-
25 votes
-
The case for limiting your browser extensions
9 votes -
Have I Been Pwned is no longer being sold, and Troy Hunt will continue running it independently
29 votes -
Sophos has received an offer to be acquired for $3.9 billion by private-equity firm Thoma Bravo
8 votes -
U2F help proposal
So, I cannot really financially contribute, but I'm a backend developer and I'd like to be able to authenticate using U2F 2FA. I'd like to know if you would be open to let me try to make a patch...
So, I cannot really financially contribute, but I'm a backend developer and I'd like to be able to authenticate using U2F 2FA.
I'd like to know if you would be open to let me try to make a patch that would add this feature to 2FA mechanisms.
12 votes -
Let's Encrypt has issued one billion certificates
12 votes -
Jam lets you safely share streaming app passwords
9 votes -
EU Commission to staff: Switch to Signal messaging app
14 votes -
Defeating a Laptop's BIOS Password
13 votes -
Policy vs technology
15 votes -
Security researcher hacks SlickWraps, publishes a disclosure
8 votes -
I got a Ring doorbell camera. It scared the hell out of me.
11 votes -
Amazon Ring updates device security and privacy, including adding mandatory two-factor auth—but continues ignoring larger concerns
9 votes -
AZORult spreads as a fake ProtonVPN installer
9 votes -
Analysis of Voatz mobile voting app by MIT researchers finds elementary security flaws
11 votes -
Security researchers partner with Chrome to take down over 500 browser extensions in a fraud network affecting 1.7 million users
12 votes -
Dangerous Domain Corp.com Goes Up for Sale
21 votes -
Firefox will start deprecating TLS 1.0 and 1.1 with Firefox 74, releasing on March 10, 2020
16 votes -
Reverse engineering Blind's API and client side encryption
4 votes -
How Twitter's default settings enabled a security researcher to discover phone numbers for over seventeen million accounts
10 votes -
What to know before you buy or install an Amazon Ring camera
8 votes -
LPE and RCE in OpenSMTPD (CVE-2020-7247)
6 votes -
Ring's doorbell app for Android sends sensitive user data to multiple analytics and marketing companies
10 votes -
Heathrow Airport installs anti-drone system to detect threats
8 votes -
Exploiting the Windows CryptoAPI vulnerability
6 votes -
Critical Windows 10 exploit discovered which allows arbitrary software to be installed under the guise of Windows updates
20 votes -
Election security at the chip level – or, why your electronic voting options might not get better any time soon
5 votes -
Meet the mad scientist who wrote the book on how to hunt hackers
8 votes -
CVE-2020-0601 - Windows CryptoAPI spoofing vulnerability
16 votes -
Billions of medical images available online
10 votes -
Hackers are breaking directly into telecom companies to take over customer phone numbers
10 votes -
Tricky phish angles for persistence, not passwords
3 votes -
Multiple vulnerabilities discovered in TikTok enabling sending arbitrary links through SMS, exposing private account data, and more
11 votes -
reCAPTCHA: Is there method in monotony?
What started out as a little facetious in my own head leads me now to a serious question. Is there some meaningful reason why Google has to use a subsection of images for reCAPTCHA? I really...
What started out as a little facetious in my own head leads me now to a serious question. Is there some meaningful reason why Google has to use a subsection of images for reCAPTCHA? I really dislike having to do this and at the very least would appreciate some variation.
- Traffic Lights
- Buses
- Bicycles
- Cars
- Crosswalks
Is there something special about these things in this context? Is the visual noise they're usually associated with what makes them good candidates? Are Google just really into urban planning? Who knows...I'm hoping some Tilder smarter than I can help me out.
10 votes -
Promiscuous cookies and their impending death via the SameSite policy
10 votes -
On privacy versus freedom
9 votes -
What we know about you when you click on this article—Vox has a pretty typical privacy policy. That doesn’t make it great.
11 votes -
If you made a claim for $125 from Equifax, you’re not getting it after court awards nearly $80 million to attorneys
19 votes -
Why electronic voting is still a bad idea
17 votes -
Generated passwords, UX and security absolutism
17 votes -
Military grade encryption won’t save you, or your business
4 votes -
[CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections
7 votes -
Firefox Private Network
30 votes -
Email authentication: SPF, DKIM and DMARC out in the wild
8 votes -
Beware of shell globs
9 votes -
Finland launches data security guarantee label – certification symbol serves as a guarantee to consumers that a device's basic information security features are in order
12 votes -
Kaspersky vulnerabilities: uninstalling any Chrome extension, tracking users in incognito or different browsers, and controlling functionality with links
9 votes -
Multiple Fortinet products communicate with FortiGuard services while only "encrypting" sensitive user data using XOR with a hardcoded key
9 votes -
It’s time to plan for a future beyond passwords
11 votes -
Nine secrets I never knew about airports until I worked at LAX
11 votes