-
4 votes
-
Reddit was hacked
16 votes -
SolarWinds and market incentives
8 votes -
Upgraded to Windows 10, what do I need to do to optimize?
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some...
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some unneeded services. What else can I do to keep her computer fast? Particularly interesting in more services I can disable and the best browser/ad blocker combo. Thanks y’all!
10 votes -
What we learned from building GovSlack
6 votes -
Anker finally comes clean about its Eufy security cameras
23 votes -
US airline accidentally exposes ‘No Fly List’ on unsecured server
17 votes -
Mystery divers rescued near Polish energy sites in the middle of the night offer dubious explanation, and vanish
12 votes -
Three lessons from Threema: Analysis of a secure messenger
7 votes -
The privatization of policing
3 votes -
Comcast Xfinity accounts hacked in widespread 2FA bypass attacks
9 votes -
Anker’s Eufy lied to us about the security of its security cameras. Despite claims of only using local storage, Eufy has been uploading identifiable footage to the cloud.
18 votes -
Getting started with nmap
3 votes -
SSH server hardening
5 votes -
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices. CryWiper masquerades as ransomware, but its real purpose is to permanently destroy data.
12 votes -
LastPass recent security incident
7 votes -
Finland to start building 200km long border fence with Russia next year – estimated to cost a total of 380 million euros and be completed by 2026
7 votes -
Sweden's espionage scandal raises hard questions on spy recruitment – intelligence agencies debate whether foreign-born citizens are more targeted
4 votes -
One-Time Programs
10 votes -
Twitter’s SMS two-factor authentication is melting down
21 votes -
Two brothers have been charged in Sweden with spying for Russia over a period of ten years
7 votes -
Security services in Norway say they have arrested a university lecturer accused of working for Russia as a spy
5 votes -
Russia's war in Ukraine has forever changed Europe's energy landscape – Norway finds itself at the forefront of an energy crisis
4 votes -
Vladimir Putin grants citizenship to Edward Snowden
16 votes -
Revealed: US Military bought mass monitoring tool that includes internet browsing, email data
11 votes -
Denmark's former foreign intelligence chief has been formally charged with leaking highly classified information
8 votes -
During his testimony before the Senate Judiciary Committee, Peiter "Mudge" Zatko claims Twitter only has live production environment that all engineers can access
@Benjamin Powers: Mudge walking through Twitter's construction - they only have live production environment, no test environment.
17 votes -
Prompt injection attacks against GPT-3
14 votes -
Bitwarden raises $100 million from PSG Equity
12 votes -
Cloudflare blocks Kiwi Farms
36 votes -
The secret life of SIM cards (DEFCON 21)
7 votes -
iOS 12.5.6 rolling out to older iPhone and iPad devices with important security fixes
6 votes -
Ransomware actor abuses Genshin Impact anti-cheat driver to kill antivirus
9 votes -
Erik Prince wants to sell you a “secure” smartphone that’s too good to be true
12 votes -
Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies
13 votes -
Plex breach exposes usernames, emails, and encrypted passwords
12 votes -
Former US President Donald Trump says FBI conducting search of Mar-a-Lago estate
32 votes -
Finland's parliament hit with cyberattack following US move to admit the country to NATO
7 votes -
Hardening SSH
4 votes -
Amazon shared Ring security camera and video doorbell footage with police without a warrant
31 votes -
Harden your Linux server using SSH keys (and turn off password auth)
8 votes -
I've locked myself out of my digital life
16 votes -
Security and privacy tips for people seeking an abortion
14 votes -
Hertzbleed - a new family of frequency side channel attacks on x86 processors
13 votes -
Researchers devise iPhone malware that runs even when device is turned off
6 votes -
Improved Process Isolation in Firefox 100
11 votes -
GitHub will require two-factor authentication (2FA) for all users who contribute code by the end of 2023
14 votes -
If you could rebuild user authentication on the web from the ground up, what would you do?
lou's post here resonated with me and my attempts to get my family to use better security practices (i.e. 2FA, password managers). They're very difficult to wrap your brain around to the average...
lou's post here resonated with me and my attempts to get my family to use better security practices (i.e. 2FA, password managers). They're very difficult to wrap your brain around to the average user, and they have the ability to create catastrophic failstates if used incorrectly. Furthermore, even when they work well, they can still be kind of clunky (different sites use different methods; writing down/printing recovery codes feels like a dated solution alongside other tech-forward things).
Also, outside of this, password requirements are their own bugbear, with nearly every site having different criteria. Even as someone who uses a password generator and manager on the regular, I still have to adjust the password creation criteria to do things like fit character limits or specific requirements (and don't get me started on forced resets!). I totally get why so many people reuse passwords, or have a default one that they sort of modify as needed to fit a given site's needs.
From my (admittedly super limited) perspective of a lay user: usernames, passwords, 2FA and the whole stack seems like something that's suffering under the technical debt of decades' worth of web development and networking. It seems like things have inched forward and many new layers have been added to address emergent problems, but the whole system gives a sort of barely-held-together-by-tape feel.
What if we could use what we know now and redesign things from the ground up? If we could start fresh, today, what might username authentication look like beyond the usual username/password combos that we're so used to?
I'm interested in any ideas -- not necessarily just feasible ones.
Also, despite me being the one prompting this thread, don't feel the need to simplify technical explanations or anything. I'm mostly interested in lurking and seeing what all you very smart techy people have to say about the topic. :)
12 votes -
A series of patent lawsuits is challenging the history of malware detection
7 votes -
Macho cyberwarfare and the long game
2 votes