Twitter | Pretraživanje | |
g
989
Tweetovi
830
Pratim
112
Osobe koje vas prate
Tweetovi
g proslijedio/la je tweet
M. 3. velj
Odgovor korisniku/ci @campuscodi @Twitter
the phone numbers required users to provide in the name of "security"? 🤔
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Eva 3. velj
If this does not become a plot point in a book or movie, I will be very disappointed.
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
The Dark Tangent 3. velj
Good article describing current attacks against the Tor network.. unfortunately very little onion operators can do to protect themselves unless makes some code changes.
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Catalin Cimpanu 2. velj
Raytheon engineer arrested for taking US missile defense data to China - Suspect worked as electrical engineer at Raytheon for 10y - Designed FPGA circuits on ballistic missile defense systems - He took a work laptop to China despite being told not to
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
ZDNet 3. velj
Soros says Facebook is secretly helping Trump re-election and calls for leadership change
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Kevin Beaumont 29. sij
Two things on this. Click final "Read more" at the bottom of the article to see how owned they got. Spoiler: a lot. Also: "Under diplomatic immunity, the UN is not obliged to divulge what was obtained by the hackers or notify those affected." A source at UN says 400gb taken.
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Catalin Cimpanu 29. sij
The UN got hacked and they tried to keep it quiet
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Rob ☃️ Graham (not at Shmoocon this year) 28. sij
The story about Saudis hacking Jeff Bezos iPhone didn't find evidence, but unknowns, such as a suspicious encrypted video they couldn't decrypt. So I wrote a blogpost with a detailed explanation how to decrypt it:
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
BBC Breaking News 28. sij
UK to ban "high-risk vendors" from sensitive parts of 5G networks, but Chinese firm Huawei set to have limited role
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Catalin Cimpanu 27. sij
It was nice knowing you, Avast! You can kiss your enterprise customerbase good bye!
Reply Retweet Označi sa "sviđa mi se"
g 27. sij
has to be the worst vendor ever made. 99.9% of the time fails to vend, return credit never works and neither does it's balance counter.
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Joxean Koret 26. sij
Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"
Reply Retweet Označi sa "sviđa mi se"
g 27. sij
Odgovor korisniku/ci @pwnallthethings
3D only
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
SwiftOnSecurity 26. sij
I tried to contact a company through their security@ email address about a problem with their website, and they replied telling me to reset my browser cache what the fuck.
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Kevin Beaumont 24. sij
Nobody tell about how exploits work, the million dollar exploit market, and billion dollar surveillance industry.
Reply Retweet Označi sa "sviđa mi se"
g 24. sij
Odgovor korisniku/ci @j_opdenakker
Now just change your password to "Twitter"
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
The Hacker News 22. sij
Odgovor korisniku/ci @TheHackersNews
Forensic report says: Within hours after receiving a MP4 video file from the Crown Prince's account, a massive amount of data was exfiltrated from Bezos's phone, increasing data egress suddenly by 29,156 per cent to 126 MB. Read details:
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Matthew Green 21. sij
A rumor I’ve heard (and can’t verify, so caveat emptor) is that Apple employees are barred from sharing confidential corporate docs via iCloud. If true, that sure isn’t a vote of confidence in the system.
Reply Retweet Označi sa "sviđa mi se"
g 21. sij
Odgovor korisniku/ci @GossiTheDog
Could I get an invite code? 😋
Reply Retweet Označi sa "sviđa mi se"
g proslijedio/la je tweet
Rickey Gevers 20. sij
Citrix gave attackers a 1 month head start by providing expoit details first, and a patch 1 month later.
Reply Retweet Označi sa "sviđa mi se"