What can the UK learn from Norway's EU border? Its border, with EU member state Sweden, is over a thousand miles long ~misc politics Article 4 votes
Sudo flaw lets Linux users run commands as root even when they're restricted ~tech linux security Link 18 votes
How the women of Standing Rock are building sovereign economies ~enviro climate change sustainability Article 1610 words 7 votes
An analysis of the implications of using Google's G Suite products in a newsroom ~tech google privacy security Article 2375 words 10 votes
Denmark to conduct checks at border with Sweden to counter cross-border crime ~news denmark crime sweden Link 4 votes
Critical security issue identified in iTerm2 as part of Mozilla open source audit ~comp security Article 453 words 12 votes
NSA whistleblower dropped from Australian cyber conference at the last minute ~tech security.cyber Article 500 words 6 votes
Elevator hacking: From the pit to the penthouse ~tech security Video 1:55:54, published Aug 5 2014 16 votes
How a double-free bug in WhatsApp for Android could be turned into a remote code execution vulnerability ~comp security Article 1104 words 6 votes
New SIM attacks de-mystified, protection tools now available ~tech security Article 1355 words 6 votes
DoorDash data breach - Affects approximately 4.9 million consumers, Dashers, and merchants who joined before April 6, 2018 ~tech privacy security Link 12 votes
Ring says it doesn't use facial recognition, but it has “a head of face recognition research” ~tech amazon privacy security.home Article 1200 words 16 votes
New DDoS vector observed in the wild leveraging WS-Discovery for amplification, attacks hitting 35 Gbps ~comp security Article 2577 words 11 votes
If you’re not using SSH certificates you’re doing SSH wrong ~comp security Article 3346 words 9 votes
The stakes are too high for Apple to spin the iPhone exploits ~tech apple ios security google Article 1095 words 6 votes
"Satori" Internet-of-Things botnet operator Kenneth Currin Schuchman pleads guilty ~tech security Article 849 words 5 votes
The extortion economy: How insurance companies are fueling a rise in ransomware attacks ~tech security.cyber Article 3888 words 12 votes
Twitter CEO Jack Dorsey's account was compromised, sent public tweets and retweets including racial slurs ~tech security social media Article 76 words 17 votes
Mozilla takes action to protect users in Kazakhstan ~tech privacy security Article 349 words 26 votes
Transgender and gender nonconforming people say they have been pressured to expose their genitals during TSA searches at airports ~lgbt transgender Article 4293 words 14 votes
Security researchers find several bugs in Nest security cameras ~tech security.home Article 667 words, published Aug 21 2019 10 votes
The researcher who published the Steam Windows privilege-escalation exploit two weeks ago has published a second zero-day ~comp security Article 1891 words 13 votes
Yubico releases the first Lightning security key for iPhones ~tech security apple Article 464 words 8 votes
Wirecutter has selected TunnelBear and Mullvad as the best current VPN services, and written extensively about how they made this decision ~tech security Article 10 158 words 26 votes
Report: Data Breach in Biometric Security Platform Affecting Millions of Users ~comp security Article 1379 words 8 votes
Denmark mulls tighter border checks with Sweden after Copenhagen bombing – Swedish man arrested over the bombing of a government agency ~news denmark.copenhagen crime sweden Article 246 words, published Jul 8 2019 5 votes
Down the Rabbit Hole: Reverse-engineering the Windows Text Services Framework and discovering major vulnerabilities that have existed for almost 20 years ~comp security Article 3672 words 8 votes
Recognizing basic security flaws in local password managers ~comp security Article 2803 words 19 votes
Netflix has discovered multiple vulnerabilities in HTTP/2 implementations that can be used in denial of service attacks ~comp security Link 14 votes
Consumer Reports' testing finds that many wireless routers lack basic security protections ~tech security Link 12 votes
Coinbase describes their investigation and response to a sophisticated phishing attack on their employees utilizing two Firefox zero-day vulnerabilities ~comp security Article 1629 words 10 votes
WhatsApp protocol decryption for chat manipulation and more ~tech security Article 1369 words 7 votes
New ‘warshipping’ technique gives hackers access to enterprise offices ~tech security Article 593 words 8 votes
Local Privilege Escalation exploit found in Steam Windows client - Valve rejected the report, and HackerOne tried to forbid disclosure ~comp security Article 1475 words 12 votes
Sneaker and fashion marketplace StockX was hacked, with almost seven million records stolen ~tech privacy security Article 379 words 9 votes
An Introduction to Mobile Networks, SIM Cards, and GSM. ~comp hardware security Video 11:09, published Oct 5 2018 9 votes
Ottawa city hall has been targeted by cyber attacks more than 8,000 times in the past year ~tech security.cyber Article 608 words 8 votes
Everything cops say about Amazon's Ring is scripted or approved by Ring ~tech amazon privacy security.home Article 1566 words 18 votes
Security researchers at Google Project Zero discovered and responsibly disclosed the recently patched iMessage based Apple iOS vulnerability ~tech ios security Article 236 words 7 votes
A Russian oligarch bought Maryland's election machine vendor ~news politics russia usa.md Article 450 words, published Aug 20 2018 13 votes
Tech firms “can and must” put backdoors in encryption, AG Barr says ~tech security Article 679 words 15 votes