-
42 votes
-
You can not simply publicly access private secure links, can you?
11 votes -
White House urges use of type safe and memory safe programming languages and hardware
38 votes -
Leak of documents on spyware developed by vendor for Chinese government
33 votes -
Twitter/X provides premium perks to Hezbollah, other US-sanctioned groups
18 votes -
MIT PhD student hacks Apple Vision Pro days after release, reveals potential jailbreaks and malware threats
19 votes -
ChatGPT is leaking passwords from private conversations of its users, Ars reader says
17 votes -
In major gaffe, hacked Microsoft test account was assigned admin privileges
28 votes -
Twenty-six billion records exposed in massive leak, including data from Linkedin, X, Dropbox
44 votes -
Hackers can infect network-connected wrenches to install ransomware, researchers say
28 votes -
All cops are broadcasting. TETRA unlocked after decades in the shadows.
26 votes -
India targets Apple over its phone hacking notifications
19 votes -
Ten years later, new clues in the Target breach
24 votes -
Ex-Twitter exec claims X fired him for raising security concerns
21 votes -
Harvard gutted initial team examining Facebook files following $500 million donation from Chan Zuckerberg Initiative, Whistleblower Aid client reveals
42 votes -
US senator warns governments are spying on Apple and Google users via push notifications
38 votes -
How the US Secret Service keeps presidential motorcades safe
5 votes -
Inside the world's highest tech prison - HMP Fosse Way
12 votes -
Microsoft’s Windows Hello fingerprint authentication has been bypassed
41 votes -
Self-proclaimed 'gay furry hackers' breach nuclear lab; demands research into IRL catgirls
71 votes -
Nothing’s iMessage app was a security catastrophe, taken down in 24 hours
65 votes -
Cybersecurity firm CEO pleads guilty to hacking hospitals to boost his company's business
36 votes -
Ransomware gang files SEC complaint over victim’s undisclosed breach
26 votes -
After hack, personally identifiable information records of a large percentage of citizens of India for sale on the dark web. The hack includes biometric data
22 votes -
AI cameras took over one small American town. Now they're everywhere
30 votes -
US sues SolarWinds for fraud over alleged cyber security neglect ahead of 2020 Russian hack of Justice and Homeland Security departments
25 votes -
For those who have tried YubiKey for personal use, is it worth it?
I saw people talking about YubiKey here a few weeks ago so I got curious. Unfortunately, I’m not seeing a lot of helpful reviews for it. I’m personally getting tired of having to take my phone...
I saw people talking about YubiKey here a few weeks ago so I got curious. Unfortunately, I’m not seeing a lot of helpful reviews for it.
I’m personally getting tired of having to take my phone anytime I need 2FA for Okta but I don’t have a lot of super important accounts to secure so I’m going back and forth in deciding whether the 100+ euro investment (to get two so that there’s a duplicate) would be worth it.
How do you use your YubiKey in your personal life and do you think it’s worth your use case ?
35 votes -
Prosecutors in Finland have charged a hacker accused of the theft of tens of thousands of records from psychotherapy patients
9 votes -
Finland faces growing Russian online threat, Finnish security services say – espionage attempts have increased since Ukraine invasion
22 votes -
The language used to describe AI risks
6 votes -
The dangers of LLM self-exfiltration: AI alignment and cybersecurity challenges
5 votes -
Building automation giant Johnson Controls hit by ransomware attack
8 votes -
Popular thesaurus website used in sneaky cryptojacking scheme
11 votes -
China exports of gallium and germanium, used in manufacture of semiconductors, fell to zero in August
25 votes -
Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters
13 votes -
Wyze security breach: Why we’re pulling our recommendation of Wyze security cameras
27 votes -
New SprySOCKS Linux malware used in cyber espionage attacks
12 votes -
At MGM's hacked casinos in Las Vegas, evidence of the massive ransomware hack is everywhere, if you're looking for it
45 votes -
Should I use third party firewall or antivirus on Windows (or elsewhere)? Which one?
It's seems to have been common sense for a while now that Windows has good-enough security software that you don't need 3rd party tools but is it actually the case now? Is there anything to lose...
It's seems to have been common sense for a while now that Windows has good-enough security software that you don't need 3rd party tools but is it actually the case now? Is there anything to lose or gain from trusting 3rd party with this stuff?
20 votes -
Experts link LastPass security breach to a string of crypto heists
48 votes -
Active North Korean campaign targeting security researchers
9 votes -
All Apple users are recommended to immediately update their devices to patch a zero-click, zero-day exploit captured in the wild
102 votes -
It’s official: Cars are the worst product category we have ever reviewed for privacy
130 votes -
Apple’s decision to kill its CSAM photo-scanning tool sparks fresh controversy
24 votes -
Mom’s Meals discloses data breach impacting 1.2 million people
17 votes -
WinRAR zero-day exploited since April to hack trading accounts
31 votes -
ProtonMail complied with 5,957 data requests in 2022 – still secure and private?
24 votes -
A new weapon in the war against robocalls
42 votes -
Unknown tracker alert on Android
I just received an Unknown Tracker alert on my Pixel 7 running Android 14 beta 5 for an Apple air tag that was on my son in laws key chain as I had borrowed his car. I heard this was coming but...
I just received an Unknown Tracker alert on my Pixel 7 running Android 14 beta 5 for an Apple air tag that was on my son in laws key chain as I had borrowed his car.
I heard this was coming but didn't expect it so soon!
Quite impressed with both the information given and the general advice and steps to take offered.
The first notification was "Tracker Travelling With You: Unknown Apple air tag detected. The owner can see your location."
Touching "more info" then shows a map of where the tracker has been with me and the option to make the tracker play a sound to help locate it, with a note that the owner won't know you've done that.
Then more advice and options:
- If you feel unsafe, get help.
- Get and save tracker info
- Disable the tracker (with a how-to guide on battery removal)
And a ”need more help" link.
As I said, I had heard about this coming but was pleasantly surprised at how good it was and the general advice and help offered up.
Nice seeing things like this done right.
34 votes -
FedFingerprinting: A federated learning approach to website fingerprinting attacks in Tor networks
6 votes