176
-1
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
177
1
submitted 2 years ago by altair222@beehaw.org to c/security@lemmy.ml

Scammers are taking advantage of people downloading authentication apps after #ElonMusk made SMS two-factor identification a #Twitter blue premium feature.

I suggest using #Authy or the #Google Authenticator app. - darnell@one.darnell.one

178
-2
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
179
-2
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
180
1
submitted 2 years ago by altair222@beehaw.org to c/security@lemmy.ml
181
1
submitted 2 years ago by altair222@beehaw.org to c/security@lemmy.ml
182
1
submitted 2 years ago by altair222@beehaw.org to c/security@lemmy.ml
183
0
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
184
1
submitted 2 years ago by Helix@feddit.de to c/security@lemmy.ml
185
1
submitted 2 years ago by cypherpunks@lemmy.ml to c/security@lemmy.ml

https://www.openssh.com/txt/release-9.2

note: SSH preauth bugs are pretty exciting but, tldr, most distros haven't shipped 9.1 yet anyway.

186
1
submitted 2 years ago by Ordoviz@lemmy.ml to c/security@lemmy.ml

Demonstrating how easy it is to get hacked

187
1
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
188
1
Elliptic Curves: The Great Mystery (www.cantorsparadise.com)

A surprisingly great introduction to elliptic curves that scratches the surface of their use in security.

189
1
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
190
2
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
191
1
There is no secure software supply-chain. (onengineering.substack.com)
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
192
1
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
193
1
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
194
1
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
195
1
submitted 2 years ago by lemmyreader@lemmy.ml to c/security@lemmy.ml
196
1
submitted 2 years ago by lemmyreader@lemmy.ml to c/security@lemmy.ml
197
2
submitted 2 years ago by yogthos@lemmy.ml to c/security@lemmy.ml
198
1
199
2
submitted 2 years ago by lemmyreader@lemmy.ml to c/security@lemmy.ml
200
1
submitted 2 years ago by lemmyreader@lemmy.ml to c/security@lemmy.ml
view more: ‹ prev next ›

Security

4987 readers
2 users here now

Confidentiality Integrity Availability

founded 4 years ago
MODERATORS