-
15 votes
-
Ross Anderson, computer security expert, passed away
12 votes -
What happened when you visited a medieval inn?
11 votes -
Hackers found a way to open any of three million hotel keycard locks in seconds
42 votes -
Hackers can read private AI-assistant chats even though they’re encrypted
20 votes -
‘We’re hemorrhaging money’: US health clinics try to stay open after unprecedented cyberattack
31 votes -
You can not simply publicly access private secure links, can you?
11 votes -
White House urges use of type safe and memory safe programming languages and hardware
38 votes -
White House to Developers: Using C or C++ Invites Cybersecurity Risks
5 votes -
Leak of documents on spyware developed by vendor for Chinese government
33 votes -
US House Intel Chairman announces ‘serious national security threat,’ sources say it is related to Russia's nuclear capabilities in space
30 votes -
Twitter/X provides premium perks to Hezbollah, other US-sanctioned groups
18 votes -
What Is A Secure Note-Taking App?
I've been using Google's Keep Notes for all my note-taking, but I would like to shift away from that and use an app that is more secure. I've heard of Notion and Evernote but I'm not sure about...
I've been using Google's Keep Notes for all my note-taking, but I would like to shift away from that and use an app that is more secure. I've heard of Notion and Evernote but I'm not sure about their level of security/encryption. Any suggestions?
20 votes -
A 2024 plea for lean software
36 votes -
The extraordinary world of fake cities, and simulated urban environments
3 votes -
MIT PhD student hacks Apple Vision Pro days after release, reveals potential jailbreaks and malware threats
19 votes -
What are people's thoughts on "secureblue", "bazzite" and other ublue images?
7 votes -
Your security program is shit
63 votes -
ChatGPT is leaking passwords from private conversations of its users, Ars reader says
17 votes -
In major gaffe, hacked Microsoft test account was assigned admin privileges
28 votes -
Twenty-six billion records exposed in massive leak, including data from Linkedin, X, Dropbox
44 votes -
How nuclear weapons and nuclear materials are transported
7 votes -
Hackers can infect network-connected wrenches to install ransomware, researchers say
28 votes -
Inside the world's highest tech prison - HMP Fosse Way
12 votes -
4-year campaign backdoored iPhones using possibly the most advanced exploit ever
43 votes -
EU Cyber Resilience Act: What does it mean for open source?
13 votes -
All cops are broadcasting. TETRA unlocked after decades in the shadows.
26 votes -
India targets Apple over its phone hacking notifications
19 votes -
Ten years later, new clues in the Target breach
24 votes -
Danish parliament has voted to ban the burning of religious scriptures after a series of Qur’an desecrations in the country and neighbouring Sweden
26 votes -
Ex-Twitter exec claims X fired him for raising security concerns
21 votes -
US senator warns governments are spying on Apple and Google users via push notifications
38 votes -
Harvard gutted initial team examining Facebook files following $500 million donation from Chan Zuckerberg Initiative, Whistleblower Aid client reveals
42 votes -
Now Open: 2023 SANS Holiday Hack Challenge & KringleCon
1 vote -
How the US Secret Service keeps presidential motorcades safe
5 votes -
Weather extremes threaten food security (2012)
9 votes -
Self-proclaimed 'gay furry hackers' breach nuclear lab; demands research into IRL catgirls
71 votes -
Nothing’s iMessage app was a security catastrophe, taken down in twenty-four hours
65 votes -
Microsoft’s Windows Hello fingerprint authentication has been bypassed
41 votes -
Cybersecurity firm CEO pleads guilty to hacking hospitals to boost his company's business
36 votes -
Payments app Zelle begins refunds for imposter scams after Washington pressure
13 votes -
Mike Johnson's 'porn monitoring' remarks spark US national security concerns
47 votes -
AI cameras took over one small American town. Now they're everywhere
30 votes -
After hack, personally identifiable information records of a large percentage of citizens of India for sale on the dark web. The hack includes biometric data.
22 votes -
US sues SolarWinds for fraud over alleged cyber security neglect ahead of 2020 Russian hack of Justice and Homeland Security departments
25 votes -
For those who have tried YubiKey for personal use, is it worth it?
I saw people talking about YubiKey here a few weeks ago so I got curious. Unfortunately, I’m not seeing a lot of helpful reviews for it. I’m personally getting tired of having to take my phone...
I saw people talking about YubiKey here a few weeks ago so I got curious. Unfortunately, I’m not seeing a lot of helpful reviews for it.
I’m personally getting tired of having to take my phone anytime I need 2FA for Okta but I don’t have a lot of super important accounts to secure so I’m going back and forth in deciding whether the 100+ euro investment (to get two so that there’s a duplicate) would be worth it.
How do you use your YubiKey in your personal life and do you think it’s worth your use case ?
35 votes -
Immersive Labs "Haunted Halloween" Challenges 2023
Hey everyone! Just wanted to share that Immersive Labs has rolled out their "Haunted Halloween" challenges for 2023. For those unfamiliar, Immersive Labs offers a platform for interactive,...
Hey everyone! Just wanted to share that Immersive Labs has rolled out their "Haunted Halloween" challenges for 2023. For those unfamiliar, Immersive Labs offers a platform for interactive, gamified learning in the realm of cybersecurity. They've been known to host challenges that test and enhance cyber skills.
You can sign up for free using code HAUNTEDHOLLOW to try it out hubs.ly/Q026LTZV0.
Now, I'm not posting this solely out of altruism. I could use some help on the 'Mirrored Mayhem' task.
Spoiler Alert: Details about the challenge below
I've managed to get the RCE. I've crafted a PNG and successfully executed remote code. However, I'm only able to find the 'webapp-token'. I'm at a loss when it comes to the 'user-token' or 'root-token'. The 'whats in the mirror?' file isn't giving me any leads either. I've also got a username/password from it but can't figure out where to use them.Would appreciate any pointers or hints from anyone who's tackled this challenge. Thanks in advance!
4 votes -
Denmark leads the Women Peace and Security Index 2023/24, scoring more than three times higher than Afghanistan at the bottom of the scale
14 votes -
Systems Alchemy: The Transmutation of Hacking (2023)
5 votes -
It’s official: The era of China’s global dominance is over
22 votes