TNW
White House cybersecurity chief quits, says leadership is inviting an attack
1 min · · White House computer security Chief Dimitrios Vistakis gave the White House one helluva resignation notice earlier this week when he quit over practices he dubbed “absurd” including the systemic… · Shared by 29, including Wesley Fryer, Ph.D. 🌎🎙🚀 wesfryer.com/after, Kate Nasser, TNW Top Stories, Dr. Jeffrey Guterman, wil shipley, Merkstatt@troet.cafe 📯
The New York Times
Army Officer on White House Staff Reported Concerns on Trump’s Ukraine Dealings
10 min · · The top Ukraine expert at the White House will tell impeachment investigators he twice reported concerns about President Trump’s pressure tactics on Ukraine, acting out of a “sense of duty.” · Shared by 56, including Scott McLeod, Michael Clemens, ExApologist, W. David Stephenson, Esther Schindler, Merkstatt@troet.cafe 📯, Trey Tweets Into the Void, Amy Siskind 🏳️🌈, Mike Rundle, Steve Silberman
The New York Times
Top Secret Russian Unit Seeks to Destabilize Europe, Security Officials Say
8 min · · Known as Unit 29155, the group is skilled in subversion, sabotage and assassination and has that only recently become known to Western intelligence agencies. · Shared by 46, including Angie Hobbs, Merkstatt@troet.cafe 📯, Katja Evertz, Amy Siskind 🏳️🌈
CNN
We asked a hacker to try and steal a CNN tech reporter's data. Here's what happened
4 min · · I thought my social media posts merely betrayed my desperate need for attention and likes. It turns out, though, that they're also a goldmine for hackers. · Shared by 116, including CyberCodeTwins, Neira Jones, Mathew Ingram, Fern, Merkstatt@troet.cafe 📯, Anna-Lena Müller, Guy Kawasaki, Aleyda Solis 🇺🇦, Stephanie A Kowalski, Michelle Garrett, Benedict Evans
The Guardian
Safety first: the short, simple guide to securing all your passwords
1 min · · If you log in to every website with the same details, you’re doing it wrong. Here are four easy steps to unhackability · Shared by 21, including Carla Gentry 🎶, Sarah-Jayne Gratton, Dean Anthony Gratton, Merkstatt@troet.cafe 📯
WIRED
7 Cybersecurity Threats That Can Sneak Up on You
2 min · · From rogue USB sticks to Chrome extensions gone wild, here is a quick guide to some basic risks you should look out for. · Shared by 44, including Gail Gardner, Backchannel, Vikram Dutt, K. Williams, Merkstatt@troet.cafe 📯, 🇺🇦Evan Kirstel #B2B #TechFluencer
The Verge
Google is making it easier to check if your passwords have been compromised in a data breach
3 min · · Google also checks for reused and weak passwords. · Shared by 35, including 🇺🇦Evan Kirstel #B2B #TechFluencer, Eric Seufert, Merkstatt@troet.cafe 📯, Peter Schmidhuber, Matthias Meyer
WIRED
A Controversial Plan to Encrypt More of the Internet
2 min · · The road to routing all Domain Name System lookups through HTTPS is pocked with disagreements over just how much it will help. · Shared by 51, including Backchannel, Sachin Rekhi, 🇺🇦Evan Kirstel #B2B #TechFluencer, ThousandEyes, Merkstatt@troet.cafe 📯, Mark Tabladillo PhD
Ars Technica
Why big ISPs aren’t happy about Google’s plans for encrypted DNS
4 min · · DNS over HTTPS will make it harder for ISPs to monitor or modify DNS queries. · Shared by 93, including 𝚛𝚘𝚐𝚎𝚛, Cory Doctorow @pluralistic@mamot.fr, Brian Armstrong 🛡️, BrendanEich, Paolo Sinelli, Matthias Lampe, Merkstatt@troet.cafe 📯, Ser Jeff Garzik, 🇺🇦Evan Kirstel #B2B #TechFluencer, Matthew Turland
WIRED
Decades-Old Code Is Putting Millions of Critical Devices at Risk
2 min · · Nearly two decades ago, a company called Interpeak created a network protocol that became an industry standard. It also had severe bugs that are only now coming to light. · Shared by 50, including Merkstatt@troet.cafe 📯, 🇺🇦Evan Kirstel #B2B #TechFluencer, Backchannel, Vishal Gulati (I back scientists)
gosink.in
Are you making your website vulnerable by adding target="_blank"?
3 min · · Or, are you compromising the performance of your website? Okay, first, let me show you one example! · Shared by 60, including mastodon.social/@renestalder, Matthias Lampe, masone, Merkstatt@troet.cafe 📯, Yoav Ganbar (🥑 Builder.io/Qwik), old getify
ZDNET
DevSecOps is the new DevOps
2 min · · In fast-moving DevOps environments, security needs to be thoroughly baked into the planning and design phases. · Shared by 28, including 🇺🇦Evan Kirstel #B2B #TechFluencer, Merkstatt@troet.cafe 📯
namebase.io
Meet Handshake: Decentralizing DNS to Improve the Security of the Internet
7 min · · Handshake can make the internet more secure by providing a distributed alternative to Certificate Authorities (CAs) and making domain names censorship-resistant, seizure-resistant, and tamper-proof. · Shared by 17, including 🇺🇦Evan Kirstel #B2B #TechFluencer, Merkstatt@troet.cafe 📯
The Guardian
We’re still a long way from making a quantum leap in web code-breaking
4 min · · Google has built a super-fast computer said to massively outpace ‘classical’ ones. Whether it can break the encryption we take for granted is moot · Shared by 13, including Merkstatt@troet.cafe 📯
The Hacker News
New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS
3 min · · Cybersecurity researchers today revealed the existence of Simjacker, a SIM Card vulnerability that could allow remote hackers to spy on devices just by sending SMS · Shared by 81, including Thomas Power, Niklaus Gerber, Charles Baldwin, Merkstatt@troet.cafe 📯, L. Taylor Banks, Tris Hussey, Dan Gillmor is at mastodon.social/@dangillmor, Peter Steinberger
heise online
Messenger Telegram löschte Nachrichten nicht verlässlich
3 min · · Ein Sicherheitsforscher hat in Telegram ein Privatsphären-Problem entdeckt: In einigen Fällen blieben gelöschte Nachrichten und Medien lokal erhalten. · Shared by 10, including Merkstatt@troet.cafe 📯