jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net TechSec
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

TechSec

unsubscribesubscribe34,587 readers

~3 users here now

Information Security Technology sub. For resources, news, memes, and community.

Please review the rules before participating.

Affiliates

s/Techgore

created by BackwardsCompatiblea community for 3 years
message the moderators

MODERATORS

  • BackwardsCompatible
  • moderation team • moderation log

2
-

Mystique in the House: The Droid Vulnerability Chain that Owns All Your Applications

submitted 5 hours ago by GeorgeCarlin from dawnslab.jd.com

  • comment
loading...

2
-

Execution Unit Scheduler Contention Side-Channel Vulnerability on AMD Processors (SQUIP)

submitted 2 days ago by GeorgeCarlin from amd.com

  • comment
loading...

2
-

AEPIC Leak

submitted 2 days ago by GeorgeCarlin from aepicleak.com

  • comment
loading...

2
-

i would love a free robot wife

submitted 16 days ago by yelgy from self.TechSec

  • 4 comments
loading...

8
1

An FCC commissioner calls on Apple and Google to remove TikTok from their app stores, saying it's a national security risk

submitted 1 month ago by cottoneyejoe from businessinsider.com

  • 2 comments
loading...

9
1

TikTok Is China’s Trojan Horse

submitted 1 month ago by cottoneyejoe from nationalreview.com

  • 8 comments
loading...

4
-

How to Enable Global Privacy Control

submitted 1 month ago by cottoneyejoe from firewallsdontstopdragons.com

  • comment
loading...

3
-

Deepfakes Can Fool Biometric Checks Used By Banks, Research Finds

submitted 2 months ago by asterias from greatgameindia.com

  • comment
loading...

2
-

iPhone Cracked Screen Repair Bournemouth

submitted 3 months ago by andresapplerepairs from andresapplerepairs.co.uk

  • comment
loading...

1
-

Scalability Challenges In IoT

submitted 4 months ago by YugasaSoftwareLabs from yugasa.com

  • 1 comment
loading...

2
-

TriggerMesh - Cloud-native serverless integration

submitted 5 months ago by markhinkle from triggermesh.com

  • comment
loading...

1
-

A Thin Client as a Very Inexpensive Low-Power Home Theater PC

submitted 7 months ago by gebTA48 from cheapskatesguide.org

  • 1 comment
loading...

2
-

PrivacyTools - Encryption Against Global Mass Surveillance

submitted 10 months ago by cottoneyejoe from privacytools.io

  • 2 comments
loading...

3
1

ProtonMail Logged IP Addresses For The Government! Can You Still Trust Them? -Surveillance Report 54

submitted 11 months ago by lastwords from youtu.be

  • 2 comments
loading...

1
-

Guide to Digital Identity Verification

submitted 11 months ago by Louis23 from loginradius.com

  • comment
loading...

1
1

YubiKey 4C vs. Nitrokey Pro: Stalemate

submitted 11 months ago by LarrySwinger2 from web.archive.org

  • 1 comment
loading...

2
-

Future of CMS Industry: Facts, Figures, Trends and Statistics

submitted 11 months ago by stephen110 from openxcell.com

  • comment
loading...

1
-

Striking the balance between CX and Security

submitted 1 year ago by lynncobb12 from lnkd.in

  • comment
loading...

1
-

How to handle risks after a data breach?

submitted 1 year ago by lynncobb12 from loginradius.com

  • comment
loading...

1
-

Effective ways to scale your business using Modern IAM

submitted 1 year ago by lynncobb12 from loginradius.com

  • comment
loading...

1
-

Token Auth- Pros and Cons

submitted 1 year ago by lynncobb12 from loginradius.com

  • comment
loading...

1
1

What to do with these cards?

submitted 1 year ago by soap39524 from self.TechSec

  • 4 comments
loading...

1
-

To find out how to get Cash App Refund from the application in cash?

submitted 1 year ago by brayden95400 from experts-support.com

  • comment
loading...

1
-

How does Cash App really give away money if bank subtleties added? Dial helpline number to find maintain.

submitted 1 year ago by brayden95400 from experts-support.com

  • comment
loading...

12
4

TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch

submitted 1 year ago by asterias from techcrunch.com

  • 4 comments
loading...

2
-

Technology Against Human Rights: Cellebrite’s Surveillance Software

submitted 1 year ago by BillyMildish from thebattleground.eu

  • comment
loading...

14
13

Best Programming Languages to Learn in 2021

submitted 1 year ago by jamessidis from learnandmakeit.com

  • 2 comments
loading...

3
1

Is AdGuard Safe to Use?

submitted 1 year ago by Oppossum from utopia.fans

  • 1 comment
loading...

1
-

Introduction to Design Systems for UX/UI Designers

submitted 1 year ago by AfifaVora from hackernoon.com

  • 1 comment
loading...

4
-

Is a Self-Encrypting Drive Necessary for You?

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Chinese Hackers Carry Out Attacks on Linux

submitted 1 year ago by Oppossum from utopia.fans

  • 1 comment
loading...

1
-

Designing for iPhone X Screen Dimensions: 9 Tips for a Great UX

submitted 1 year ago by AfifaVora from hackernoon.com

  • comment
loading...

2
1

Okta acquires Auth0

submitted 1 year ago by scottrobin from loginradius.com

  • comment
loading...

2
-

How to protect unified cloud?

submitted 1 year ago by scottrobin from loginradius.com

  • comment
loading...

2
-

The Danger of Social Engineering to Watch Out For

submitted 1 year ago by Oppossum from utopia.fans

  • 1 comment
loading...

2
-

A Full Guide to Cybersecurity Framework

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

1
-

Safety Guide: What Is an Anonymizer gadget?

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

3
1

Is Advanced SystemCare safe?

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

The Danger of the Secured Search Extension

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

11
2

Misuse of Israeli Surveillance Tech for Massive Violation of Human Rights

submitted 1 year ago by nsopegasusyou from self.TechSec

  • comment
loading...

3
-

Secure and Anonymous P.O. Box: The Most Reliable Options

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

5
1

Cybersecurity Day: Let’s Celebrate All Together!

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

What banks can do to protect clients from Pegasus spyware?

submitted 1 year ago by lastwords from self.TechSec

  • comment
loading...

3
-

What is Phishing and How Do You Prevent It?

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

5
-

Artificial Intelligence, Machine Learning, and Deep Learning ( Complete Guide )

submitted 1 year ago by jamessidis from learnandmakeit.com

  • comment
loading...

4
-

How Artificial Intelligence Transforming Businesses

submitted 1 year ago by jamessidis from jamessidis.medium.com

  • comment
loading...

5
-

Security Posture Methods You Should Follow

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

9
2

One in ten shopping ads promoted on Google potentially lead to phishing sites

submitted 1 year ago by BeatFour444 from cybernews.com

  • 4 comments
loading...

2
-

Essential Security Metrics You Should Track

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

3
-

The Issue of Cyber Resilience

submitted 1 year ago by Oppossum from utopia.fans

  • 1 comment
loading...

2
-

List of Hacked Organizations Tops 200 in SolarWinds Case

submitted 1 year ago by FootballViking from govtech.com

  • 1 comment
loading...

2
-

The Most Famous Hackers of All Time

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Dozens of Al Jazeera journalists targeted in apparent iOS spyware attack

submitted 1 year ago by HearSmarter from theverge.com

  • 2 comments
loading...

25
5

Youtube's blocking of Tor and how to work around it

submitted 1 year ago by LarrySwinger2 from self.TechSec

  • 14 comments
loading...

3
-

Which add blockers works best with twitch new add system?

submitted 1 year ago by Akali from self.TechSec

  • 1 comment
loading...

7
-

Critical Flaws in Millions of IoT Devices May Never Get Fixed

submitted 1 year ago by HearSmarter from wired.com

  • 4 comments
loading...

3
-

Remove “Save Yourself Email” Scam

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Razer keyboard

submitted 1 year ago by iblog from plaza.ir

  • comment
loading...

13
1

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

submitted 1 year ago by HearSmarter from cybernews.com

  • 7 comments
loading...

2
-

Email Security Solutions for 2020

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

30% of top online shopping domains are vulnerable to BEAST SSL attack

submitted 1 year ago by Satircato from cybernews.com

  • comment
loading...

4
-

We infiltrated an IRC botnet. Here’s what we found

submitted 1 year ago by HearSmarter from cybernews.com

  • comment
loading...

2
-

David Geer’s Interview: Cybersecurity Now and In The Future

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

3
1

iOS 14 Has Been Hacked in 10 Seconds

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Privacy in iOS 14: Nine Main Features

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Working Methods of DNS Poisoning Protection

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

2
-

the businesssitebook

submitted 1 year ago by Johnchen969 from self.TechSec

  • comment
loading...

2
-

The Main Difference Between Virus and Worm

submitted 1 year ago by Oppossum from utopia.fans

  • comment
loading...

3
-

"In Complete Shock": China's Lead Chip Maker Denies PLA Military Ties As Trump Mulls Blacklisting

submitted 1 year ago by typhoon from zerohedge.com

  • comment
loading...

3
-

Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide

submitted 1 year ago by LarrySwinger2 from blog.checkpoint.com

  • 1 comment
loading...

11
1

Multiple Tor security issues disclosed, more to come

submitted 2 years ago by quipu from zdnet.com

  • 5 comments
loading...

1
-

If you need any help regarding smart devices then please visit us easily by calling on Toll-Free no.8884030508. Here we will provide our best assistance for your troubles.

submitted 2 years ago by justinmartin from 360smartdevice.blogspot.com

  • comment
loading...

22
3

New ‘Meow’ attack has deleted almost 4,000 unsecured databases

submitted 2 years ago by magnora7 from bleepingcomputer.com

  • 6 comments
loading...

11
3

Garmin obtains decryption key after ransomware attack

submitted 2 years ago by magnora7 from news.sky.com

  • comment
loading...

2
-

Handy Troubleshooting Guide For Ring Doorbell Issues-Smart Device Help

submitted 2 years ago by Jeorgesmith from self.TechSec

  • comment
loading...

1
-

Contact Us To Get Brilliant Assistance On Smart Device 360

submitted 2 years ago by Jeorgesmith from self.TechSec

  • comment
loading...

1
-

Brilliant Assistance On Smart Device 360- Smart Device

submitted 2 years ago by Jeorgesmith from self.TechSec

  • comment
loading...

4
2

Two Chinese Hackers Indicted for Stealing Terabytes of Data Over Eleven Years

submitted 2 years ago by hennaojichan from cryptome.org

  • 1 comment
loading...

7
1

3 interesting features of MySQL I bet you didn't know about

submitted 2 years ago by D0z from d0z.me

  • 1 comment
loading...

2
-

Duckduckgo has Android related problem

submitted 2 years ago by [deleted] from github.com

  • comment
loading...

6
3

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show

submitted 2 years ago by JasonCarswell from youtube.com

  • 6 comments
loading...

2
1

Techno-Tyranny: How The US National Security State Is Using COVID-19 To Fulfill An Orwellian Vision [with Whitney Webb] (32:27) ~ The Last American Vagabond

submitted 2 years ago by JasonCarswell from youtube.com

  • comment
loading...

6
1

How The Android Malware That Survives Factory Reset Works

submitted 2 years ago by LarrySwinger2 from fossbytes.com

  • 5 comments
loading...

2
-

UN, WHO & Mila Map the AI vs COVID-19 Battlefield

submitted 2 years ago by Maruko from medium.com

  • 1 comment
loading...

2
-

India under self-imposed quarantine due to Coronavirus. - InsightsSuccess

submitted 2 years ago by insightsmanoj from insightssuccess.com

  • comment
loading...

1
-

Augmented Training Scheme Fixes CNN Texture Bias

submitted 2 years ago by Maruko from medium.com

  • comment
loading...

1
-

Job Interviews turn Virtual due to Coronavirus

submitted 2 years ago by insightsmanoj from insightssuccess.com

  • comment
loading...

1
-

Airlines hit due to Coronavirus, 25 passengers on a 256 passengers

submitted 2 years ago by insightsmanoj from insightssuccess.com

  • comment
loading...

1
-

Does Samsung’s new Galaxy Z Flip phone mean we’re still hung up on flip phones?

submitted 2 years ago by fanterbanter from screenshot-magazine.com

  • comment
loading...

4
2

CacheOut - Leaking Data on Intel CPUs via Cache Evictions

submitted 2 years ago by Mnemonic from cacheoutattack.com

  • comment
loading...

3
1

Instagram is hiding the number of likes on posts partially because of a ‘Black Mirror’ episode

submitted 2 years ago by supertms38 from themilsource.com

  • comment
loading...

2
-

Introducing BusKill: A Kill Cord for your Laptop

submitted 2 years ago by Drewski from tech.michaelaltfield.net

  • comment
loading...

1
-

Histoire de la langue Bulgare

submitted 2 years ago by hassen_webcom from tradlibre.fr

  • comment
loading...

2
1

Plundervolt [Intel vul.]

submitted 2 years ago by Mnemonic from plundervolt.com

  • comment
loading...

1
-

ATTK of the Pwns: Trend Micro's antivirus tools 'will run malware – if its filename is cmd.exe'

submitted 2 years ago by Mnemonic from theregister.co.uk

  • comment
loading...

12
5

Samsung: Anyone's thumbprint can unlock S10 phone

submitted 2 years ago by Mnemonic from bbc.com

  • 2 comments
loading...

1
-

Cloud Pricing 101: Public vs. Private

submitted 2 years ago by justintime from vexxhost.com

  • comment
loading...

2
-

Why is MEAN Stack for App Development the Smart Choice?

submitted 2 years ago by digifutura from digifutura.com

  • comment
loading...

2
-

Why is UX-UI Design important in Banking & Financial Service?

submitted 2 years ago by digifutura from digifutura.com

  • comment
loading...

1
-

23 Texas Towns Hit by Coordinated Ransomware Attack

submitted 2 years ago by BackwardsCompatible from theverge.com

  • comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2022 SaidIt