hetzlemmingsworld@lemmings.world · edit-215 hours agoHow to avoid phishing fraud scamplus-squaremessage-squaremessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1message-squareHow to avoid phishing fraud scamplus-squarehetzlemmingsworld@lemmings.world · edit-215 hours agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 7 days agoFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comexternal-linkmessage-square2fedilinkarrow-up140arrow-down10
arrow-up140arrow-down1external-linkFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comArthur Besse@lemmy.mlEnglish · 7 days agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 16 days agoNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down12
arrow-up112arrow-down1external-linkNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 16 days agomessage-square1fedilink
BusKill@lemmy.kde.social · 18 days agoBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up14arrow-down13
arrow-up11arrow-down1external-linkBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inBusKill@lemmy.kde.social · 18 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 19 days agoThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.comexternal-linkmessage-square2fedilinkarrow-up12arrow-down13
arrow-up1-1arrow-down1external-linkThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 19 days agomessage-square2fedilink
lemmyreader@lemmy.mlEnglish · 26 days agoHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netlemmyreader@lemmy.mlEnglish · 26 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.plus-squaredoublepulsar.comexternal-linkmessage-square3fedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.plus-squaredoublepulsar.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square3fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoFederal agency warns critical Linux vulnerability being actively exploitedplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkFederal agency warns critical Linux vulnerability being actively exploitedplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messageplus-squaretheintercept.comexternal-linkmessage-square2fedilinkarrow-up118arrow-down12
arrow-up116arrow-down1external-linkThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messageplus-squaretheintercept.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.comexternal-linkmessage-square2fedilinkarrow-up110arrow-down14
arrow-up16arrow-down1external-linkRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up125arrow-down12
arrow-up123arrow-down1external-linkNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.comexternal-linkmessage-square4fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square4fedilink
lemmyreader@lemmy.mlEnglish · 1 month agoBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.euexternal-linkmessage-square4fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.eulemmyreader@lemmy.mlEnglish · 1 month agomessage-square4fedilink
lemmyreader@lemmy.mlEnglish · 2 months ago16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infoexternal-linkmessage-square0fedilinkarrow-up122arrow-down11
arrow-up121arrow-down1external-link16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infolemmyreader@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 2 months agoNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comexternal-linkmessage-square22fedilinkarrow-up137arrow-down14
arrow-up133arrow-down1external-linkNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comArthur Besse@lemmy.mlEnglish · 2 months agomessage-square22fedilink
maegul@lemmy.mlEnglish · 2 months agoHow well can an employer be certain of a remote employee's geographical location?plus-squaremessage-squaremessage-square3fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1message-squareHow well can an employer be certain of a remote employee's geographical location?plus-squaremaegul@lemmy.mlEnglish · 2 months agomessage-square3fedilink
lemmyreader@lemmy.mlEnglish · 2 months agoStealing your Telegram account in 10 seconds flatplus-squarelyra.horseexternal-linkmessage-square0fedilinkarrow-up118arrow-down12
arrow-up116arrow-down1external-linkStealing your Telegram account in 10 seconds flatplus-squarelyra.horselemmyreader@lemmy.mlEnglish · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square1fedilink
t0mri@lemmy.ml · 2 months agoA doubt in encryptionplus-squarelemmy.mlimagemessage-square25fedilinkarrow-up143arrow-down111
arrow-up132arrow-down1imageA doubt in encryptionplus-squarelemmy.mlt0mri@lemmy.ml · 2 months agomessage-square25fedilink
lemmyreader@lemmy.mlEnglish · 2 months agoComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comexternal-linkmessage-square1fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comlemmyreader@lemmy.mlEnglish · 2 months agomessage-square1fedilink