Tim Berners-Lee on Apple’s WebKit monopoly
brucelawson.co.uk·2h
🦹cybercrime
Flag this post
iPhone Ethernet Bridge on RaspberryPi with Ubuntu Server
revontulet.dev·4h·
Discuss: Hacker News
🔍Cyber threat intelligence
Flag this post
Uncovering Blackholes: Advanced Detection Techniques for Complex Networks (denog17)
cdn.media.ccc.de·1d
🔍Cyber threat intelligence
Flag this post
Bjarne fix your freaking language
marler8997.github.io·11h·
Discuss: Hacker News
🦹cybercrime
Flag this post
Ryanair Tries Forcing App Downloads By Eliminating Paper Boarding Passes
tech.slashdot.org·4h
🦹cybercrime
Flag this post
Singlewire Software Launches the InformaCast Wearable Alert Badge to Offer School Staff Personalized Protection
prnewswire.com·5h
🦹cybercrime
Flag this post
Police seize multiple illegal gambling machines in raid of Cañon City arcade
krdo.com·1d
🦹cybercrime
Flag this post
Steam Page Launch - Introducing Starfall
reddit.com·11h·
Discuss: r/godot
🦹cybercrime
Flag this post
memories of .us
computer.rip·19h
🦹cybercrime
Flag this post
On Stance
lesswrong.com·1d
🦹cybercrime
Flag this post
MakeUseOf: “Vibescamming” is the new online scam everyone’s falling for
rbfirehose.com·6h
🦹cybercrime
Flag this post
original ↗
manton.org·1d
🦹cybercrime
Flag this post
A Jailed Hacking Kingpin Reveals All About Cybercrime Gang
it.slashdot.org·1d
🦹cybercrime
Flag this post
Linux gets malware too, Kaspersky says, as it launches antivirus for home users
neowin.net·15h
🦹cybercrime
Flag this post
Nearly 50% of IoT Device Connections Pose Security Threats, Study Finds
blogger.com·2d
🦹cybercrime
Flag this post
Google: Private AI Compute to Combine Cloud AI with Data Protection
heise.de·7h
🔍Cyber threat intelligence
Flag this post
Introducing Lightweight WireGuard Obfuscation
mullvad.net·7h
🦹cybercrime
Flag this post
Offline Souls, Online Noise (Dead Internet) PART 2
future.forem.com·21h·
Discuss: DEV
🦹cybercrime
Flag this post
Knicks' Jalen Brunson becomes even more unguardable
nytimes.com·7h
🦹cybercrime
Flag this post
Account Takeover via IDOR: From UserID to Full Access
infosecwriteups.com·3d
🔍Cyber threat intelligence
Flag this post