retiolus@lemmy.catEnglish · 23 days agoDeepSeek database left open, exposing sensitive infoplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down12
arrow-up116arrow-down1external-linkDeepSeek database left open, exposing sensitive infoplus-squarewww.theregister.comretiolus@lemmy.catEnglish · 23 days agomessage-square0fedilink
cm0002@lemmy.worldEnglish · 28 days agoAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techexternal-linkmessage-square5fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techcm0002@lemmy.worldEnglish · 28 days agomessage-square5fedilink
💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 3 months agoHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.com💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 3 months agomessage-square0fedilink
canpolat@programming.devEnglish · 11 months agoRoss Anderson, professor and famed author of ‘Security Engineering,’ passes awayplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRoss Anderson, professor and famed author of ‘Security Engineering,’ passes awayplus-squaretherecord.mediacanpolat@programming.devEnglish · 11 months agomessage-square0fedilink
Sparrow_1029@programming.dev · 1 year agoReverse Engineering & De-clouding a smart deviceplus-squarejmswrnr.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse Engineering & De-clouding a smart deviceplus-squarejmswrnr.comSparrow_1029@programming.dev · 1 year agomessage-square1fedilink
Shannon@programming.devEnglish · edit-22 years agoWhy Decentralization is the Only Way to Prevent Cybersecurity Breaches?plus-squareprogramming.devimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageWhy Decentralization is the Only Way to Prevent Cybersecurity Breaches?plus-squareprogramming.devShannon@programming.devEnglish · edit-22 years agomessage-square0fedilink
agilob@programming.dev · 2 years agoA surprisingly simple way to foil car thievesplus-squarenews.umich.eduexternal-linkmessage-square1fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA surprisingly simple way to foil car thievesplus-squarenews.umich.eduagilob@programming.dev · 2 years agomessage-square1fedilink