- IOTA Vulnerability Report
- Symantec distrust impact on the webpki
- How long does it take for a MongoDB to be compromised
- Abusing NVIDIA’s node.js to bypass application whitelisting
- What’s the Difference Between WPA2 and WPA3? | Electronic Design
- Turn Off Your Fitbit, Garmin, Apple Watch GPS NOW!
- The default OpenSSH key encryption is worse than plaintext
- New attack on WPA/WPA using PMKID
- Brutal Deluxe Software
- Explotación de sistemas de pagos NFC en Monterrey, Nuevo Leon - TPX MX SA DE CV
- Black Hat 2018: Stealthy Kernel Attack Flies Under Windows Mitigation Radar on Threatpost
- Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? A: Because Keynote Speakers Make Bad Life Decisions and Are Poor Role Models
- Spyware Company Leaves ‘Terabytes’ of Selfies, Text Messages, and Location Data Exposed Online - Motherboard
- How an international hacker network turned stolen press releases into $100 million
- Five-Eyes Intelligence Services Choose Surveillance Over Security
- Oh for fuck's sake, not this fucking bullshit again (cryptography edition)
- The curious case of the Raspberry Pi in the network closet: how we found, analyzed (with the help of Reddit) and in the end caught the culprit of a malicious device in our network
- 70+ different types of home routers(all together 100,000+) are being hijacked by GhostDNS
- PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’
- The British Airways Hack: JavaScript Weakness Pin-pointed Through Time-lining
- APT38: Details on New North Korean Regime-Backed Threat Group
- The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies. Some other conclusions: Hardware Implants
- Security Vulnerabilities in US Weapons Systems
- Nick Sullivan - Is the Web Ready for OCSP Must-Staple?
- Thompson Cyber Security Labs: 50% of firmware certs are expired?
- E Ink Waveforms are a closely guarded secret
- The Effectiveness of Publicly Shaming Bad Security
- A mysterious grey-hat is patching people's outdated MikroTik routers
- This Tech Would Have Spotted the Secret Chinese Chip in Seconds - IEEE Spectrum
- Protecting Mozilla’s GitHub Repositories from Malicious Modification | Mozilla Security Blog
- Tell HN: Now Washington Post is asking to turn off Firefox's tracking protection | Hacker News
- Just because it's an ID doesn't mean anything... at all...
- How to irregular cyber warfare
- New iPhone Passcode Bypass Found Hours After Apple Releases iOS 12.1
- Fake fingerprints can imitate real ones in biometric systems – research
- The seven deadly paradoxes of cryptocurrency | Bank Underground
- Private by Design: How we built Firefox Sync - Mozilla Hacks - the Web developer blog
- Internet Vulnerability Takes Down Google
- New Data Breach exposes 57 million records
- What the Marriott Breach Says About Security
- Bad Consumer Security Advice
- Civil War Photo Sleuth is using facial recognition software to identify people in pictures.
- ID Numbers for 120 Million Brazilians taxpayers exposed onlineSecurity Affairs
- Operation Sharpshooter Targets Global Defense, Critical Infrastructure
- Our Security Models Will Never Work—No Matter What We Do.
- Over 25,000 Linksys Smart Wi-Fi routers vulnerable to sensitive information disclosure flaw, - models affected
- How does Apple (privately) find your offline devices?: A Few Thoughts on Cryptographic Engineering
- Chromecast hack promoting PewDiePie reveals security bug - github
- Ask HN: Good technical GDPR resources? | Hacker News
- First-Ever UEFI Rootkit Tied to Sednit APT | Threatpost | The first stop for security news
- UNDERCLOCKING THE ESP8266 LEADS TO WIFI WEIRDNESS: Sometimes the best hacks come from the most basic of questions. In this case, [CNLohr] was wondering what would happen if he started to reduce the clock speed of the ESP8266’s Baseband PLL (BBPLL) while still trying to communicate with it.
- why-telegram-is-insecure.md
- This Runner Is a Hitman. His GPS Watch Tied Him to a Mob Boss Murder
- Advancing Human-Rights-By-Design In The Dual-Use Technology Industry
- How To Find Hidden Cameras & Spy Gear Like a Professional: The Definitive Guide
- Sorry, your data can still be identified even if it’s anonymized
- How I abused 2FA to maintain persistence after a password change(Google, Microsoft, Instagram, Cloudflare, etc)
- UAE USED CYBER SUPER-WEAPON TO SPY ON IPHONES OF FOES
- 2019 Threat Detection Report - Red Canary
- Why Phone Numbers Stink As Identity Proof
- Protecting your online privacy is tough—but here's a start
- Thoughts on personal data vs non-personal data
- (pt-br) A Interceptação Telemática no Projeto de Lei “Anticrime”: os riscos do Hacker Estatal
- Chinese companies have leaked over 590 million resumes via open databases
- Cryptography That Can’t Be Hacked: Researchers have just released hacker-proof cryptographic code — programs with the same level of invincibility as a mathematical proof.
- Cybercrime market selling full digital fingerprints of over 60,000 users
- When Engineers Become Whistleblowers
- The Most Expensive Lesson Of My Life: Details of SIM port hack
- Full(er) House: Exposing high-end poker cheating devices
- FBI agent accidentally reveals own 8chan posts; attempts to redirect white supremacist rage against Russia
- ORIGIN OF WIRELESS SECURITY: THE MARCONI RADIO HACK OF 1903
- An Army of Robot Surveillance Guards Is Coming
- Viral App FaceApp Now Owns Access To More Than 150 Million People's Faces And Names
- EvilGnome: Rare Malware Spying on Linux Desktop Users
- Capital One Data Theft Impacts 106M People
- The Encryption Debate Is Over - Dead At The Hands Of Facebook
- Attorney General William Barr on Encryption Policy
- Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites
- Hundreds of exposed Amazon cloud backups found leaking sensitive data
- Inside the Hidden World of Elevator Phone Phreaking
- GDPR privacy law exploited to reveal personal data
- Pulse Secure VPN servers vulnerable to CVE-2019-11510 by country – Scan date: August 31, 2019
- Fraudsters deepfake CEO’s voice to trick manager into transferring $243,000
- 600,000 GPS trackers for people and pets are using 123456 as a password
- The Work Diary of Parisa Tabriz, Google’s ‘Security Princess’
- Google accused of secretly feeding personal data to advertisers
- Instagram Confirms Security Issue Exposed User Accounts And Phone Numbers—Exclusive
- Centralised DoH is bad for privacy, in 2019 and beyond
- Google Chrome Keystone is modifying /var symlink on non SIP Macs causing Boot Issues
- Twitter executive for Middle East is British Army 'psyops' soldier
- Vault 8
- Scraping Russian Twitter Trolls With Python, Neo4j, and GraphQL
- Online Security Guide for Journalists
- Schneier on Security
- The Geopolitics of Cybersecurity
- We are taking new steps against broadening threats to democracy
- violencia-nao-tem-partido: Hate crimes monitor for political motivated assaults in Brazil.
- Our Security Community - Microsoft Tech Community - 57519
- Yale Professor Jason Stanley Identifies Three Essential Features of Fascism: Invoking a Mythic Past, Sowing Division & Attacking Truth.
- How social media is crippling democracy, and why we seem powerless to stop it
- WHY THE LEFT-WING NEEDS A GUN CULTURE
- GLOBAL COMMISSION INTRODUCES SIX CRITICAL NORMS TOWARDS CYBER STABILITY
- IGF 2018 WS #366 Proliferation, Cyber Stability and State Responsibility
- Web Browsing Data Offer Better Election Predictions | Research
- An Archive of 800+ Propaganda Maps Designed to Shape Opinions & Beliefs: Enter Cornell’s Persuasive Maps Collection
- Spies Without Borders: How the FSB Infiltrated the International Visa System
- A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments
- Twitter is Trying to Erase the Past
- At Least 70 Countries Have Had Disinformation Campaigns, Study Finds
- Want to Know if the Election was Hacked? Look at the Ballots
- E-Voting Machines Need Paper Audits to be Trustworthy
- FBI Hacked into 8,000 Computers in 120 Countries Using A Single Warrant
- Ich sehe, also bin ich ... Du
- Public Testing of Brazilian e-Voting Machines
- Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States
- Transparency: This repository contains artifacts generated by Free & Fair, including every proposal Free & Fair has submitted to governments, funding agencies, and other organizations in response to RFI, RFP, and other solicitations.
- Buying Used Voting Machines on eBay
- Voting undermines the will of the people – it's time to replace it with sortition
- Password Security:: Why the horse battery staple is not correct