Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toยท1dยท
Discuss: DEV
๐Ÿ“œSmart Contracts
Flag this post
The Best Power Banks for Laptops With USB-C
nytimes.comยท8h
๐Ÿ’งRipple
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท1h
๐Ÿ”งMLIR
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.netยท1d
๐Ÿ“œSmart Contracts
Flag this post
Ghost-tapping scam targets tap-to-pay users
foxnews.comยท11h
๐Ÿ”—Crypto
Flag this post
Building state-of-the-art fraud defenses for trading platforms
fingerprint.comยท7h
๐Ÿ“œSmart Contracts
Flag this post
Human friendly industrial device IDs
bec-systems.comยท4hยท
Discuss: Hacker News
๐ŸงฎHomomorphic Encryption
Flag this post
So, I have to talk about Extropic.
zach.beยท7h
๐ŸงฎHomomorphic Encryption
Flag this post
Strong Authentication in a Post-Quantum World
kuppingercole.comยท17hยท
Discuss: Hacker News
๐ŸงฎHomomorphic Encryption
Flag this post
Why millions of connected vehicles need automated cyber security
techradar.comยท14h
๐Ÿ›ก๏ธAI Safety
Flag this post
GDM: Consistency Training Helps Limit Sycophancy and Jailbreaks in Gemini 2.5 Flash
lesswrong.comยท13h
โœ…Formal Verification
Flag this post
5 surprisingly weird ways you can void your PC hardware warranty
xda-developers.comยท1d
๐ŸงฎHomomorphic Encryption
Flag this post
Part 4: Daily Security Habits
open.forem.comยท1dยท
Discuss: DEV
๐Ÿ”—Crypto
Flag this post
Sandbox Strategies For Power Users On Any Platform
androidheadlines.comยท19h
๐Ÿ”—Crypto
Flag this post
Crooks exploit RMM software to hijack trucking firms and steal cargo
securityaffairs.comยท21h
๐ŸงฎHomomorphic Encryption
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.plยท1dยท
Discuss: Hacker News
๐Ÿ”—Crypto
Flag this post
BoxLambda OS Software Architecture, First Draft
epsilon537.github.ioยท2hยท
Discuss: Hacker News
๐Ÿ”งMLIR
Flag this post
Any wallets with splicing and sub-wallets?
stacker.newsยท8h
๐Ÿ”—Crypto
Flag this post
Critical security vulnerability in AMD Zen 5 CPUs could make encryption keys predictable
techspot.comยท11h
๐ŸงฎHomomorphic Encryption
Flag this post
Beyond reactive security: why continuous mobile device monitoring is essential
jamf.comยท13h
๐ŸงฎHomomorphic Encryption
Flag this post