A space for sharing and discussing news related to global current events, technology, and society.
59601 Members
See All
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
A space for sharing and discussing news related to global current events, technology, and society.
59601 Members
See All
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
0
158
0
158
"A case that began with a feud in the United Arab Emirates, stretched from the U.S. to India and is now playing out in the British courts offers a rare glimpse into the anatomy of a hack-and-leak _...Read More_
"A case that began with a feud in the United Arab Emirates, stretched from the U.S. to India and is now playing out in the British courts offers a rare glimpse into the anatomy of a hack-and-leak _...Read More_
0
4.4
0
4.4
>"In addition to stealing money in the form of cryptocurrency investments, the scammers can use fake apps to even gain access to victims’ iPhones"
>"In addition to stealing money in the form of cryptocurrency investments, the scammers can use fake apps to even gain access to victims’ iPhones"
0
455
0
455
Governor also threatens to sue paper for finding flaw that exposed teachers' SSNs.
Governor also threatens to sue paper for finding flaw that exposed teachers' SSNs.
17
14K
17
14K
Cyberspace” was once celebrated as a public, non-tracked space that afforded users freedom of anonymity. How did individual tracking of users come to dominate the web _...Read More_
Cyberspace” was once celebrated as a public, non-tracked space that afforded users freedom of anonymity. How did individual tracking of users come to dominate the web _...Read More_
0
281
0
281
0
36.4
0
36.4
"Speaking to Gizmodo, Epik said they were unaware that they had been hacked, but would investigate."
"Speaking to Gizmodo, Epik said they were unaware that they had been hacked, but would investigate."
0
0.38
0
0.38
0
186
0
186
Hackers continue to exploit publicly known—and often dated—software vulnerabilities.
Hackers continue to exploit publicly known—and often dated—software vulnerabilities.
1
0.06
1
0.06
>"Hackers with suspected ties to China penetrated the New York transit agency’s computer systems in April, an M.T.A. document shows. Transit officials say the intrusion _...Read More_
>"Hackers with suspected ties to China penetrated the New York transit agency’s computer systems in April, an M.T.A. document shows. Transit officials say the intrusion _...Read More_
1
17.5
1
17.5
>"As the ransomware industry exploded, a Russian-speaking outfit called DarkSide offered would-be computer crooks not just the tools, but also customer _...Read More_
>"As the ransomware industry exploded, a Russian-speaking outfit called DarkSide offered would-be computer crooks not just the tools, but also customer _...Read More_
0
20.8
0
20.8
>"A hacking of a major pipeline, the latest evidence of the nation’s vulnerabilities to cyberattacks, prompted questions about whether the administration _...Read More_
>"A hacking of a major pipeline, the latest evidence of the nation’s vulnerabilities to cyberattacks, prompted questions about whether the administration _...Read More_
0
18.1
0
18.1
>"Following years of wrist slaps under President Donald J. Trump, the new measures are designed to have a noticeable impact on the Russian economy."
>"Following years of wrist slaps under President Donald J. Trump, the new measures are designed to have a noticeable impact on the Russian economy."
0
51.9
0
51.9
Chinese hackers targeted Uyghur activists and journalists living in the United States in an attempt to spy on them, an investigation by security staff at Facebook has found.
Chinese hackers targeted Uyghur activists and journalists living in the United States in an attempt to spy on them, an investigation by security staff at Facebook has found.
59
12.1K
59
12.1K
>"Motherboard has found that SMS redirect services, often aimed toward businesses, can be used by hackers to silently read a victim’s _...Read More_
>"Motherboard has found that SMS redirect services, often aimed toward businesses, can be used by hackers to silently read a victim’s _...Read More_
0
15.7
0
15.7
[https://arstechnica.com/?p=1748489](https://arstechnica.com/?p=1748489) >"Cloud-based camera service Verkada exposed hardcoded password—and its customers."
[https://arstechnica.com/?p=1748489](https://arstechnica.com/?p=1748489) >"Cloud-based camera service Verkada exposed hardcoded password—and its customers."