Show HN: Pinpam, TPM2-backed pin authentication for Linux
github.com·2d·
Discuss: Hacker News
🛡️RISC-V Security
Flag this post
[UPDATED] Samsung SSDs reliability :: Firmware fix available for 990 Pro, other drives potentially afected
forums.anandtech.com·4h
🔒Secure Boot
Flag this post
New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel
arstechnica.com·11h·
Discuss: Hacker News
🔒Secure Boot
Flag this post
Palm-sized PocketPD USB-C programmable power supply delivers up to 21V/5A output (Crowdfunding)
cnx-software.com·1h
🔌Single Board PC
Flag this post
What Good Software Supply Chain Security Looks Like
thenewstack.io·7h
🔗Supply Chain
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·10h
🦠Malware Analysis
Flag this post
The Proton Authenticator security model
proton.me·10h
🔐PAKE Protocols
Flag this post
ELA-1560-1 intel-microcode security update
freexian.com·9h
🛡️RISC-V Security
Flag this post
Breaking Trusted Execution Environments
tee.fail·1d·
🖥️Modern Terminals
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.com·10h
🎫Kerberos Attacks
Flag this post
Creating a "Two-Face" Rust binary on Linux
synacktiv.com·1d
🦠Parasitic Storage
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.com·10h
🔍Audio Forensics
Flag this post
I'm Independently Verifying Go's Reproducible Builds
agwa.name·8h·
🔄Reproducible Builds
Flag this post
Secure it Forward: Yubico and Best Buy Foundation® bring digital security to teens
yubico.com·18h
🔒Secure Boot
Flag this post
Give ATMega88 the Boot With This Retro Front Panel
hackaday.com·1d
Circuit Archaeology
Flag this post
10 ways enterprise SSDs differ from traditional SSDs—and why that matters
techradar.com·14h
💾Persistence Strategies
Flag this post
Inside a 34-Petabyte Migration: The True Cost of Moving a Digital Mountain
hackernoon.com·16h
🌐Edge Preservation
Flag this post
OCCT 15 launches with storage benchmark, smarter GPU tests, and coil-whine detection
techspot.com·2d
🎯Emulation Accuracy
Flag this post
Signal’s Post-Quantum Cryptographic Implementation
schneier.com·14h
🔐Quantum Security
Flag this post
5 ways to prevent password reset attacks
fingerprint.com·1h
🎯NTLM Attacks
Flag this post