hetzlemmingsworld@lemmings.world · 1 day agoHow to avoid phishing fraud scamplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow to avoid phishing fraud scamplus-squarehetzlemmingsworld@lemmings.world · 1 day agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 8 days agoFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comArthur Besse@lemmy.mlEnglish · 8 days agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 16 days agoNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 16 days agomessage-square1fedilink
BusKill@lemmy.kde.social · 19 days agoBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inBusKill@lemmy.kde.social · 19 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agoThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agomessage-square2fedilink
lemmyreader@lemmy.mlEnglish · 27 days agoHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netlemmyreader@lemmy.mlEnglish · 27 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.plus-squaredoublepulsar.comexternal-linkmessage-square3fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.plus-squaredoublepulsar.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square3fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoFederal agency warns critical Linux vulnerability being actively exploitedplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFederal agency warns critical Linux vulnerability being actively exploitedplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
rando895@lemmygrad.ml · 1 month agoSecuring a computer?plus-squaremessage-squaremessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareSecuring a computer?plus-squarerando895@lemmygrad.ml · 1 month agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messageplus-squaretheintercept.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messageplus-squaretheintercept.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.comexternal-linkmessage-square4fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square4fedilink
lemmyreader@lemmy.mlEnglish · 1 month agoBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.euexternal-linkmessage-square4fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.eulemmyreader@lemmy.mlEnglish · 1 month agomessage-square4fedilink
lemmyreader@lemmy.mlEnglish · 2 months ago16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infolemmyreader@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 2 months agoNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comexternal-linkmessage-square22fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comArthur Besse@lemmy.mlEnglish · 2 months agomessage-square22fedilink
maegul@lemmy.mlEnglish · 2 months agoHow well can an employer be certain of a remote employee's geographical location?plus-squaremessage-squaremessage-square3fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow well can an employer be certain of a remote employee's geographical location?plus-squaremaegul@lemmy.mlEnglish · 2 months agomessage-square3fedilink
lemmyreader@lemmy.mlEnglish · 2 months agoStealing your Telegram account in 10 seconds flatplus-squarelyra.horseexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealing your Telegram account in 10 seconds flatplus-squarelyra.horselemmyreader@lemmy.mlEnglish · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square1fedilink
t0mri@lemmy.ml · 2 months agoA doubt in encryptionplus-squarelemmy.mlimagemessage-square25fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageA doubt in encryptionplus-squarelemmy.mlt0mri@lemmy.ml · 2 months agomessage-square25fedilink