-
8 votes
-
Downfall security vulnerability in Intel processors
40 votes -
The trouble with decommissioning a used FIDO security key
16 votes -
Zenbleed - Zen 2 hardware vulnerability
19 votes -
New acoustic attack steals data from keystrokes with 95% accuracy
48 votes -
Adventures with pf, nix darwin, and Tailscale on macOS Ventura
11 votes -
How do I get started in self hosting?
I'm curious on how to get started in self hosting. I have computer experience, being an Android Developer, but I hardly have experience in Linux and backend/networking work. I've been wanting to...
I'm curious on how to get started in self hosting. I have computer experience, being an Android Developer, but I hardly have experience in Linux and backend/networking work.
I've been wanting to start up a Plex/Jellyfin server for a while, and I have an old system sitting around with a Ryzen 1700 with a graphics card in there as well that's been begging for attention, and maybe I can throw on a Minecraft server in there as well. Since I travel a bunch, it would be nice too to be able to access my media for when I'm traveling, or to let my parents or friends access some shows if they so desire!
What I'm worried about is exposing my network to the internet basically. I used to run a Minecraft server with port forwarding and such on a personal computer but now I'm realizing that that's probably a bit unsafe lol.
Basically, are there any guides that I can look at, or any of your own experiences that could potentially help me or anyone who's interested?
28 votes -
RowPress: Amplifying Read Disturbance in Modern DRAM Chips
6 votes -
LastPass users locked out due to MFA resets
64 votes -
The story behind last week's Let's Encrypt downtime
16 votes -
Google released a .zip web domain and people can't decide if it's the phishing apocalypse or just as bad as any other dodgy link
13 votes -
"SHA-1 is a Shambles" - A demonstration of a chosen-prefix collision for SHA-1 (2020)
5 votes -
Samsung meeting notes and new source code are now in the wild after being leaked in ChatGPT
5 votes -
Talkback: An aggregator of security news, articles and posts
5 votes -
Monitor and respond to security alerts from within Minecraft
7 votes -
Upgraded to Windows 10, what do I need to do to optimize?
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some...
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some unneeded services. What else can I do to keep her computer fast? Particularly interesting in more services I can disable and the best browser/ad blocker combo. Thanks y’all!
10 votes -
Getting started with nmap
3 votes -
SSH server hardening
5 votes -
One-Time Programs
10 votes -
The secret life of SIM cards (DEFCON 21)
7 votes -
Ransomware actor abuses Genshin Impact anti-cheat driver to kill antivirus
9 votes -
Hardening SSH
4 votes -
Harden your Linux server using SSH keys (and turn off password auth)
8 votes -
Hertzbleed - a new family of frequency side channel attacks on x86 processors
13 votes -
Improved Process Isolation in Firefox 100
11 votes -
GitHub will require two-factor authentication (2FA) for all users who contribute code by the end of 2023
14 votes -
The right thing for the wrong reasons: FLOSS doesn't imply security
7 votes -
A bug lurking for 12 years gives attackers root on every major Linux distro
13 votes -
We desperately need a way to rapidly notify people of high-impact vulnerabilities, so I built one: BugAlert.org
9 votes -
Log4Shell Update: Second log4j Vulnerability Published (CVE-2021-44228 + CVE-2021-45046)
20 votes -
To secure the supply chain, you must properly fund it
8 votes -
Microsoft unveils 'Super Duper Secure Mode' in latest version of Edge
6 votes -
ChaosDB explained: Walkthrough of Azure's Cosmos DB vulnerability
6 votes -
"We do not maintain databases"
11 votes -
Linux (In)security
10 votes -
Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program
9 votes -
How AWS request signatures version 4 and 4a work
3 votes -
McDonald's leaks password for Monopoly VIP database to winners
16 votes -
Zoom zero-click RCE from Pwn2Own 2021 - Technical write-up describing the process of discovering and exploiting the vulnerability
6 votes -
Introduction to Cross-Site Scripting (XSS)
4 votes -
Linux Privilege Escalation - Three Easy Ways to Get a Root Shell
9 votes -
From stolen laptop to inside the company network
12 votes -
Remote code execution vulnerability in the cdnjs Javascript CDN run by Cloudflare, which could have enabled tampering with over 10% of all websites
18 votes -
Kaspersky Password Manager had multiple problems in its password-generator, resulting in its passwords being predictable and easily brute-forced
21 votes -
Using John the Ripper To Crack Password Hashes
3 votes -
On password managers
11 votes -
Pwned Passwords is now open-sourced via the .NET Foundation, and will be provided compromised passwords by the FBI
13 votes -
Cloudflare introduces Cryptographic Attestation of Personhood, an experiment intended to replace CAPTCHAs
19 votes -
Battlestar Galactica Lessons from Ransomware to the Pandemic
4 votes -
Linux bans the University of Minnesota for sending intentionally buggy patches in the name of research
58 votes