way there yet."
Some questions:
- Are you using passkeys currently? Which provider?
- Is there a fear of vendor lock-in (looking at you, Apple) or ditching the product in the future (looking at you, Google)?
- Any other concerns I should be aware of, e.g. what happens if my phone gets run over by a bulldozer?
25 votes -
Amazon Ring cameras were used to spy on customers
32 votes -
KeePass 2.54 is out
8 votes -
1Password releases Passkeys in public beta channels
12 votes -
Stop silly security awards
6 votes -
$100 million gone in twenty-seven minutes
6 votes -
Generate a secure password using lyrics from Kenny Loggins. It's funny and useful!
4 votes -
Google released a .zip web domain and people can't decide if it's the phishing apocalypse or just as bad as any other dodgy link
13 votes -
"SHA-1 is a Shambles" - A demonstration of a chosen-prefix collision for SHA-1 (2020)
5 votes -
SolarWinds: The untold story of the boldest supply-chain hack ever
7 votes -
Google's adoption of passkeys (security blog article)
11 votes -
NSO group’s Pegasus spyware returns in 2022 with a trio of iOS 15 and iOS 16 zero-click exploit chains
4 votes