-
9 votes
-
The old way of handing out corporate hardware doesn’t work anymore
9 votes -
Does Apple really log every app you run? A technical look (The answer? No.)
13 votes -
The battle for the soul of digital freedom taking place inside your printer
15 votes -
Veronica Mars and NTLM password hashes
7 votes -
How a fake persona laid the groundwork for a Hunter Biden conspiracy deluge
12 votes -
Why the extortion of Vastaamo matters far beyond Finland – and how cyber pros are responding
4 votes -
Finland's interior minister summoned an emergency meeting after patient records at a private Finnish psychotherapy center were accessed by hackers
5 votes -
Helping people spot the spoofs: A URL experiment
7 votes -
Norway has blamed Russia for a cyberattack on the email system in the parliament in August – Moscow has rejected the claim, calling it a serious and wilful provocation
6 votes -
Hacking Grindr accounts with copy and paste
21 votes -
EARN IT Act introduced in US House of Representatives
37 votes -
Druva introduces software as a service data protection for Kubernetes
4 votes -
Escaping the dark forest - Rescuing over $9.6 million worth of Ethereum from a vulnerable smart contract
8 votes -
Microsoft leaks 6.5TB in Bing search data via unsecured Elastic server
12 votes -
You're going to be using confidential computing sooner rather than later
8 votes -
A crash course in CDA Section 230, and a discussion between two lawyers about the EARN IT Act and what it means for free speech and privacy online
5 votes -
When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number
32 votes -
Online voting is much more difficult to do securely, and a fundamental problem with the concept is that most voters won't be able to understand whether it's secure or not
21 votes -
A secure operating system
11 votes -
Malware in the wild using DNS-over-HTTPS (DoH) to pull payload
8 votes -
Sendgrid under siege from hacked accounts
7 votes -
Why and where you should plant your flag
12 votes -
Former Chief Security Officer for Uber charged with obstruction of justice for attempted cover-up of 2016 hack that compromised data from millions of users and drivers
9 votes -
Mozilla signs fresh Google search deal worth mega-millions as 25% staff cut hits Servo, MDN, security teams
16 votes -
NSA and FBI warn that previously undisclosed Drovorub malware for Linux threatens national security
22 votes -
Achilles: Over 400 vulnerabilities found in Qualcomm’s Snapdragon DSP chip, threatening the security of hundreds of millions of Android devices
17 votes -
Microsoft faces complex technical challenges in TikTok carveout
5 votes -
Reddit moderator accounts compromised in coordinated hack, hundreds of subreddits vandalized
29 votes -
20GB of Intel's internal source code, schematics, specs, and documents released, allegedly found on an unsecured CDN server
20 votes -
US Treasury Secretary Steven Mnuchin confirms TikTok is under review by the Committee on Foreign Investment in the US following national security concerns
11 votes -
Seventeen-year-old in Tampa, Florida arrested and accused of "masterminding" the compromises of prominent Twitter accounts on July 15, charged with thirty felonies
34 votes -
Bitwarden review
11 votes -
More than 1,000 people at Twitter had ability to aid hack of accounts
8 votes -
New ‘Meow’ attack has deleted almost 4000 unsecured databases
14 votes -
Hardening Debian
6 votes -
Garmin services and production go down after ransomware attack
16 votes -
A timeline of Wednesday's epic Twitter hack, and some clues about who may have been behind it
19 votes -
The massive Twitter hack could be a global security crisis
20 votes -
Apple, Elon Musk, Kanye West, and other accounts are tweeting a bitcoin scam in giant Twitter hack
49 votes -
Twitter is removing images of an internal tool sources say enables account takeover
11 votes -
The US phone bill security hole in HIPAA
5 votes -
The TikTok war - How TikTok exposed Facebook's blindspot, and why its Chinese roots make TikTok a genuine concern
8 votes -
Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking
5 votes -
Why is a tech executive installing security cameras around San Francisco?
10 votes -
Amazon orders employees to remove TikTok from phones, then backtracks
10 votes -
Google, Facebook, and Twitter halt government data requests after new Hong Kong security law
10 votes -
Indian government bans fifty-nine Chinese apps for security reasons
11 votes -
Increasing personal security online and Yubikey
I have recently noticed an uptick in phishing emails and SMSs, getting me to click on some malicious link and this has been troubling me. I am fairly good about what I click and so far I haven't...
I have recently noticed an uptick in phishing emails and SMSs, getting me to click on some malicious link and this has been troubling me.
I am fairly good about what I click and so far I haven't clicked anything malicious (I think). However, this has motivated me to up my online security.All my computers run Linux and I use an Android phone.
For browsing I use Firefox, with NoScript (and uBlock) and use containers for separating personal/shopping sites, etc.
I also have host file blocking on my computers and phone (using AdAway).I do have a pi-hole setup at home as well.
I also have 2FA setup on all my banking accounts, email accounts etc.
However all my banking account 2FA is still just using SMS. Which I think is now easily circumvented.
Email accounts do use Authenticator apps (like Authy and Google Authenticator).I also use a password manager (this one), which works well for me, but is only available on my computer and not from my phone. I am split between having my password manager available on my phone tho, since it is always on me and could be stolen or have something malicious installed on. What do you guys think? I am wary of services like LastPass, is that valid?
So I wanted to start a thread to discuss what do you guys do to stay safe online?
I am also considering getting a pair of Yubikey (one backup), are there any caveats/pitfalls I need to be aware of with Yubikey?14 votes -
Turn on multi-factor authentication before crooks do it for you
19 votes