monica_b1998@lemmy.world · 4 days agoWhat is OAuth?plus-squareleaflet.pubexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkWhat is OAuth?plus-squareleaflet.pubmonica_b1998@lemmy.world · 4 days agomessage-square0linkfedilink
Birdies-Labs@lemmus.orgEnglish · 26 days agothoughts on this insider threat case?plus-squarelemmy.mlimagemessage-square2linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1imagethoughts on this insider threat case?plus-squarelemmy.mlBirdies-Labs@lemmus.orgEnglish · 26 days agomessage-square2linkfedilink
monica_b1998@lemmy.world · 2 months agoNorth Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true locationplus-squarewww.tomshardware.comexternal-linkmessage-square5linkfedilinkarrow-up129arrow-down11
arrow-up128arrow-down1external-linkNorth Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true locationplus-squarewww.tomshardware.commonica_b1998@lemmy.world · 2 months agomessage-square5linkfedilink
monica_b1998@lemmy.world · 2 months agoNew DroidLock malware locks Android devices and demands a ransomplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew DroidLock malware locks Android devices and demands a ransomplus-squarewww.bleepingcomputer.commonica_b1998@lemmy.world · 2 months agomessage-square0linkfedilink
xoron@programming.dev · 3 months agoWebRTC and Onion Routing Questionplus-squaremessage-squaremessage-square2linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareWebRTC and Onion Routing Questionplus-squarexoron@programming.dev · 3 months agomessage-square2linkfedilink
xoron@programming.dev · 4 months agoMulti-Protocol Cascading Round-Robin Cipherplus-squaremessage-squaremessage-square2linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareMulti-Protocol Cascading Round-Robin Cipherplus-squarexoron@programming.dev · 4 months agomessage-square2linkfedilink
Otter Raft@lemmy.caEnglish · 4 months agoOne wrong letter: UN moves to curb cybercrime with new convention | UN Newsplus-squarenews.un.orgexternal-linkmessage-square1linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkOne wrong letter: UN moves to curb cybercrime with new convention | UN Newsplus-squarenews.un.orgOtter Raft@lemmy.caEnglish · 4 months agomessage-square1linkfedilink
InternetCitizen2@lemmy.worldEnglish · 8 months ago16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Nowplus-squarewww.forbes.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Nowplus-squarewww.forbes.comInternetCitizen2@lemmy.worldEnglish · 8 months agomessage-square0linkfedilink
maltfield@lemmy.ml · 11 months agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square3linkfedilinkarrow-up15arrow-down15
arrow-up10arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@lemmy.ml · 11 months agomessage-square3linkfedilink
octosurf@feddit.org · 1 year agoNew Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcamsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcamsplus-squarecybersecuritynews.comoctosurf@feddit.org · 1 year agomessage-square0linkfedilink
reboot5853@lemmy.mlEnglish · 1 year agoELI5 Seedphrase Cryptographyplus-squaremessage-squaremessage-square8linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1message-squareELI5 Seedphrase Cryptographyplus-squarereboot5853@lemmy.mlEnglish · 1 year agomessage-square8linkfedilink
💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 1 year agoiOS more prone to attack than Android reveal analystsplus-squarewww.phonearena.comexternal-linkmessage-square10linkfedilinkarrow-up112arrow-down115
arrow-up1-3arrow-down1external-linkiOS more prone to attack than Android reveal analystsplus-squarewww.phonearena.com💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 1 year agomessage-square10linkfedilink
💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 1 year agoAI Agents Will Be Manipulation Enginesplus-squareproreader.ioexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkAI Agents Will Be Manipulation Enginesplus-squareproreader.io💭 ᴍɪɴʏᴀᴇɴ@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
positive_intentions@lemmy.mlBannedEnglish · edit-22 years agoRoast the security of my appplus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down13
arrow-up11arrow-down1message-squareRoast the security of my appplus-squarepositive_intentions@lemmy.mlBannedEnglish · edit-22 years agomessage-square0linkfedilink
fubarx@lemmy.ml · 2 years agoWatch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokesplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down13
arrow-up115arrow-down1external-linkWatch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokesplus-squarewww.wired.comfubarx@lemmy.ml · 2 years agomessage-square0linkfedilink
h0bbl3s@lemmy.world · 2 years agoVulnerability scanning with vulsplus-squareh0bbl3s.port0.orgexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkVulnerability scanning with vulsplus-squareh0bbl3s.port0.orgh0bbl3s@lemmy.world · 2 years agomessage-square0linkfedilink
Cedric@lemmy.ml · 2 years agoRelease 1.3.0 of Vulnerability Lookup with many improvementsplus-squarelemmy.mlimagemessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1imageRelease 1.3.0 of Vulnerability Lookup with many improvementsplus-squarelemmy.mlCedric@lemmy.ml · 2 years agomessage-square0linkfedilink
cerement@slrpnk.net · 2 years ago[Kevin Beaumont] What I learned from the ‘Microsoft global IT outage’plus-squaredoublepulsar.comexternal-linkmessage-square2linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-link[Kevin Beaumont] What I learned from the ‘Microsoft global IT outage’plus-squaredoublepulsar.comcerement@slrpnk.net · 2 years agomessage-square2linkfedilink
Cedric@lemmy.ml · 2 years agoVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comCedric@lemmy.ml · 2 years agomessage-square0linkfedilink
kryllic@programming.dev · 2 years agoCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down12
arrow-up113arrow-down1external-linkCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comkryllic@programming.dev · 2 years agomessage-square0linkfedilink