-
23 votes
-
Microsoft to host security summit after CrowdStrike disaster
16 votes -
“Something has gone seriously wrong,” dual-boot systems warn after Microsoft update
43 votes -
The gigantic and unregulated power plants in the cloud
12 votes -
Over fifteen million passwords were temporarily inaccessible in Chrome's password manager
42 votes -
Signal developer explains why early encrypted messaging tools flopped
35 votes -
Delta CEO says CrowdStrike-Microsoft outage cost the US airline $500 million, will seek damages
44 votes -
USENIX Security '18: Why do keynote speakers keep suggesting that improving security is possible? (AI, IoT)
7 votes -
Los Angeles police department warns residents after spike in burglaries using Wi-Fi jammers that disable security cameras, smart doorbells
42 votes -
FrostyGoop malware attack cut off heat in Ukraine during winter
17 votes -
CrowdStrike global outage to cost US Fortune 500 companies $5.4bn
35 votes -
A hacker ‘ghost’ network is quietly spreading malware on GitHub
21 votes -
CrowdStrike code update bricking Windows machines around the world
143 votes -
Weak security defaults enabled Squarespace Domains hijacks of former Google Domains accounts
19 votes -
AT&T says criminals stole phone records of ‘nearly all’ US customers in new data breach
26 votes -
Mitigating Skeleton Key, a new type of generative AI jailbreak technique
15 votes -
Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims
45 votes -
The leak of an internal Google database reveals thousands of potential privacy and security issues reported by employees
21 votes -
Hundreds of thousands of US internet routers destroyed in newly discovered 2023 hack
23 votes -
All Santander staff and 'thirty million' customers in Spain, Chile and Uruguay hacked
22 votes -
Surveilling the masses with wi-fi-based positioning systems
15 votes -
British Library on why it kept it real in communication about ransomware attack
9 votes -
Cyber security: A pre-war reality check
34 votes -
‘TunnelVision’ attack leaves nearly all VPNs vulnerable to spying
40 votes -
London Drugs closes stores until further notice due to cyberattack
22 votes -
Help me ditch Chrome's password manager!
I've been trying to reduce my reliance on all things Google, and one of the big ones is password management. I've tried several times to make the jump, but every time I start researching options...
I've been trying to reduce my reliance on all things Google, and one of the big ones is password management. I've tried several times to make the jump, but every time I start researching options I'm overwhelmed by the selection. There are a lot of popular options out there, and I really don't have the time/energy to endure a misstep. So without a clear idea of which manager will check all of my boxes, I end up bailing on the process and keep using chrome's built in option.
So to start, here's what I like about Chrome:
- Automatically offers to store passwords without extra clicks
- Autofills automatically where it can, and gives me an easy choice when it can't
- Works everywhere I need passwords. (basically everywhere I browse the internet since chrome works everywhere)
- Minimal overhead. This is hard to beat since Chrome just includes it, so I'm fine with a little extra setup if necessary.
I used to use keepass portable on a thumb drive (I want to say circa ~2009ish), but it became really inconvenient as my usage shifted more to mobile devices.
I see this as a first step to also reducing my reliance on Chrome so I can start to consider other browsers. Right now I feel locked in to Google's ecosystem, but I know I can break it up if I don't get too bogged down by choice. Much appreciate any help. :)
34 votes -
Sweden's public sector has ditched Big Tech in the name of privacy as a major telecom provider unveiled a new secure collaboration hub
14 votes -
Kobold letters. Why HTML emails are a risk to your organization.
33 votes -
Lessons learned from the Google trade secret theft indictment
7 votes -
Fighting cookie theft using device bound sessions
14 votes -
Will the Apple antitrust case affect your phone’s security?
15 votes -
Hackers found a way to open any of three million hotel keycard locks in seconds
42 votes -
Hackers can read private AI-assistant chats even though they’re encrypted
20 votes -
You can not simply publicly access private secure links, can you?
11 votes -
White House urges use of type safe and memory safe programming languages and hardware
38 votes -
Leak of documents on spyware developed by vendor for Chinese government
33 votes -
Twitter/X provides premium perks to Hezbollah, other US-sanctioned groups
18 votes -
MIT PhD student hacks Apple Vision Pro days after release, reveals potential jailbreaks and malware threats
19 votes -
ChatGPT is leaking passwords from private conversations of its users, Ars reader says
17 votes -
In major gaffe, hacked Microsoft test account was assigned admin privileges
28 votes -
Twenty-six billion records exposed in massive leak, including data from Linkedin, X, Dropbox
44 votes -
Hackers can infect network-connected wrenches to install ransomware, researchers say
28 votes -
Inside the world's highest tech prison - HMP Fosse Way
12 votes -
All cops are broadcasting. TETRA unlocked after decades in the shadows.
26 votes -
India targets Apple over its phone hacking notifications
19 votes -
Ten years later, new clues in the Target breach
24 votes -
Ex-Twitter exec claims X fired him for raising security concerns
21 votes -
US senator warns governments are spying on Apple and Google users via push notifications
38 votes -
Harvard gutted initial team examining Facebook files following $500 million donation from Chan Zuckerberg Initiative, Whistleblower Aid client reveals
42 votes -
How the US Secret Service keeps presidential motorcades safe
5 votes