-
10 votes
-
Amazon asked Apple to remove an app that spots fake reviews, and Apple agreed
19 votes -
Sophisticated exploits used to breach fully-patched iPhones of journalists, activists, as detailed by Amnesty International's Security Lab
24 votes -
Swedish Coop supermarkets shut due to US ransomware cyber-attack – the hack targeted Florida-based IT company Kaseya before spreading through corporate networks
8 votes -
Why Google Play’s APK replacement is scaring some security experts
15 votes -
LinkedIn breach reportedly exposes data of 92% of users, including inferred salaries
13 votes -
NewsBlur Mongo database deleted in ransom attack (and restored)
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had...
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had sensitive private data there. We will likely find out more after the maintainer recovers from a busy night.
There are no good links for this, but it’s being discussed on Hacker News. Since it’s open source, someone described what’s being kept in that database.
(I use NewsBlur, but I don’t think my RSS reading habits are all that sensitive. Others might be in a different situation, though.)
6 votes -
Western Digital urges users to disconnect unsupported MyBook Live external hard drives from internet, after drives start being wiped remotely using vulnerability reported three years ago
14 votes -
780GB of data, tools, and source code were stolen from EA by purchasing a stolen cookie to get access to the company's Slack and social-engineering an IT Support employee
21 votes -
US Department of Justice recovers $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists
17 votes -
How to make your data harder to find online
7 votes -
Amazon devices in the US will automatically join the Amazon Sidewalk mesh network and start sharing internet with neighbors on June 10th, unless opted out
30 votes -
One-fifth of US beef capacity wiped out by JBS cyberattack
28 votes -
The full story of the 2011 hack into RSA Security
5 votes -
Introducing Firefox’s new Site Isolation security architecture
19 votes -
Huge Eufy privacy breach shows live and recorded cam feeds to strangers
5 votes -
We found Joe Biden’s secret Venmo. Here’s why that’s a privacy nightmare for everyone.
17 votes -
DarkSide ransomware gang quits after servers, Bitcoin stash seized
17 votes -
Largest fuel pipeline in the United States hit by ransomware attack
31 votes -
Ransomware gang threatens release of DC police records
10 votes -
A closer look at the DarkSide ransomware gang, which was responsible for the recent attack on Colonial Pipeline
15 votes -
EFF Surveillance Self-Defense - Privacy breakdown of mobile phones
18 votes -
How China turned a prize-winning iPhone hack against the Uyghurs
11 votes -
They told their therapists everything. Hackers leaked it all.
15 votes -
After decades of not using them, the Pentagon has given control of millions of IP addresses to a previously unknown company in an effort to identify possible cyber vulnerabilities and threats
17 votes -
5G: The outsourced elephant in the room
12 votes -
A "worst nightmare" cyberattack: The story of the SolarWinds hack
7 votes -
Team Navalny apologizes after database of email addresses registered for planned protest leaks online
7 votes -
Rust in the Android platform
7 votes -
I now own the Coinhive domain. Here's how I'm fighting cryptojacking and doing good things with content security policies.
15 votes -
The "S" in "IoT" is for Security
29 votes -
Whistleblower alleges Ubiquiti massively downplayed a “catastrophic” incident to minimize the hit to its stock price
18 votes -
Engineer reports data leak to nonprofit, hears from the police
11 votes -
Tracing paper - A brief history of the secret plan to track every printed page
6 votes -
A comparative analysis of security, privacy, and censorship issues in TikTok and Douyin, both developed by ByteDance
5 votes -
Can we stop pretending SMS is secure now?
17 votes -
Hackers break into thousands of security cameras, exposing Tesla, jails, hospitals
16 votes -
HTTP is fundamental to modern development. But like any widespread mature standard, it's got some funky skeletons in the closet.
9 votes -
At least 30,000 US organizations newly hacked via holes in Microsoft’s email software
19 votes -
Gab removes their public Git repository after it reveals their developers adding (and struggling to fix) basic security issues that led to a 70GB data leak
12 votes -
What are security, privacy, and anonymity?
6 votes -
The Great Suspender and the problem of malware being introduced into open-source browser extensions
15 votes -
Firefox 85 cracks down on supercookies
18 votes -
List of emails SponsorBlock's creator has received about inserting malware into the extension
17 votes -
ADT employee covertly accessed about 200 security cameras he installed to spy on people having sex
9 votes -
70TB of Parler users’ messages, videos, and posts leaked by security researchers
42 votes -
SolarWinds: New findings from our investigation of SUNBURST
6 votes -
New side-channel attack can recover encryption keys from hardware security keys
5 votes -
I'm thinking of getting a password manager. How does it work and any advice on transitioning to one?
The reason why is to make more accounts for reddit, YouTube (one for entertainment and Portuguese content each) news sites where signing up is an alternative to pass a paywall and other sites with...
The reason why is to make more accounts for reddit, YouTube (one for entertainment and Portuguese content each) news sites where signing up is an alternative to pass a paywall and other sites with comment sections.
Bad euphemism bro.Also some sense of "praxis" in order to gain privacy.Edit: And also getting anxious at the idea of remembering all my passwords, and putting them in a note in my old phone, which I am not bringing into my new phone and want to use this to delete.
According to these two articles, I can save my old passwords I had before and maybe even still make new ones after, and put them in a folder behind one true (master) password, which is the one you will truly care about, and they will be saved in a way in which the managing company won't know your password?
There's also figuring out which provider to use (and probably a similar post for alt-mail providers.) This is overwhelmingly for mobile (Android). No real space constraints for apps, only price, because I'm not working age.
27 votes -
Standard Notes completes penetration test and cryptography audit
14 votes