- Elliptic Curves Yield Their Secrets in a New Number System
- On the trail of the Dark Avenger: the most dangerous virus writer in the world
- How to Check Your Devices for Stalkerware
- Three ways AI chatbots are a security disaster
- The Untold Story of the Boldest Supply-Chain Hack Ever
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. Head to https://brilliant.org/veritasium to st...
The future is passwordless! Learn all about Passkeys, the technology set to replace traditional passwords. The best part?! You can start using them today! We...
Shared by 148, including L. Taylor Banks, Kevin Marks 🏠kevinmarks.com xoxo.zone/@KevinMarks, Mark Kaigwa, ɐpuɐʎᴉW ᴉʇɐʍɥǝN, Meltem Demirors
Introduction to embedded devices, firmware of Reolink RLC 810A, and first steps with binwalk.
This post is the first in a series by Unit 42 covering the cybercrime underground. We'll explore actors, motivations, and the current threat landscape.
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
Netflix, Spotify, Twitter, PayPal, Slack. All down for millions of people. How a group of teen friends plunged into an underworld of cybercrime and broke the internet—then went to work for the FBI.
Zelle now shielding users from the most reported scam in payments.
Shared by 64
A tool to help information security teams better address the range of cyber- and business-related risks their organizations grapple daily.
Ana Caraiani and James Newton have extended an important result in number theory to the imaginary realm.
A sufficiently powerful quantum computer could render our leading cryptographic schemes worthless—the big question is when that's likely to happen.
The TETRA standard is used in radios worldwide. Security researchers have found multiple vulnerabilities in the underlying cryptography and its implementation, including issues that allow for the…
Large language models are full of security vulnerabilities, yet they’re being embedded into tech products on a vast scale.
Tired of relying on Big Tech to enable collaboration, peer-to-peer enthusiasts are creating a new model that cuts out the middleman. (That’s you, Google.)
The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
The country has developed a lucrative speciality: cyberattacks for hire.
The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.
Meet Window Snyder, a veteran hacker and cybersecurity pro who has helped companies like Microsoft, Mozilla, and Apple be more secure.
Key-leaking side channels are a fact of life. Now they can be done by video-recording power LEDs.
Creator of @haveibeenpwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.
Since 1926, the trusted advisor to the world's leading businesses, governments, and institutions. 130+ offices in 65+ countries.
the real hidden features are the friends we made along the way．forbes 30u30．🇭🇰×🇯🇵．eng @instagram
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
The undercurrents of the future. The OneZero team at @Medium publishes stories about tech and science from Debugger, Future Human, and our namesake publication.
How does Refind curate?
It’s a mix of human and algorithmic curation, following a number of steps:
- We monitor 10k+ sources and 1k+ thought leaders on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
- In addition, our users save links from around the web using our Save buttons and our extensions.
- Our algorithm processes 100k+ new links every day and uses external signals to find the most relevant ones, focusing on timeless pieces.
- Our community of active users gets the most relevant links every day, tailored to their interests. They provide feedback via implicit and explicit signals: open, read, listen, share, mark as read, read later, «More/less like this», etc.
- Our algorithm uses these internal signals to refine the selection.
- In addition, we have expert curators who manually curate niche topics.
The result: lists of the best and most useful articles on hundreds of topics.
How does Refind detect «timeless» pieces?
We focus on pieces with long shelf-lives—not news. We determine «timelessness» via a number of metrics, for example, the consumption pattern of links over time.
How many sources does Refind monitor?
We monitor 10k+ content sources on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
Who are the thought leaders in Cybersecurity?
We follow dozens of thought leaders in Cybersecurity, including Troy Hunt, McKinsey & Company, Jane Manchun Wong, Threatpost, OneZero.
Missing a thought leader? Submit them here
Can I submit a link?
Indirectly, by using Refind and saving links from outside (e.g., via our extensions).
How can I report a problem?
When you’re logged-in, you can flag any link via the «More» (...) menu. You can also report problems via email to firstname.lastname@example.org
Who uses Refind?
400k+ smart people start their day with Refind. To learn something new. To get inspired. To move forward. Our apps have a 4.9/5 rating.
Is Refind free?
Yes, it’s free!
How can I sign up?
Head over to our homepage and sign up by email or with your Twitter or Google account.