-
12 votes
-
Signal developer explains why early encrypted messaging tools flopped
35 votes -
Delta CEO says CrowdStrike-Microsoft outage cost the US airline $500 million, will seek damages
44 votes -
FrostyGoop malware attack cut off heat in Ukraine during winter
17 votes -
CrowdStrike global outage to cost US Fortune 500 companies $5.4bn
35 votes -
Anyone can access deleted and private repository data on GitHub
46 votes -
A hacker ‘ghost’ network is quietly spreading malware on GitHub
21 votes -
Delta's CrowdStrike related flight delays and cancellations prompt Department of Transportation investigation
19 votes -
CrowdStrike code update bricking Windows machines around the world
143 votes -
Weak security defaults enabled Squarespace Domains hijacks of former Google Domains accounts
19 votes -
AT&T says criminals stole phone records of ‘nearly all’ US customers in new data breach
26 votes -
Patelco makes minor restorations but no end near for crippling credit union cyber attack
21 votes -
Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims
45 votes -
Simple ways to find exposed sensitive information
9 votes -
Single point of software failure could hamstring 15K US car dealerships for days
22 votes -
This GitHub profile has a custom background
31 votes -
Four in five CISOs have been told to downplay a potential risk’s severity
9 votes -
The leak of an internal Google database reveals thousands of potential privacy and security issues reported by employees
21 votes -
Significant cyber incidents | Strategic technologies program
1 vote -
Hundreds of thousands of US internet routers destroyed in newly discovered 2023 hack
23 votes -
All Santander staff and 'thirty million' customers in Spain, Chile and Uruguay hacked
22 votes -
Cybercriminals pose as "helpful" Stack Overflow users to push malware
19 votes -
Surveilling the masses with wi-fi-based positioning systems
15 votes -
British Library on why it kept it real in communication about ransomware attack
9 votes -
Cyber security: A pre-war reality check
34 votes -
Cyberattack forces major US health care network to divert ambulances from hospitals
17 votes -
‘TunnelVision’ attack leaves nearly all VPNs vulnerable to spying
40 votes -
London Drugs closes stores until further notice due to cyberattack
22 votes -
US medical providers still grappling with UnitedHealth cyberattack
9 votes -
Help me ditch Chrome's password manager!
I've been trying to reduce my reliance on all things Google, and one of the big ones is password management. I've tried several times to make the jump, but every time I start researching options...
I've been trying to reduce my reliance on all things Google, and one of the big ones is password management. I've tried several times to make the jump, but every time I start researching options I'm overwhelmed by the selection. There are a lot of popular options out there, and I really don't have the time/energy to endure a misstep. So without a clear idea of which manager will check all of my boxes, I end up bailing on the process and keep using chrome's built in option.
So to start, here's what I like about Chrome:
- Automatically offers to store passwords without extra clicks
- Autofills automatically where it can, and gives me an easy choice when it can't
- Works everywhere I need passwords. (basically everywhere I browse the internet since chrome works everywhere)
- Minimal overhead. This is hard to beat since Chrome just includes it, so I'm fine with a little extra setup if necessary.
I used to use keepass portable on a thumb drive (I want to say circa ~2009ish), but it became really inconvenient as my usage shifted more to mobile devices.
I see this as a first step to also reducing my reliance on Chrome so I can start to consider other browsers. Right now I feel locked in to Google's ecosystem, but I know I can break it up if I don't get too bogged down by choice. Much appreciate any help. :)
34 votes -
Bug in glibc's iconv() function allows for RCE in PHP servers by setting charset to ISO-2022-CN-EXT to trigger buffer overflow (CVE-2024-2961)
9 votes -
When provided with CVE descriptions of 15 different vulnerabilities and a set of tools useful for exploitation, GPT-4 was capable of autonomously exploiting 13 of which, yielding an 87% success rate
17 votes -
Twitter replaces twitter.com with x.com without user consent. Bad implementation invites an influx of Phishing attacks. (german source)
48 votes -
Critical vulnerability in Rust's Command library allows for command injection when using its API to invoke batch scripts with arguments on Windows systems (CVE-2024-24576)
18 votes -
Sweden's public sector has ditched Big Tech in the name of privacy as a major telecom provider unveiled a new secure collaboration hub
14 votes -
Backdoor in upstream libxz targeting sshd
104 votes -
Hackers can read private AI-assistant chats even though they’re encrypted
20 votes -
‘We’re hemorrhaging money’: US health clinics try to stay open after unprecedented cyberattack
31 votes -
White House urges use of type safe and memory safe programming languages and hardware
38 votes -
White House to Developers: Using C or C++ Invites Cybersecurity Risks
5 votes -
Leak of documents on spyware developed by vendor for Chinese government
33 votes -
Your security program is shit
63 votes -
ChatGPT is leaking passwords from private conversations of its users, Ars reader says
17 votes -
In major gaffe, hacked Microsoft test account was assigned admin privileges
28 votes -
Twenty-six billion records exposed in massive leak, including data from Linkedin, X, Dropbox
44 votes -
Hackers can infect network-connected wrenches to install ransomware, researchers say
28 votes -
EU Cyber Resilience Act: What does it mean for open source?
13 votes -
Ten years later, new clues in the Target breach
24 votes -
Now Open: 2023 SANS Holiday Hack Challenge & KringleCon
1 vote -
Self-proclaimed 'gay furry hackers' breach nuclear lab; demands research into IRL catgirls
71 votes