Search took 0.70 seconds

Search for '#security' in texts

User avatar
» posted to job-for-human

Olia Vysotskaya on LinkedIn: #python #remote #fulltime "Друзья! Ищем Sr. Python Developer для remote full-time работы над безопасным корпоративным мессенджером Worldr

Comment

Подробнее о вакансии: https://lnkd.in/d5GinNB Пишите мне в Telegram @OlgaVisotskaya #python #remote #fulltime #messenger #cryptography #security

 ‎· Ітоги подвєдьом
Comment

12 по вертикали, безопасный корпоративный мессенджер на питоне, 6 букв, 5 согласных, последняя r

 ‎· и это всё, что ждёте от поэта 5
User avatar

MS collect suspicious binaries from machines running Windows and then run them inside MS to analyze their behavior. «It is quite common that even in isolated environments, many of the Microsoft IP address ranges are whitelisted to make sure systems will stay up to date» + «Make your spyware collect & encrypt data into a (new and unknown) binary and execute it, relying on the fact that Microsoft will exfiltrate it for you. When that binary itself is run (within MS' premises) it will then reach out to you with its embedded data.» #security #link https://news.ycombinator.com/item?id=21180019

User avatar

#blasfrompast 3 years ago: On #WebKit #Security Updates – Michael Catanzaro https://bit.ly/20r8yBG

Comment

time to re-read rest of #webkit stuff https://blogs.gnome.org/mcatanzaro/category/igalia/webkit/

 ‎· Ітоги подвєдьом
User avatar

The #security guy handed everyone a mechanical shutter to glue on the laptop camera opening. I feel like I'm working in a no-nonsense company.

Comment

no-nonsense laptops come with one built-in

 ‎· poaster oven 4
11 more comments
Comment

@1master: в zoom это можно выключить в настройках. И сразу становится удобно

 ‎· .0_0. 2
User avatar

You Gave #Facebook Your Number For #Security. They Used It For #Ads. (by Gennie Gebhart for EFF) http://bit.ly/2RMJ14l

Comment

"Add “a phone number I never gave Facebook for targeted advertising” to the list of deceptive and invasive ways Facebook makes money off your personal information. Contrary to user expectations and Facebook representatives’ own previous statements, the company has been using contact information that..."

 ‎· Ітоги подвєдьом 1
User avatar

S.C. Mom Says #Baby #Monitor Was Hacked; Experts Say Many Devices Are #Vulnerable : The Two-Way : @NPR https://n.pr/2sCWpgy

Comment

#IoT #security

 ‎· Ітоги подвєдьом
Comment

Far from the first time this has happened, sadly. There's no way I'd be using a net-enabled baby monitor. Just use analog like my parents did (basically radio).

 ‎· Spidra Webster 2
Comment

my main point was -- it's already here, and probability it hits _you_ too, is not that low.

 ‎· Ітоги подвєдьом
User avatar

As one of the leading #security #services #companies in #California https://lnkd.in/fCdhCQz

User avatar

#solar #energy solutions, #LED #lighting solutions, #surveillance and #security solutions Provided #Listing - https://lnkd.in/f8JrRS8

User avatar

«But in distinction to containers it [a chroot jail] is a #security solution, just like a gun is a self-defense solution. Whereas containers are no more a security solution than metallurgy is a self-defensive solution.» (https://news.ycombinator.com/item?id=13513954) #quote #link

User avatar

«We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small (i.e., requires as little as one gate) and stealthy (i.e., requires an unlikely trigger sequence before effecting a chip’s functionality). In the open spaces of an already placed and routed design, we construct a circuit that uses capacitors to siphon charge from nearby wires as they transition between digital values. ... We weaponize this attack ... by attaching the capacitor to a wire controllable and by selecting a victim flip-flop that holds the privilege bit for our processor.» (http://static1.1.sqspcdn.com/static/f/543048/26931843/1464016046717/A2_SP_2016.pdf?token=QVYpmXbTtK1pgzh+a+dhrSOfL0c= PDF warning) #hardware #security #analog #tinfoil

Comment

добрые они

 ‎· и это всё, что ждёте от поэта 1
User avatar

On #WebKit #Security Updates – Michael Catanzaro http://bit.ly/20r8yBG

Comment

boring reading without pictures but ...

 ‎· Ітоги подвєдьом
User avatar
» from archive

Broadband routers: SOHOpeless and vendors don't care • via @TheRegister http://bit.ly/1F1XDmA #security #SOHO

User avatar
» from archive

Some #fun with older #FitBit (PDF doc) http://bit.ly/13etoZp #security #research

User avatar
» from archive

Lorem Ipsum: Of Good & Evil, #Google & #China by @briankrebs http://bit.ly/1pFS9VF #security

User avatar
» from archive

Could Hacked #Energy Devices Have a Cascading Impact on the Grid? http://feedly.com/e/L5PJxxJB #security #IoT

User avatar
» from archive

Watch #security #privacy #gaze #fear http://tmblr.co/Z0Emay1KHhIZ0 by @real_mkk

User avatar
» from archive

Hackers Lurking in Vents and Soda Machines http://nyti.ms/1kBQwU1 #greed #corporations #security

User avatar
» from archive

WPA2 #wireless #security cracked http://bit.ly/1diOcTF

Comment

«It is the de-authentication step in the wireless setup that represents a much more accessible entry point for an intruder with the appropriate hacking tools. As part of their purported security protocols routers using WPA2 must reconnect and re-authenticate devices periodically and share a new key each time. The team points out that the de-authentication step essentially leaves a backdoor unlocked albeit temporarily. Temporarily is long enough for a fast-wireless scanner and a determined intruder.»

 ‎· 9000
Comment

Make sure all your important traffic is encrypted on the application level.

 ‎· 9000
User avatar
» from archive

#Security as a public health discipline, not an engineering one @BoingBoing http://bit.ly/PwtaWO

User avatar
» from archive

#hash - How does processor architecture affect password hashing speed? #Information #Security @StackExchange http://bit.ly/1bYidHC

User avatar
» from archive

How do certification authorities store their private root keys? http://bit.ly/13FEYWf #crl #ssl #security

User avatar
» from archive

How do certification authorities store their private root keys? http://bit.ly/13FEYWf #crl #ssl #security

User avatar
» from archive

«Engineers as a rule dislike secrets. I'm a #security person, and I still don't like them, because every #secret is a point of failure in a system.» (from internal communication)

User avatar
» from archive

«Analysing HTC devices, security specialist Nils found that the integrated web browser has the right to install further packages. Nils says that HTC integrated this functionality so that the browser can automatically update its Flash Lite plug-in» - http://www.h-online.com/open/news/item/Android-holes-allow-secret-installation-of-apps-1134940.html

Comment

On #Android, #Flash adds #security holes even when not directly used. That's what bad karma is.

 ‎· 9000

1 2 3 4 5 6 7 8 9 10