601. |
|
H-1B visa-reliant Cisco secured visas for foreign workers instead of US citizens
(mercurynews.com)
Politics Security
|
|
162 points by masonic 11 hours ago | 84 comments |
602. |
|
A Detailed Look at RFC 8446 (a.k.a. TLS 1.3)
(cloudflare.com)
Security
|
|
86 points by jgrahamc 15 hours ago | 8 comments |
603. |
|
Democratic National Committee calls in FBI after new hacking attempt
(co.uk)
Politics Security
|
|
6 points by Varcht 10 hours ago | 0 comments |
604. |
|
Huawei, ZTE to be excluded from Australia's 5G network
(itwire.com)
Mobile Politics Security
|
|
13 points by mediawatch 6 hours ago | 3 comments |
605. |
|
A riddle wrapped in a curve. Is EC crypto safe? (2015)
(cryptographyengineering.com)
Security
|
|
33 points by auslander 22 hours ago | 3 comments |
606. |
|
Intel Publishes Microcode Patches, No Benchmarking or Comparison Allowed
(perens.com)
Security
|
|
1313 points by jeswin 5 hours ago | 480 comments |
607. |
|
Australia bans Huawei and ZTE from supplying technology for its 5G network
(techcrunch.com)
Mobile Politics Security
|
|
148 points by lambainsaan 2 hours ago | 94 comments |
608. |
|
Dear Ad Networks
(joeyh.name)
Security Amazon
|
|
107 points by edward 18 hours ago | 12 comments |
609. |
|
New Attack Recovers RSA Encryption Keys from EM Waves Within Seconds
(bleepingcomputer.com)
Security Science
|
|
8 points by btashton 17 hours ago | 0 comments |
610. |
|
New Attack Recovers RSA Encryption Keys from EM Waves Within Seconds
(bleepingcomputer.com)
Security Science
|
|
24 points by tdupree 12 hours ago | 3 comments |
611. |
|
Spyware Company Leaves ‘Terabytes’ of Selfies, Messages, Location Data Exposed
(vice.com)
Security
|
|
356 points by wglb 18 hours ago | 141 comments |
612. |
|
Intel Responds to Complaints About Microcode Benchmarking Ban
(tomshardware.com)
Security
|
|
168 points by jsheard 15 hours ago | 55 comments |
613. |
|
Security Concerns Surrounding WebAuthn: Don't Implement ECDAA (Yet)
(paragonie.com)
Security
|
|
8 points by chillax 19 hours ago | 0 comments |
614. |
|
Life as a bug bounty hunter: a struggle every day, just to get paid
(technologyreview.com)
Security
|
|
129 points by mkm416 13 hours ago | 74 comments |
615. |
|
Google finds evidence of attack linked to Iran state media
(axios.com)
Politics Security Facebook Google
|
|
7 points by tareqak 13 hours ago | 6 comments |
616. |
|
An update on state-sponsored activity
(blog.google)
Politics Security
|
|
97 points by tonyztan 11 hours ago | 30 comments |
617. |
|
How the U.S. Has Failed to Protect the 2018 Election--and 4 Ways to Protect 2020
(lawfareblog.com)
Politics Security
|
|
6 points by severine 13 hours ago | 0 comments |
618. |
|
Google last again in Android antivirus ranking (2018)
(ghacks.net)
Security Google
|
|
7 points by gymshoes 5 hours ago | 0 comments |
619. |
|
Software Engineering – The Tesla Way
(reddit.com)
Security
|
|
25 points by jfischoff 4 hours ago | 2 comments |
620. |
|
Tech giants are becoming defenders of democracy. Now what?
(wired.com)
Politics Security
|
|
4 points by tonyztan 3 hours ago | 1 comments |
621. |
|
T-Mobile Detects and Stops Ongoing Security Breach
(bleepingcomputer.com)
Mobile Security
|
|
5 points by yaseen-rob 28 minutes ago | 0 comments |
622. |
|
Remote Code Execution on a Facebook Server
(scrt.ch)
Security
|
|
875 points by phwd 18 hours ago | 192 comments |
623. |
|
ATtention Spanned: Comprehensive Android Vulnerability Analysis of AT Commands
(atcommands.org)
Mobile Security
|
|
183 points by p4bl0 13 hours ago | 75 comments |
624. |
|
China Hacking Underground Shows Rising Prowess
(bankinfosecurity.com)
Security
|
|
5 points by koin0r 18 hours ago | 0 comments |
625. |
|
Smartphones backdoor using AT command allowing full control via USB cable
(ufl.edu)
Security
|
|
20 points by p4bl0 13 hours ago | 6 comments |
626. |
|
No, a Teen Did Not Hack a State Election
(propublica.org)
Politics Security
|
|
28 points by xbryanx 7 hours ago | 3 comments |
627. |
|
Multiple vulnerabilities cause compromised AT&T and T-Mobile account PINs
(9to5mac.com)
Mobile Security Apple
|
|
6 points by sahin-boydas 8 hours ago | 0 comments |
628. |
|
New Side-Channel Attack Uses Microphone to Read Screen Content
(bleepingcomputer.com)
AI/Machine Learning Security
|
|
6 points by yaseen-rob 6 hours ago | 0 comments |
629. |
|
How I managed to hack six law firms with expired domain names
(medium.com)
Security
|
|
112 points by gszathmari 22 hours ago | 37 comments |
630. |
|
Phone Numbers Were Never Meant as ID. Now We’re All at Risk
(wired.com)
Mobile Security
|
|
240 points by colinprince 18 hours ago | 167 comments |
|
| More |