jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net TechSec
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

TechSec

unsubscribesubscribe35,584 readers

~4 users here now

Information Security Technology sub. For resources, news, memes, and community.

Please review the rules before participating.

Affiliates

s/Techgore

created by BackwardsCompatiblea community for 4 years
message the moderators

MODERATORS

  • BackwardsCompatible
  • moderation team • moderation log

1
-

Emmanuel Katto - eurosport

submitted 2 days ago by mukasaauma from eurosport.com

  • comment
loading...

1
-

AI-Powered Voice Transcription Platform

submitted 5 days ago by emmajohns from penn.ai

  • comment
loading...

5
3

The Cryptographer Who Ensures We Can Trust Our Computers | Quanta Magazine

submitted 23 days ago by boston_blackie from quantamagazine.org

  • comment
loading...

4
-

Skype vulnerability can reveal your IP address, but Microsoft doesn't think it's that bad

submitted 1 month ago by Cancelthis from techspot.com

  • comment
loading...

2
-

Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop

submitted 1 month ago by boston_blackie from osnews.com

  • 1 comment
loading...

1
-

Deepfakes Are Being Used to Circumvent Facial Recognition Systems.

submitted 1 month ago by AlphaXChance from hackread.com

  • comment
loading...

2
-

Android malware

submitted 1 month ago by Kamaltanay from self.TechSec

  • 1 comment
loading...

2
-

ChatGPT Alternatives: Best 10 ChatGPT Platform Providers 2023

submitted 7 months ago by kalyani from trustfirms.com

  • comment
loading...

5
3

Reddit systems were hacked

submitted 7 months ago by [deleted] from old.reddit.com

  • 1 comment
loading...

4
-

Oracle Class-Action Lawsuit: 5 Billion tracked - "Surveillance Machine" complaint filing

submitted 9 months ago by Gaydolf_Titler from docketalarm.com

  • 1 comment
loading...

6
-

Apple turned off a private communication tool in China just before major protests broke out

submitted 10 months ago by chottohen from reclaimthenet.org

  • 1 comment
loading...

2
-

Complete website voor je restaurant

submitted 11 months ago by Jevynl from jevy.nl

  • comment
loading...

2
-

Timing Attacks on WhatsApp, Signal, and Threema can Reveal User Location

submitted 11 months ago by [deleted] from restoreprivacy.com

  • 1 comment
loading...

5
1

Binance hit by $100 million blockchain bridge hack

submitted 11 months ago by [deleted] from techcrunch.com

  • comment
loading...

1
-

Build Your Event App And GO LIVE In Less Than 30 Minutes!

submitted 1 year ago by eventify from i.imgur.com

  • 2 comments
loading...

1
-

Optus notifies customers of cyberattack compromising customer information

submitted 1 year ago by [deleted] from optus.com.au

  • comment
loading...

1
-

The Harly Trojan subscriber in Google Play apps

submitted 1 year ago by [deleted] from kaspersky.com

  • comment
loading...

5
1

Uber hacked, internal systems breached and vulnerability reports stolen

submitted 1 year ago by unbanned from bleepingcomputer.com

  • comment
loading...

5
1

Hacking the PS4 / PS5 through the PS2 Emulator - Part 1 - Escape

submitted 1 year ago by [deleted] from cturt.github.io

  • comment
loading...

2
-

Lenovo: Multi-Vendor BIOS Security Vulnerabilities (September 2022)

submitted 1 year ago by [deleted] from support.lenovo.com

  • comment
loading...

1
-

Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor

submitted 1 year ago by [deleted] from modzero.com

  • comment
loading...

4
1

Mystique in the House: The Droid Vulnerability Chain that Owns All Your Applications

submitted 1 year ago by [deleted] from dawnslab.jd.com

  • comment
loading...

4
-

AEPIC Leak

submitted 1 year ago by [deleted] from aepicleak.com

  • comment
loading...

3
1

Execution Unit Scheduler Contention Side-Channel Vulnerability on AMD Processors (SQUIP)

submitted 1 year ago by [deleted] from amd.com

  • comment
loading...

2
-

i would love a free robot wife

submitted 1 year ago by yelgy from self.TechSec

  • 47 comments
loading...

8
1

An FCC commissioner calls on Apple and Google to remove TikTok from their app stores, saying it's a national security risk

submitted 1 year ago by cottoneyejoe from businessinsider.com

  • 2 comments
loading...

9
1

TikTok Is China’s Trojan Horse

submitted 1 year ago by cottoneyejoe from nationalreview.com

  • 8 comments
loading...

4
-

How to Enable Global Privacy Control

submitted 1 year ago by cottoneyejoe from firewallsdontstopdragons.com

  • comment
loading...

3
-

Deepfakes Can Fool Biometric Checks Used By Banks, Research Finds

submitted 1 year ago by asterias from greatgameindia.com

  • comment
loading...

2
-

iPhone Cracked Screen Repair Bournemouth

submitted 1 year ago by andresapplerepairs from andresapplerepairs.co.uk

  • comment
loading...

1
-

Scalability Challenges In IoT

submitted 1 year ago by YugasaSoftwareLabs from yugasa.com

  • 1 comment
loading...

2
-

TriggerMesh - Cloud-native serverless integration

submitted 1 year ago by markhinkle from triggermesh.com

  • comment
loading...

1
-

A Thin Client as a Very Inexpensive Low-Power Home Theater PC

submitted 1 year ago by gebTA48 from cheapskatesguide.org

  • 1 comment
loading...

3
-

PrivacyTools - Encryption Against Global Mass Surveillance

submitted 2 years ago by cottoneyejoe from privacytools.io

  • 3 comments
loading...

3
1

ProtonMail Logged IP Addresses For The Government! Can You Still Trust Them? -Surveillance Report 54

submitted 2 years ago by lastwords from youtu.be

  • 2 comments
loading...

1
1

YubiKey 4C vs. Nitrokey Pro: Stalemate

submitted 2 years ago by LarrySwinger2 from web.archive.org

  • 1 comment
loading...

2
-

Future of CMS Industry: Facts, Figures, Trends and Statistics

submitted 2 years ago by stephen110 from openxcell.com

  • comment
loading...

1
1

What to do with these cards?

submitted 2 years ago by soap39524 from self.TechSec

  • 4 comments
loading...

1
-

To find out how to get Cash App Refund from the application in cash?

submitted 2 years ago by brayden95400 from experts-support.com

  • comment
loading...

1
-

How does Cash App really give away money if bank subtleties added? Dial helpline number to find maintain.

submitted 2 years ago by brayden95400 from experts-support.com

  • comment
loading...

14
4

TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch

submitted 2 years ago by asterias from techcrunch.com

  • 4 comments
loading...

2
-

Technology Against Human Rights: Cellebrite’s Surveillance Software

submitted 2 years ago by BillyMildish from thebattleground.eu

  • comment
loading...

14
13

Best Programming Languages to Learn in 2021

submitted 2 years ago by jamessidis from learnandmakeit.com

  • 2 comments
loading...

3
1

Is AdGuard Safe to Use?

submitted 2 years ago by Oppossum from utopia.fans

  • 1 comment
loading...

1
-

Introduction to Design Systems for UX/UI Designers

submitted 2 years ago by AfifaVora from hackernoon.com

  • 1 comment
loading...

4
-

Is a Self-Encrypting Drive Necessary for You?

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Chinese Hackers Carry Out Attacks on Linux

submitted 2 years ago by Oppossum from utopia.fans

  • 1 comment
loading...

1
-

Designing for iPhone X Screen Dimensions: 9 Tips for a Great UX

submitted 2 years ago by AfifaVora from hackernoon.com

  • comment
loading...

2
-

The Danger of Social Engineering to Watch Out For

submitted 2 years ago by Oppossum from utopia.fans

  • 1 comment
loading...

2
-

A Full Guide to Cybersecurity Framework

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

1
-

Safety Guide: What Is an Anonymizer gadget?

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
1

Is Advanced SystemCare safe?

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

The Danger of the Secured Search Extension

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

11
2

Misuse of Israeli Surveillance Tech for Massive Violation of Human Rights

submitted 2 years ago by nsopegasusyou from self.TechSec

  • comment
loading...

3
-

Secure and Anonymous P.O. Box: The Most Reliable Options

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

5
1

Cybersecurity Day: Let’s Celebrate All Together!

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

What banks can do to protect clients from Pegasus spyware?

submitted 2 years ago by lastwords from self.TechSec

  • comment
loading...

3
-

What is Phishing and How Do You Prevent It?

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

5
-

Artificial Intelligence, Machine Learning, and Deep Learning ( Complete Guide )

submitted 2 years ago by jamessidis from learnandmakeit.com

  • comment
loading...

4
-

How Artificial Intelligence Transforming Businesses

submitted 2 years ago by jamessidis from jamessidis.medium.com

  • comment
loading...

5
-

Security Posture Methods You Should Follow

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

9
2

One in ten shopping ads promoted on Google potentially lead to phishing sites

submitted 2 years ago by BeatFour444 from cybernews.com

  • 4 comments
loading...

2
-

Essential Security Metrics You Should Track

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
-

The Issue of Cyber Resilience

submitted 2 years ago by Oppossum from utopia.fans

  • 1 comment
loading...

2
-

List of Hacked Organizations Tops 200 in SolarWinds Case

submitted 2 years ago by FootballViking from govtech.com

  • 1 comment
loading...

2
-

The Most Famous Hackers of All Time

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Dozens of Al Jazeera journalists targeted in apparent iOS spyware attack

submitted 2 years ago by HearSmarter from theverge.com

  • 2 comments
loading...

25
5

Youtube's blocking of Tor and how to work around it

submitted 2 years ago by LarrySwinger2 from self.TechSec

  • 14 comments
loading...

3
-

Which add blockers works best with twitch new add system?

submitted 2 years ago by Akali from self.TechSec

  • 1 comment
loading...

7
-

Critical Flaws in Millions of IoT Devices May Never Get Fixed

submitted 2 years ago by HearSmarter from wired.com

  • 4 comments
loading...

3
-

Remove “Save Yourself Email” Scam

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

13
1

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

submitted 2 years ago by HearSmarter from cybernews.com

  • 7 comments
loading...

2
-

Email Security Solutions for 2020

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

30% of top online shopping domains are vulnerable to BEAST SSL attack

submitted 2 years ago by Satircato from cybernews.com

  • comment
loading...

4
-

We infiltrated an IRC botnet. Here’s what we found

submitted 2 years ago by HearSmarter from cybernews.com

  • comment
loading...

2
-

David Geer’s Interview: Cybersecurity Now and In The Future

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
1

iOS 14 Has Been Hacked in 10 Seconds

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Privacy in iOS 14: Nine Main Features

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

Working Methods of DNS Poisoning Protection

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

2
-

the businesssitebook

submitted 2 years ago by Johnchen969 from self.TechSec

  • comment
loading...

2
-

The Main Difference Between Virus and Worm

submitted 2 years ago by Oppossum from utopia.fans

  • comment
loading...

3
-

"In Complete Shock": China's Lead Chip Maker Denies PLA Military Ties As Trump Mulls Blacklisting

submitted 3 years ago by typhoon from zerohedge.com

  • comment
loading...

3
-

Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide

submitted 3 years ago by LarrySwinger2 from blog.checkpoint.com

  • 1 comment
loading...

11
1

Multiple Tor security issues disclosed, more to come

submitted 3 years ago by quipu from zdnet.com

  • 5 comments
loading...

1
-

If you need any help regarding smart devices then please visit us easily by calling on Toll-Free no.8884030508. Here we will provide our best assistance for your troubles.

submitted 3 years ago by justinmartin from 360smartdevice.blogspot.com

  • comment
loading...

22
3

New ‘Meow’ attack has deleted almost 4,000 unsecured databases

submitted 3 years ago by magnora7 from bleepingcomputer.com

  • 6 comments
loading...

11
3

Garmin obtains decryption key after ransomware attack

submitted 3 years ago by magnora7 from news.sky.com

  • comment
loading...

2
-

Handy Troubleshooting Guide For Ring Doorbell Issues-Smart Device Help

submitted 3 years ago by Jeorgesmith from self.TechSec

  • comment
loading...

1
-

Contact Us To Get Brilliant Assistance On Smart Device 360

submitted 3 years ago by Jeorgesmith from self.TechSec

  • comment
loading...

1
-

Brilliant Assistance On Smart Device 360- Smart Device

submitted 3 years ago by Jeorgesmith from self.TechSec

  • comment
loading...

4
2

Two Chinese Hackers Indicted for Stealing Terabytes of Data Over Eleven Years

submitted 3 years ago by hennaojichan from cryptome.org

  • 1 comment
loading...

7
1

3 interesting features of MySQL I bet you didn't know about

submitted 3 years ago by D0z from d0z.me

  • 1 comment
loading...

2
-

Duckduckgo has Android related problem

submitted 3 years ago by [deleted] from github.com

  • comment
loading...

6
3

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show

submitted 3 years ago by JasonCarswell from youtube.com

  • 6 comments
loading...

2
1

Techno-Tyranny: How The US National Security State Is Using COVID-19 To Fulfill An Orwellian Vision [with Whitney Webb] (32:27) ~ The Last American Vagabond

submitted 3 years ago by JasonCarswell from youtube.com

  • comment
loading...

6
1

How The Android Malware That Survives Factory Reset Works

submitted 3 years ago by LarrySwinger2 from fossbytes.com

  • 5 comments
loading...

2
-

UN, WHO & Mila Map the AI vs COVID-19 Battlefield

submitted 3 years ago by Maruko from medium.com

  • 1 comment
loading...

2
-

India under self-imposed quarantine due to Coronavirus. - InsightsSuccess

submitted 3 years ago by insightsmanoj from insightssuccess.com

  • comment
loading...

1
-

Augmented Training Scheme Fixes CNN Texture Bias

submitted 3 years ago by Maruko from medium.com

  • comment
loading...

1
-

Job Interviews turn Virtual due to Coronavirus

submitted 3 years ago by insightsmanoj from insightssuccess.com

  • comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2023 SaidIt