A space for sharing and discussing news related to global current events, technology, and society.
69353 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
A space for sharing and discussing news related to global current events, technology, and society.
69353 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
Relevant
Hot
New
Spam
Relevant
Hot
New
Spam
0
31.9
0
31.9
>"The European Parliament's website was unavailable for several hours on Wednesday due to a denial-of-service attack _...Read More_
>"The European Parliament's website was unavailable for several hours on Wednesday due to a denial-of-service attack _...Read More_
0
283
0
283
“The message to criminals is clear: Cryptocurrency is not a safe haven. We can and we will follow the money, no matter what form it takes."
“The message to criminals is clear: Cryptocurrency is not a safe haven. We can and we will follow the money, no matter what form it takes."
0
132
0
132
"The FBI secretly purchased Pegasus Spyware and explored hacking U.S Phones.Israel used the NSO Group’s software as a tool of diplomacy. The F.B.I. wanted it for domestic surveillance. Then everything soured."
"The FBI secretly purchased Pegasus Spyware and explored hacking U.S Phones.Israel used the NSO Group’s software as a tool of diplomacy. The F.B.I. wanted it for domestic surveillance. Then everything soured."
0
21.5
0
21.5
CNN: How the Biden administration plans to protect your water systems from hackers. >"The Biden administration will help deliver cyber defense _...Read More_
CNN: How the Biden administration plans to protect your water systems from hackers. >"The Biden administration will help deliver cyber defense _...Read More_
0
118
0
118
Microsoft warned on Saturday evening that it had detected a highly destructive form of malware in dozens of government and private computer networks in Ukraine that appeared to be waiting to be triggered by an unknown actor.
Microsoft warned on Saturday evening that it had detected a highly destructive form of malware in dozens of government and private computer networks in Ukraine that appeared to be waiting to be triggered by an unknown actor.
0
493
0
493
"Hackers are already exploiting vulnerability to steal data and credentials, and to install crypto miners in affected systems, tech companies say"
"Hackers are already exploiting vulnerability to steal data and credentials, and to install crypto miners in affected systems, tech companies say"
0
295
0
295
CNN: Suspected Chinese hackers breach more US defense and tech firms. >"A suspected Chinese hacking campaign has breached four more US defense _...Read More_
CNN: Suspected Chinese hackers breach more US defense and tech firms. >"A suspected Chinese hacking campaign has breached four more US defense _...Read More_
0
474
0
474
0
425
0
425
0
1.6
0
1.6
>"The Federal Bureau of Investigations has confirmed it was aware and actively looking into reports about tens of thousands of fake cyber attack warnings, sent from one of _...Read More_
>"The Federal Bureau of Investigations has confirmed it was aware and actively looking into reports about tens of thousands of fake cyber attack warnings, sent from one of _...Read More_
0
158
0
158
"A case that began with a feud in the United Arab Emirates, stretched from the U.S. to India and is now playing out in the British courts offers a rare glimpse into the anatomy of a hack-and-leak _...Read More_
"A case that began with a feud in the United Arab Emirates, stretched from the U.S. to India and is now playing out in the British courts offers a rare glimpse into the anatomy of a hack-and-leak _...Read More_
0
4.4
0
4.4
>"In addition to stealing money in the form of cryptocurrency investments, the scammers can use fake apps to even gain access to victims’ iPhones"
>"In addition to stealing money in the form of cryptocurrency investments, the scammers can use fake apps to even gain access to victims’ iPhones"
0
455
0
455
0
14K
0
14K
Cyberspace” was once celebrated as a public, non-tracked space that afforded users freedom of anonymity. How did individual tracking of users come to dominate the web _...Read More_
Cyberspace” was once celebrated as a public, non-tracked space that afforded users freedom of anonymity. How did individual tracking of users come to dominate the web _...Read More_
0
281
0
281