grist
Hackers already infiltrate EV chargers. It could only get worse.
6 min · · Most intrusions have been innocuous, but a nefarious plot could bring down the grid. Experts have suggestions for improving the security of EV chargers. · Shared by 7, including 瑞拿頭
slashnext.com
WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks
4 min · · In this blog post, we'll look at the use of generative AI, including OpenAI's ChatGPT, and the cybercrime tool WormGPT, in BEC attacks. · Shared by 5, including 瑞拿頭
The Register
Robot can rip the data out of RAM chips with chilling tech
4 min · · Shared by 7, including 瑞拿頭
berthub.eu
The Dutch government wants to automatically and administratively gain permission to target victims of hackers
4 min · · This is a mirror of the original about:intel post, since the about:intel server is sadly overloaded. The Dutch government is proposing adding a lex specialis to its existing intelligence and security… · Shared by 5, including 瑞拿頭
reversinglabs.com
Secrets Exposed: How to mitigate risk from secrets leaks — and prevent future breaches
8 min · · Software secrets are targeted by malicious actors. Here are three key steps to mitigate risk — and best practices you can take to prevent future breaches. · Shared by 5, including 瑞拿頭
The Guardian
On the trail of the Dark Avenger: the most dangerous virus writer in the world
15+ min · · The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why? · Shared by 377, including Scott Shapiro, The Last Shitposter, Oliver Raduner, 🇺🇦Evan Kirstel #B2B #TechFluencer, 瑞拿頭, @grzewap@mastodon.social
wiki.wellorder.net
Well Ordered Wiki
3 min · · Nostr is a new system that brings me joy to work on and use, so I’d like to take a few moments to share a few words about it. Nostr tries to solve the problem of publishing short notes (“and other… · Shared by 6, including 瑞拿頭
usenostr.org
NOSTR is a protocol
5 min · · In nostr you don't need to register for an account by using personal data. Like in Bitcoin, you just need a set of keys. Two keys to be precise: 🏷️ A public key: Which will act as your username. This… · Shared by 8, including 瑞拿頭
shieldoo.io
Shieldoo Secure Network for your business
· Protect your business's private network from cyberattacks with Shieldoo and let your team work effectively from anywhere. · Shared by 4, including 瑞拿頭
MIT Technology Review
Three ways AI chatbots are a security disaster
1 min · · Large language models are full of security vulnerabilities, yet they’re being embedded into tech products on a vast scale. · Shared by 196, including Stephanie A Kowalski, @timnitGebru@dair-community.social on Mastodon, 瑞拿頭, Mike Tamir, PhD, Thomas Pleil
support.apple.com
Hardware microphone disconnect
2 min · · Supported Mac computers and iPad devices have a hardware disconnect that helps ensure that the microphone is disabled whenever the lid is closed. · Shared by 4, including 瑞拿頭
gkbrk.com
Reverse Engineering A Mysterious UDP Stream in My Hotel
3 min · · Hey everyone, I have been staying at a hotel for a while. It’s one of those modern ones with smart TVs and other connected goodies. I got curious and opened Wireshark, as any tinkerer would do. · Shared by 22, including 瑞拿頭
CNN
Cyberattack on food giant Dole temporarily shuts down North America production, company memo says
4 min · · A cyberattack earlier this month forced produce giant Dole to temporarily shut down production plants in North America and halt food shipments to grocery stores, according to a company memo about the… · Shared by 19, including Brian Laung Aoaeh, CFA, 瑞拿頭, Brian Roemmele, 🇺🇦Evan Kirstel #B2B #TechFluencer
a16zcrypto.com
Zero Knowledge Canon, part 1 & 2
16+ min · · a16z crypto is a venture capital fund that invests in crypto and web3 startups. We back bold entrepreneurs building the next generation of the internet (what many call web3), which unlocks a new wave… · Shared by 11, including 瑞拿頭
cure53.de
Cure53
13+ min · · News Wed 20 Sep 2017, 08:41:21 CEST For over 100 days, seven Cure53 researchers dedicated their efforts to a large-scale project resulting in the publication of the Cure53 Browser Security White Paper… · Shared by 10, including 瑞拿頭
rump2007.cr.yp.to
On the Possibility of a Back Door in the NIST SP800-90 Dual…
· Shared by 4, including 瑞拿頭