Please upgrade your browser to make full use of twiends.   chrome   firefox   ie   safari  
Create your own wall, sign in free!
acid:dental
Errata Security: Bash bug as big as Heartbleed: blog.erratasec.com/2014/09/bash-b…
#Mailpile enters beta—It’s like #Gmail, but you run it on your own computer. #Interesting concept ars.to/1m6mq15
Here's What #Hackers Can Do With Your #CRM Data. onforb.es/1D7wax4 via @Forbes
#NSW #Police use #hacking software to spy on computers and smartphones: #WikiLeaks data theage.com.au/it-pro/governm… via @theage
Turning the tables on “#Windows #Support#scammers by compromising their PCs. Well done, I salute. ars.to/1rUHJ1Z
Advice from a Real #Hacker: How to Protect Yourself from Being #Hacked null-byte.wonderhowto.com/how-to/advice-…
#iPwned: How easy is it to mine #Apple services, devices for data? ars.to/1xzzu3D
#Privacy #Vulnerabilities In #Coursera, Including #Exposed Email Addresses. Just like an open CV with some extra. rpx.me/Uewv
That #nudity #hack scandal ... I wonder if the actresses sees a rise in popularity after this?
#Hackers Break Into #HealthCaregov. Looking into the U.S. we might see the same problem in #Norway and elsewhere rpx.me/68vv
The #Police Tool That #Pervs Use to Steal #Nude Pics From #Apple’s iCloud | Threat Level | WIRED wired.com/2014/09/eppb-i…
Out in the Open: #Hackers Build a #Skype That’s Not Controlled by #Microsoft | Enterprise | WIRED wired.com/2014/09/tox/
#Hackers Behind Biggest-Ever Password Theft Begin Attacks classic.slashdot.org/story/14/09/01… via @slashdot
These 3-D Printed #Skeleton Keys Can Pick High-Security Locks in Seconds. wired.com/2014/08/3d-pri…
#Android #attack improves timing, allows data theft. ars.to/1oZp4FV
Your #Anonymous Posts to Secret Aren’t Anonymous After All. Oh we're safe. Don't mind the open door wired.com/2014/08/secret/
Future #Hack: New #Cybersecurity Tool Predicts Breaches Before They Happen rpx.me/Irev
Researchers find it’s terrifyingly easy to #hack traffic lights ars.to/1pNYRsJ
Latest Gameover botnet lays low, looking to resist takedown ars.to/YAN6MC
The Most Wanted Man in the World: Edward #Snowden in His Own Words . Long ass article. #TLDR warning. wired.com/2014/08/edward…
#NSA Internet #Metadata Program Collected More Than Was Allowed, Shared Data Too Broadly techcrunch.com/2014/08/12/nsa… via @TechCrunch
Turns Out Your Complex #Passwords Aren’t That Much Safer. wired.com/2014/08/passwo…
Meet WordHound, the tool that puts a personal touch on password cracking ars.to/1q1DnVI
How to Use Your #Cat to #Hack Your Neighbor’s Wi-Fi | Threat Level | WIRED wired.com/2014/08/how-to…
#Hacking is simple, says author claiming role in breach of #spyware firm ars.to/1q1CxIA
Critical #WordPress plugin bug affects hundreds of thousands of sites ars.to/1kpM9Ac
#CIA’s venture firm security chief: US should buy zero-days, reveal them ars.to/1sy0v2O
Smart Building Technologies Could Expose Companies To A New Breed Of Cyber Attack techcrunch.com/2014/08/05/sma… via @TechCrunch
#PayPal 2FA is easily bypassed, teenage #whitehat #hacker says ars.to/1pAI2k4
#Critical code execution bug in #Samba gives attackers superuser powers ars.to/1qUbYvd
Visit the Wrong Website, and the #FBI Could End Up in Your Computer | Threat Level | WIRED wired.com/2014/08/operat…
Norwegian 17 year old teenager responsible for Ddosing #dnb arrested. Translated content follows: translate.google.com/translate?sl=n…
Your favorite #mobile apps leave a trail of #cookie crumbs. I only use apps I hate, I'm secure. ars.to/1jeihWW
#Crypto certificates impersonating #Google and #Yahoo pose threat to #Windows users. But was the impersonating funny? ars.to/1xUUvCI
#Avast Buys 20 Used Phones, Recovers 40,000 Deleted Photos. All your pr0n belongs to us @slashdot rpx.me/iJpu
#DHS Mistakenly Releases 840 Pages of Critical Infrastructure Documents @slashdot rpx.me/fJpu
#Norwegian #tech site interviewing #Anonymous Norway re: latest attacks. Translated content. translate.google.com/translate?sl=n…
The Ex #Google #Hacker Taking on the World’s #Spy Agencies | Threat Level | WIRED wired.com/2014/07/morgan…
How #Google Map #Hackers Can Destroy a Business at Will | Business | WIRED wired.com/2014/07/hackin…
“Weaponized” #exploit can steal sensitive user data on #eBay, #Tumblr, et al. ars.to/VVAxdJ
#Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords. ars.to/1zktfPL