I'm the Google whistleblower. The medical data of millions of Americans is at risk ~tech google security Article 827 words 33 votes
Announcing GitHub Security Lab: securing the world’s code, together ~comp security open source Article 922 words 5 votes
Bytecode Alliance: Building a secure by default, composable future for WebAssembly ~comp security web development Article 5026 words 9 votes
The benefits of test-case reduction, and tools that can help do it automatically ~comp security Article 4756 words 3 votes
Give Firefox a chance for a faster, calmer and distraction-free internet ~tech privacy security browsers Article 1357 words 27 votes
Hackers can use lasers to ‘speak’ to your Amazon Echo or Google Home ~tech security amazon.echo google.home Article 1378 words 10 votes
Chrome 0-day exploit CVE-2019-13720 used a race condition and a Use-After-Free to install persistent malware on Windows ~comp security Article 1264 words 10 votes
How to stay safe online and prevent phishing with FIDO2, WebAuthn and security keys ~tech security internet Article 13 613 words, published Oct 21 2019 5 votes
NSO exploited WhatsApp to hack at least 1400 phones and spy on top government officials at US allies ~tech facebook privacy security Article 1077 words 16 votes
Cloudflare's implementation of the Network Time Security protocol, written in Rust ~comp security Article 2545 words 8 votes
The cybersecurity firm Tiversa dominated an emerging online market—before it was accused of fraud, extortion, and manipulating the federal government ~tech security.cyber Article 14 048 words 6 votes
Australia wants to use face recognition for porn age verification ~tech privacy security Article 416 words 22 votes
Certbot usability case study: Making it easier to get HTTPS certificates ~comp security Article 6227 words 12 votes
Olympic destroyer - The untold story of the 2018 Olympics cyberattack ~tech security.cyber Article 7600 words 6 votes
Building China's Comac C919 airplane involved a lot of hacking, report says ~transport Article 1217 words 5 votes
What can the UK learn from Norway's EU border? Its border, with EU member state Sweden, is over a thousand miles long ~misc politics Article 4 votes
Sudo flaw lets Linux users run commands as root even when they're restricted ~tech linux security Link 18 votes
How the women of Standing Rock are building sovereign economies ~enviro climate change sustainability Article 1610 words 7 votes
An analysis of the implications of using Google's G Suite products in a newsroom ~tech google privacy security Article 2375 words 10 votes
Denmark to conduct checks at border with Sweden to counter cross-border crime ~news denmark crime sweden Link 4 votes
Critical security issue identified in iTerm2 as part of Mozilla open source audit ~comp security Article 453 words 12 votes
NSA whistleblower dropped from Australian cyber conference at the last minute ~tech security.cyber Article 500 words 6 votes
Elevator hacking: From the pit to the penthouse ~tech security Video 1:55:54, published Aug 5 2014 16 votes
How a double-free bug in WhatsApp for Android could be turned into a remote code execution vulnerability ~comp security Article 1104 words 6 votes
New SIM attacks de-mystified, protection tools now available ~tech security Article 1355 words 6 votes
DoorDash data breach - Affects approximately 4.9 million consumers, Dashers, and merchants who joined before April 6, 2018 ~tech privacy security Link 12 votes
Ring says it doesn't use facial recognition, but it has “a head of face recognition research” ~tech amazon privacy security.home Article 1200 words 16 votes
New DDoS vector observed in the wild leveraging WS-Discovery for amplification, attacks hitting 35 Gbps ~comp security Article 2577 words 11 votes
If you’re not using SSH certificates you’re doing SSH wrong ~comp security Article 3346 words 9 votes
The stakes are too high for Apple to spin the iPhone exploits ~tech apple ios security google Article 1095 words 6 votes
"Satori" Internet-of-Things botnet operator Kenneth Currin Schuchman pleads guilty ~tech security Article 849 words 5 votes
The extortion economy: How insurance companies are fueling a rise in ransomware attacks ~tech security.cyber Article 3888 words 12 votes
Twitter CEO Jack Dorsey's account was compromised, sent public tweets and retweets including racial slurs ~tech security social media Article 76 words 17 votes
Mozilla takes action to protect users in Kazakhstan ~tech privacy security Article 349 words 26 votes
Transgender and gender nonconforming people say they have been pressured to expose their genitals during TSA searches at airports ~lgbt transgender Article 4293 words 14 votes
Security researchers find several bugs in Nest security cameras ~tech security.home Article 667 words, published Aug 21 2019 10 votes
The researcher who published the Steam Windows privilege-escalation exploit two weeks ago has published a second zero-day ~comp security Article 1891 words 13 votes
Yubico releases the first Lightning security key for iPhones ~tech security apple Article 464 words 8 votes
Wirecutter has selected TunnelBear and Mullvad as the best current VPN services, and written extensively about how they made this decision ~tech security Article 10 158 words 26 votes
Report: Data Breach in Biometric Security Platform Affecting Millions of Users ~comp security Article 1379 words 8 votes