hetzlemmingsworld@lemmings.world · edit-23 days agoHow to avoid phishing fraud scamplus-squaremessage-squaremessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1message-squareHow to avoid phishing fraud scamplus-squarehetzlemmingsworld@lemmings.world · edit-23 days agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 10 days agoFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youwww.tomshardware.comexternal-linkmessage-square2fedilinkarrow-up140arrow-down10
arrow-up140arrow-down1external-linkFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youwww.tomshardware.comArthur Besse@lemmy.mlEnglish · 10 days agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 18 days agoNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down12
arrow-up112arrow-down1external-linkNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 18 days agomessage-square1fedilink
BusKill@lemmy.kde.social · 20 days agoBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up14arrow-down13
arrow-up11arrow-down1external-linkBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inBusKill@lemmy.kde.social · 20 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 21 days agoThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.comexternal-linkmessage-square3fedilinkarrow-up13arrow-down13
arrow-up10arrow-down1external-linkThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 21 days agomessage-square3fedilink
lemmyreader@lemmy.mlEnglish · 28 days agoHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netlemmyreader@lemmy.mlEnglish · 28 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.doublepulsar.comexternal-linkmessage-square3fedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.doublepulsar.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square3fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoFederal agency warns critical Linux vulnerability being actively exploitedarstechnica.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkFederal agency warns critical Linux vulnerability being actively exploitedarstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
rando895@lemmygrad.ml · 1 month agoSecuring a computer?plus-squaremessage-squaremessage-square3fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareSecuring a computer?plus-squarerando895@lemmygrad.ml · 1 month agomessage-square3fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messagetheintercept.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messagetheintercept.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 2 months agoBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitwww.zone.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitwww.zone.eulemmyreader@lemmy.mlEnglish · 2 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 2 months ago16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infoexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infolemmyreader@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 2 months agoNovel attack against virtually all VPN apps neuters their entire purpose arstechnica.comexternal-linkmessage-square11fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNovel attack against virtually all VPN apps neuters their entire purpose arstechnica.comArthur Besse@lemmy.mlEnglish · 2 months agomessage-square11fedilink
maegul@lemmy.mlEnglish · 2 months agoHow well can an employer be certain of a remote employee's geographical location?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow well can an employer be certain of a remote employee's geographical location?plus-squaremaegul@lemmy.mlEnglish · 2 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 2 months agoStealing your Telegram account in 10 seconds flatlyra.horseexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealing your Telegram account in 10 seconds flatlyra.horselemmyreader@lemmy.mlEnglish · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoNation-state hackers exploit Cisco firewall 0-days to backdoor government networksarstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNation-state hackers exploit Cisco firewall 0-days to backdoor government networksarstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0fedilink
t0mri@lemmy.ml · 2 months agoA doubt in encryptionplus-squarelemmy.mlimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageA doubt in encryptionplus-squarelemmy.mlt0mri@lemmy.ml · 2 months agomessage-square0fedilink