-
43 votes
-
The trade secret - Firms that promised high-tech ransomware solutions almost always just pay the hackers
9 votes -
Why WhatsApp will never be secure
16 votes -
The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers
9 votes -
WhatsApp voice calls contained a buffer-overflow vulnerability that was used to install spyware [CVE-2019-3568]
11 votes -
Matrix.org - Post-mortem and remediations for Apr 11 security incident
9 votes -
Electricity grid cybersecurity will be expensive – who will pay, and how much?
3 votes -
Binance security breach update - 7000 Bitcoin stolen (~$40M), will be covered by emergency insurance fund
7 votes -
HTTP headers for the responsible developer
7 votes -
Buckeye (cyber espionage group linked to China) was using NSA hacking tools at least a year before the Shadow Brokers leak
5 votes -
XSS attacks on Googlebot allow search index manipulation
7 votes -
Car hackers say that if you want to keep your autonomous vehicles secure, you have to create realistic threat models
4 votes -
Vodafone denies Huawei Italy security risk
8 votes -
"Looping" has created an underground market for old Medtronic insulin pumps with a security flaw
10 votes -
Invisible malware is here and your security software can't catch it
6 votes -
OpenBSD 6.5 Is Released!
11 votes -
Marcus “MalwareTech” Hutchins pleads guilty to writing, selling banking malware
6 votes -
Facebook has updated their blog post about storing unencrypted passwords - they found more log files, and there are now millions of Instagram users impacted, not thousands as stated originally
28 votes -
When tech makes food insecurity worse
5 votes -
Compromised credentials for a Microsoft support agent enabled outside access to non-enterprise Hotmail, Outlook, and MSN emails for months
9 votes -
Can food choices reduce greenhouse gas emissions?
5 votes -
Matrix.org data breach
26 votes -
Climate chaos is coming and the Pinkertons are ready
13 votes -
VPN - A Very Precarious Narrative
9 votes -
How to get developers to do things your way
5 votes -
Epic Games Store Is Shit - But It's Not Spyware
18 votes -
[SOLVED] I might switch my PC media player from VLC to something else due to potential data leaks. What other media player should I choose if I do so?
edit: Problem solved, davidb informed me about the vulnerability in version 3.0.4, and that it is fixed in the new version 3.0.6. Somehow Spyhunter thinks i still use 3.0.4, which in turn is the...
edit: Problem solved, davidb informed me about the vulnerability in version 3.0.4, and that it is fixed in the new version 3.0.6. Somehow Spyhunter thinks i still use 3.0.4, which in turn is the actual problem i had with Spyhunter, not VLC.
Spyhunter 5 has been bothering me about potential data leaks from vlc media player. The vulnerability is generally based on publicly available information.
It would be a shame if i have to switch, been using vlc for as long as i remember. It is probably the best media player out there, but i hate sharing my personal data in any way or form.Spyhunter msg:
- Severity: Medium, VLC media player (Version 3.0.4)
- The CAF demuxer in modules/demux/cad.c in VideoLan media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in Caf files, because a ReadKukiChunk() cast converts a return value to an unsigned int, even if that value is negative. This could result in a denial of service and/or potential infoleak.
Is this even anything to care about? I have updated VLC including removing cashe and still get the alert. Is a rollback another option perhaps?
5 votes - Severity: Medium, VLC media player (Version 3.0.4)
-
Laptops to stay in bags as TSA brings new technology to airports
11 votes -
Security alert: pipdig [popular WordPress theme provider] insecure, DDoSing competitors
6 votes -
AndroidHardening project (CopperheadOS successor) renamed to GrapheneOS
5 votes -
Microsoft Defender ATP investigation unearths privilege escalation flaw in Huawei PCManager
5 votes -
Facebook stored hundreds of millions of user passwords in plain text for years
27 votes -
What would be a good security setup for me?
So: I keep all my passwords in my password manager (Bitwarden) All my 2FA codes are generated by AndOTP on my phone. My 2FA backup codes are also in Bitwarden, which I think is a bad idea, because...
So:
- I keep all my passwords in my password manager (Bitwarden)
- All my 2FA codes are generated by AndOTP on my phone.
- My 2FA backup codes are also in Bitwarden, which I think is a bad idea, because that defeats the purpose of 2FA. So where should I put those?
- I have my Bitwarden 2FA backup code in my wallet and in a safe at my house. Is that a good idea for the other backup codes?
- Is there anything I'm forgetting here?
8 votes -
How secure and private is Firefox?
I was browsing r/privacy today and I came across this guy going on about how Mozilla was just pretending to be privacy focused. Here's his comment. Now I don't really know what to think of this,...
I was browsing r/privacy today and I came across this guy going on about how Mozilla was just pretending to be privacy focused. Here's his comment. Now I don't really know what to think of this, and frankly, I'm getting really exhausted of hearing about how all the things I'm using aren't actually trustworthy. So can so someone put my mind to rest? Does this guy's claims have any truth to them? Thanks.
20 votes -
Hated and hunted - The perilous life of the computer virus cracker making powerful enemies online
9 votes -
Five cybersecurity mistakes companies keep making
4 votes -
The Morris worm at thirty
4 votes -
Lab-grown meat and ancient grains – what will be on the menu in 2050?
3 votes -
Triton is the world’s most murderous malware, and it’s spreading
16 votes -
The prototype iPhones that hackers use to research Apple’s most sensitive code
7 votes -
Why 'ji32k7au4a83' is a remarkably common password
57 votes -
Chrome update on March 1 fixed a serious zero-day RCE vulnerability that was being actively exploited
10 votes -
Why OpenBSD Rocks
16 votes -
All Intel chips open to new Spoiler non-Spectre attack: Don't expect a quick fix
23 votes -
EFF announces "Fix It Already" campaign to demand fixes for specific issues from nine major tech companies and platforms
42 votes -
Android is helping kill passwords on billions of devices
11 votes -
The microphones that may be hidden in your home
23 votes -
FastMail loses customers, faces calls to move over anti-encryption laws
15 votes -
Privacy attacks to the 4G and 5G cellular paging protocols using side channel information
10 votes -
Does anyone here work in infosec? If so, which laptops are you allowed to use?
I’ve recently gotten to speak with a few folks who work at an enterprise security company. I asked what their security researchers set as company rules for allowed laptops. My one datapoint so far...
I’ve recently gotten to speak with a few folks who work at an enterprise security company. I asked what their security researchers set as company rules for allowed laptops. My one datapoint so far is “Dell or Apple.” So for example, no Thinkpad X1 Carbon, which is arguably the best work laptop.
I am curious what other large security companies (or any of you security minded folks) set as rules for trusted laptops. Can anyone share their lists and theories as to why I heard Dell and Apple? BIOS is more trustworthy?
10 votes