These are still the most popular passwords around - and surely, we can do better than this as a species
techradar.comΒ·1d
πopen source
Flag this post
How good is AI at Hacking AD?
πopen source
Flag this post
LLM side-channel attack could allow snoops to guess what you're talking about
theregister.comΒ·9h
πopen source
Flag this post
SoK: Systematizing a Decade of Architectural RowHammer Defenses Through the Lens of Streaming Algorithms
arxiv.orgΒ·4h
πopen source
Flag this post
Deep Learning for Molecules and Materials
π’mathematics
Flag this post
Optimization of Information Reconciliation for Decoy-State Quantum Key Distribution over a Satellite Downlink Channel
arxiv.orgΒ·1d
π’mathematics
Flag this post
Cyberattackers are getting more evasive: How can defenders keep up?
siliconrepublic.comΒ·17h
πopen source
Flag this post
MT-HuBERT: Self-Supervised Mix-Training for Few-Shot Keyword Spotting in Mixed Speech
arxiv.orgΒ·4h
πopen source
Flag this post
Security Affairs newsletter Round 549 by Pierluigi Paganini β INTERNATIONAL EDITION
securityaffairs.comΒ·1d
πopen source
Flag this post
6 Ways Phishing Scammers Imitate Real People and Brands
howtogeek.comΒ·16h
πopen source
Flag this post
Donβt Be a Louvre: How Weak Passwords and Unpatched Software Encourage Breaches
blog.elcomsoft.comΒ·19h
πopen source
Flag this post
New Rules Put The Squeeze On Semiconductor Gray Market
semiengineering.comΒ·1h
πopen source
Flag this post
What if the Answer To Bad Passwords Is More Websites That Wonβt Let You Use Them?
vice.comΒ·11h
πopen source
Flag this post
Network edge design checklist: Part 2 β Network edge design
blog.apnic.netΒ·2h
πopen source
Flag this post
Hardware Wallets Surge as Cryptoβs Unyielding Shield Against Cyber Threats
kttc.marketminute.comΒ·1d
πopen source
Flag this post
TryHackMe: Defensive Security Intro
abefromen.bearblog.devΒ·1d
πopen source
Flag this post
Loading...Loading more...