PornHub extorted after hackers steal Premium member activity data ~tech security.cyber internet Article 639 words 24 votes
Over 120,000 home cameras hacked for 'sexploitation' footage ~tech privacy security.cyber Article 392 words 54 votes
Poets are now cybersecurity threats: Researchers used 'adversarial poetry' to trick AI into ignoring its safety guard rails and it frequently worked ~tech security.cyber Article 28 votes
Disrupting the first reported AI-orchestrated cyber espionage campaign ~tech security.cyber Article 1336 words 16 votes
Mozilla Firefox gets new anti-fingerprinting defenses ~tech browsers security.cyber privacy Article 502 words 59 votes
The spy who came in from the WiFi: Beware of radio network surveillance! ~comp security.cyber privacy Article 740 words 27 votes
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking ~tech android security.cyber google Article 275 words 62 votes
The day my smart vacuum turned against me ~tech security.cyber privacy Article 1427 words, published Oct 7 2025 33 votes
Norwegian public transport operator Ruter has shared the results of a comprehensive cybersecurity test of electric buses, conducted in an isolated mountain environment ~transport Article 267 words, published Oct 30 2025 10 votes
Greg Kroah-Hartman explains the Cyber Resilience Act for open source developers ~comp security.cyber open source Article 1320 words 7 votes
Data removal services? ~tech security.cyber privacy Ask (recommendations) Is anyone familiar with data removal services like Incogni, DeleteMe, PrivacyBee, etc? Do they work? Are they safe? 26 votes
Anthropic disrupts cybercriminal using AI for large-scale theft and extortion ~tech security.cyber Article 1068 words 17 votes
Understanding what a VPN can do for you and how to pick the right one ~tech privacy security.cyber Video 18:54, published Aug 8 2025 16 votes
WinRAR zero-day under active exploitation – update to latest version immediately ~tech security.cyber Article 1148 words 40 votes