Settoletto 🍤MA · edit-215 days agoInternational operation takes down another encrypted messaging serviceplus-squarewww.europol.europa.euexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkInternational operation takes down another encrypted messaging serviceplus-squarewww.europol.europa.euSettoletto 🍤MA · edit-215 days agomessage-square0fedilink
JaromilMA · 29 days agoThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comJaromilMA · 29 days agomessage-square0fedilink
JaromilMA · 29 days agoThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comJaromilMA · 29 days agomessage-square1fedilink
JaromilMA · 29 days agoVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caJaromilMA · 29 days agomessage-square1fedilink
JaromilMA · 1 month agoJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comJaromilMA · 1 month agomessage-square0fedilink
JaromilMA · 1 month agoMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaJaromilMA · 1 month agomessage-square0fedilink
JaromilMA · 1 month agoBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comJaromilMA · 1 month agomessage-square1fedilink
Settoletto 🍤MA · 1 month agoEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comSettoletto 🍤MA · 1 month agomessage-square0fedilink
JaromilMA · 2 months agoWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comJaromilMA · 2 months agomessage-square0fedilink
Settoletto 🍤MA · 2 months agoOne weird trick to get the whole planet to send abuse complaints to your best friend(s)plus-squaredelroth.netexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkOne weird trick to get the whole planet to send abuse complaints to your best friend(s)plus-squaredelroth.netSettoletto 🍤MA · 2 months agomessage-square0fedilink
JaromilMA · 2 months agoCan You Get Root With Only a Cigarette Lighter? | Blogplus-squarewww.da.vidbuchanan.co.ukexternal-linkmessage-square1fedilinkarrow-up15arrow-down12
arrow-up13arrow-down1external-linkCan You Get Root With Only a Cigarette Lighter? | Blogplus-squarewww.da.vidbuchanan.co.ukJaromilMA · 2 months agomessage-square1fedilink
vortex · edit-22 months agoMozilla reveals its true colours ... as ad pushersplus-squareblog.mozilla.orgexternal-linkmessage-square1fedilinkarrow-up15arrow-down114
arrow-up1-9arrow-down1external-linkMozilla reveals its true colours ... as ad pushersplus-squareblog.mozilla.orgvortex · edit-22 months agomessage-square1fedilink
Settoletto 🍤MA · 3 months agoU.S. Wiretap Systems Targeted in China-Linked Hack. Cue The Hives "I hate to say i told you so"plus-squarewww.wsj.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkU.S. Wiretap Systems Targeted in China-Linked Hack. Cue The Hives "I hate to say i told you so"plus-squarewww.wsj.comSettoletto 🍤MA · 3 months agomessage-square0fedilink
JaromilMA · 3 months agoHumble Tech Book Bundle: Cybersecurity Month MEGA Bundle by O'Reillyplus-squarewww.humblebundle.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkHumble Tech Book Bundle: Cybersecurity Month MEGA Bundle by O'Reillyplus-squarewww.humblebundle.comJaromilMA · 3 months agomessage-square0fedilink
vortex · edit-23 months agoListen up, changing SSH daemon to non-standard port is a waste of time & even less secureplus-squarewww.youtube.comexternal-linkmessage-square8fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkListen up, changing SSH daemon to non-standard port is a waste of time & even less secureplus-squarewww.youtube.comvortex · edit-23 months agomessage-square8fedilink
Settoletto 🍤MA · 3 months agoAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netexternal-linkmessage-square0fedilinkarrow-up12arrow-down12
arrow-up10arrow-down1external-linkAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netSettoletto 🍤MA · 3 months agomessage-square0fedilink
vortex · edit-23 months agoVeritasium on SS7 global phone vulnerabilitiesplus-squareyoutube.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down12
arrow-up113arrow-down1external-linkVeritasium on SS7 global phone vulnerabilitiesplus-squareyoutube.comvortex · edit-23 months agomessage-square0fedilink
vortex · edit-23 months agobe the whois you always wanted to beplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkbe the whois you always wanted to beplus-squarearstechnica.comvortex · edit-23 months agomessage-square0fedilink
vortexEnglish · 3 months agoWhere Warlocks Stay Up Late: Anthropological Hacker Mapplus-squarewherewarlocksstayuplate.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkWhere Warlocks Stay Up Late: Anthropological Hacker Mapplus-squarewherewarlocksstayuplate.comvortexEnglish · 3 months agomessage-square0fedilink
JaromilMA · 4 months agoBypassing airport security via SQL injectionplus-squareian.shexternal-linkmessage-square0fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkBypassing airport security via SQL injectionplus-squareian.shJaromilMA · 4 months agomessage-square0fedilink