Promiscuous cookies and their impending death via the SameSite policy ~tech privacy security internet Article 2104 words 10 votes
What we know about you when you click on this article—Vox has a pretty typical privacy policy. That doesn’t make it great. ~tech privacy security Article 1834 words, published Dec 10 2019 11 votes
If you made a claim for $125 from Equifax, you’re not getting it after court awards nearly $80 million to attorneys ~finance Article 19 votes
[CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections ~comp security linux open source Article 2891 words 7 votes
Denmark has for the first time put mineral-rich Greenland top of its national security agenda, ahead of terrorism and cybercrime ~news denmark.greenland politics Article 873 words 10 votes
Finland launches data security guarantee label – certification symbol serves as a guarantee to consumers that a device's basic information security features are in order ~tech security Article 361 words 12 votes
Kaspersky vulnerabilities: uninstalling any Chrome extension, tracking users in incognito or different browsers, and controlling functionality with links ~comp security Article 2761 words 9 votes
Multiple Fortinet products communicate with FortiGuard services while only "encrypting" sensitive user data using XOR with a hardcoded key ~comp security privacy Article 912 words 9 votes
Finland is preparing to defend itself against a mysterious activist group threatening to carry out cyberattacks – unless it gets some Bitcoin ~tech security.cyber Article 243 words 7 votes
A new tracking technique using CNAME aliases to circumvent third-party cookie restrictions is blockable using a Firefox DNS API, but not in Chrome ~tech privacy security Article 1016 words 18 votes
Bad Binder: A use-after-free exploit in Binder in the Android kernel that was being exploited in the wild ~comp security Article 2653 words 5 votes
Explanation and proof-of-concept exploitation of a vulnerability in the "docker cp" command that enabled full container escape and root control of the host ~comp security Article 1487 words 6 votes
Android exploit of system camera apps enabled a malicious app to record and upload photos, video and audio with only "storage" permission ~tech android security privacy Article 1463 words 10 votes
Cybercrime Booms As Scammers Hack Human Nature To Steal Billions ~tech security Article 1272 words 8 votes
I'm the Google whistleblower. The medical data of millions of Americans is at risk ~tech google security Article 827 words 33 votes
Announcing GitHub Security Lab: securing the world’s code, together ~comp security open source Article 922 words 5 votes
Bytecode Alliance: Building a secure by default, composable future for WebAssembly ~comp security web development Article 5026 words 9 votes
The benefits of test-case reduction, and tools that can help do it automatically ~comp security Article 4756 words 3 votes
Give Firefox a chance for a faster, calmer and distraction-free internet ~tech privacy security browsers Article 1357 words 27 votes
Hackers can use lasers to ‘speak’ to your Amazon Echo or Google Home ~tech security amazon.echo google.home Article 1378 words 10 votes
Chrome 0-day exploit CVE-2019-13720 used a race condition and a Use-After-Free to install persistent malware on Windows ~comp security Article 1264 words 10 votes
How to stay safe online and prevent phishing with FIDO2, WebAuthn and security keys ~tech security internet Article 13 613 words, published Oct 21 2019 5 votes
NSO exploited WhatsApp to hack at least 1400 phones and spy on top government officials at US allies ~tech facebook privacy security Article 1077 words 16 votes
The cybersecurity firm Tiversa dominated an emerging online market—before it was accused of fraud, extortion, and manipulating the federal government ~tech security.cyber Article 14 048 words 6 votes
Australia wants to use face recognition for porn age verification ~tech privacy security Article 416 words 22 votes
Certbot usability case study: Making it easier to get HTTPS certificates ~comp security Article 6227 words 12 votes
Olympic destroyer - The untold story of the 2018 Olympics cyberattack ~tech security.cyber Article 7600 words 6 votes
Building China's Comac C919 airplane involved a lot of hacking, report says ~transport Article 1217 words 5 votes
What can the UK learn from Norway's EU border? Its border, with EU member state Sweden, is over a thousand miles long. ~society politics Article 4 votes
Sudo flaw lets Linux users run commands as root even when they're restricted ~tech linux security Link 18 votes
How the women of Standing Rock are building sovereign economies ~enviro climate change sustainability Article 1610 words 7 votes
An analysis of the implications of using Google's G Suite products in a newsroom ~tech google privacy security Article 2375 words 10 votes
Denmark to conduct checks at border with Sweden to counter cross-border crime ~news denmark crime sweden Link 4 votes
Critical security issue identified in iTerm2 as part of Mozilla open source audit ~comp security Article 453 words 12 votes