Cybersecurity

5961 readers
213 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
1001
 
 

Before going to university with a Linux Laptop, Linux PC (Waterfox) and Graphene OS on the Phone with Mull as Browser, I wonder how I can get a more comfy or efficient life. I never had the idea to sign in to Firefox Pocket because I thought an entity would be able to read the bookmarks.

I wanna know details about it, why and why not should I use it? Is it even encrypted?

1002
1003
1004
7
Opsec101 (opsec101.org)
submitted 6 months ago by [email protected] to c/cybersecurity
1005
1006
1007
 
 

Within the first minute of the vid I'm thinking holy shit Zotac!

  • easily googlable private customer and B2B info is publicly available

~~They're gonna have one hell of a class action coming their way~~

Edit:
alright I'm 5mins in and now I'm thinking there might not be a class action anymore but Zotac's information handling is just funny and confusing now

lmao love the quote from Zotac's partner😂:

If I can Google search my own credit memos... what the fuck is this? How can you be this insecure? How can you run a business like this?

1008
 
 

BGP, again.

1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
 
 

Adversary-in-the-middle attacks can strip out the passkey option from login pages that users see, leaving targets with only authentication choices that force them to give up credentials.

1024
1025
view more: ‹ prev next ›