Sign Up
Welcome home! Here at WTMX you can make new friends and meet people with the same interests as you. All free and ad-free.
Information Security
Internet & Technology
Information Security shared a link
Unveiling the Anonymous Author: Stylometry Techniques
Reveal an anonymous author of a text using stylometry techniques.
Information Security shared a link
Hackers leak 190GB of alleged Samsung data, source code
The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company.
Information Security shared a link
> “We weren’t able to crack homomorphic encryption using mathematical tools,” says Aydin Aysu, senior author of a paper on the work and an assistant professor of computer engineering at North Carolina... View More
Researchers Show They Can Steal Data During Homomorphic Encryption
Homomorphic encryption is considered a next generation data security technology.
Information Security shared a link
"Go the fuck back to Russia," tweeted the hackers.
Anonymous says Russia’s spy satellites are now hacked. But the nation denies everything
Russia was quick to deny Anonymous’ claims that they have hacked Russian space agency Roscosmos and severed their connection to Russia’s spy satellites.
Information Security shared a link
Never Change Your Password - TidBITS
Many websites advise you to change your password routinely. That advice is nearly universally wrong: you should only update a password when there’s a weakness. Why does it persist?
Rodrigo RM likes this.
Information Security shared a link
> So, NVIDIA, the choice is yours! Either: Officially make current and all future drivers for all cards open source, while keeping the Verilog and chipset trade secrets... well, secret OR Not make the... View More
Cybercriminals who breached Nvidia issue one of the most unusual demands ever
Chipmaker has until Friday to comply or see its crown-jewel source code released.
Information Security shared a link
A Closer Look at the Russian Actors Targeting Organizations in Ukraine
In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations that occurred in A Closer Look at the Russian Actors Targeting Organ...
Information Security shared a link
Piercing the Cloud Armor - The 8KB bypass in Google Cloud Platform WAF
Google Cloud Armor provides a rule-based policy framework that can be used by customers of the Google Cloud Platform to mitigate various types of common web application attacks. The Cloud Armor servic...
Information Security shared a link
> We’ve discovered an active network of sophisticated crypto attacks chaining the most prominent brands and targeting the MetaMask wallet. These malicious actors have already siphoned hundreds of thou... View More
How to lose all your money in the Metaverse (before even getting started)
By Avihay Kain & Efrat Tabibi, Security Research at Guardio.
crusader of southerland likes this.
Information Security shared a link
Ukrainian startup is offering hackers $100,000 to bring down Russian websites
Cybersecurity company Cyber Unit Technologies has officially launched its global ‘hackathon’ calling for volunteers to help expose Russian software vulnerabilities.
Destiny Blue likes this.