daveyOsbornEnglish · edit-223 days agobank collects MAC addressesplus-squaremessage-squaremessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squarebank collects MAC addressesplus-squaredaveyOsbornEnglish · edit-223 days agomessage-square2linkfedilink
evenwicht@lemmy.sdf.orgEnglish · edit-21 month agothe wisdom of Microsoft Github’s forced 2FA over email -- what if your email address changes?plus-squaremessage-squaremessage-square4linkfedilinkarrow-up13arrow-down12
arrow-up11arrow-down1message-squarethe wisdom of Microsoft Github’s forced 2FA over email -- what if your email address changes?plus-squareevenwicht@lemmy.sdf.orgEnglish · edit-21 month agomessage-square4linkfedilink
BusKill@lemmy.sdf.orgEnglish · 2 months agoBusKill wins $1,031 microgrant from FUTOplus-squarewww.buskill.inexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkBusKill wins $1,031 microgrant from FUTOplus-squarewww.buskill.inBusKill@lemmy.sdf.orgEnglish · 2 months agomessage-square0linkfedilink
evenwicht@lemmy.sdf.orgEnglish · edit-24 months agoDoes Apple silicon like the M1 chip have a spy chip (management engine) of sorts? [Answer: yes]plus-squaremessage-squaremessage-square3linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareDoes Apple silicon like the M1 chip have a spy chip (management engine) of sorts? [Answer: yes]plus-squareevenwicht@lemmy.sdf.orgEnglish · edit-24 months agomessage-square3linkfedilink
evenwicht@lemmy.sdf.orgEnglish · edit-24 months agoIs Microsoft using email payloads for advertising?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareIs Microsoft using email payloads for advertising?plus-squareevenwicht@lemmy.sdf.orgEnglish · edit-24 months agomessage-square0linkfedilink
evenwicht@lemmy.sdf.orgEnglish · 6 months agochinese spam attacks on Debian bug tracker -- why?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1message-squarechinese spam attacks on Debian bug tracker -- why?plus-squareevenwicht@lemmy.sdf.orgEnglish · 6 months agomessage-square0linkfedilink
evenwicht@lemmy.sdf.orgEnglish · 6 months agoWhen an MX lookup fails to reveal that an e-mail address traverses Microsoft serversplus-squaremessage-squaremessage-square17linkfedilinkarrow-up115arrow-down11
arrow-up114arrow-down1message-squareWhen an MX lookup fails to reveal that an e-mail address traverses Microsoft serversplus-squareevenwicht@lemmy.sdf.orgEnglish · 6 months agomessage-square17linkfedilink
evenwicht@lemmy.sdf.orgEnglish · 6 months agoResearch needed… calling bullshit on the “for security reasons…” ongoing excuse for phone apps to advance AOS APIsplus-squaremessage-squaremessage-square1linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1message-squareResearch needed… calling bullshit on the “for security reasons…” ongoing excuse for phone apps to advance AOS APIsplus-squareevenwicht@lemmy.sdf.orgEnglish · 6 months agomessage-square1linkfedilink
cyphesetEnglish · 6 months agoCrack this code!plus-squaremessage-squaremessage-square4linkfedilinkarrow-up12arrow-down18
arrow-up1-6arrow-down1message-squareCrack this code!plus-squarecyphesetEnglish · 6 months agomessage-square4linkfedilink
activistPnk@slrpnk.netEnglish · 8 months agoSSD forced itself into read-only mode -- how can this be reversed?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1message-squareSSD forced itself into read-only mode -- how can this be reversed?plus-squareactivistPnk@slrpnk.netEnglish · 8 months agomessage-square0linkfedilink
ianonymous3000English · 1 year agoKeyoxide Verificationplus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1message-squareKeyoxide Verificationplus-squareianonymous3000English · 1 year agomessage-square0linkfedilink
cyberhakonEnglish · 2 years agoAI-Powered Threat Hunting on Linux Servers: Honeypot Experiment and Privilege Escalationplus-squaresafecontrols.blogexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkAI-Powered Threat Hunting on Linux Servers: Honeypot Experiment and Privilege Escalationplus-squaresafecontrols.blogcyberhakonEnglish · 2 years agomessage-square1linkfedilink
cyberhakonEnglish · 2 years agoTeaching smart things cyber self defense: ships and cars that fight backplus-squaresafecontrols.blogexternal-linkmessage-square1linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkTeaching smart things cyber self defense: ships and cars that fight backplus-squaresafecontrols.blogcyberhakonEnglish · 2 years agomessage-square1linkfedilink
ericjmorey@programming.devEnglish · 2 years agoDo Users Write More Insecure Code with AI Assistants?plus-squarechaos.socialexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkDo Users Write More Insecure Code with AI Assistants?plus-squarechaos.socialericjmorey@programming.devEnglish · 2 years agomessage-square1linkfedilink
comfydecalEnglish · 2 years ago[Request] General tips and where to study?plus-squaremessage-squaremessage-square3linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-square[Request] General tips and where to study?plus-squarecomfydecalEnglish · 2 years agomessage-square3linkfedilink
splendoruraniumEnglish · 2 years agoSmart card/Yubikey labeling - yay/nay?plus-squaremessage-squaremessage-square12linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1message-squareSmart card/Yubikey labeling - yay/nay?plus-squaresplendoruraniumEnglish · 2 years agomessage-square12linkfedilink
/home/pineapplelover@lemm.eeEnglish · 2 years agoWiFi routers can see people through walls. Here’s how it worksplus-squarewww.zmescience.comexternal-linkmessage-square7linkfedilinkarrow-up126arrow-down15
arrow-up121arrow-down1external-linkWiFi routers can see people through walls. Here’s how it worksplus-squarewww.zmescience.com/home/pineapplelover@lemm.eeEnglish · 2 years agomessage-square7linkfedilink