A space for sharing and discussing news related to global current events, technology, and society.
69629 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
A space for sharing and discussing news related to global current events, technology, and society.
69629 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
Relevant
Hot
New
Spam
Relevant
Hot
New
Spam
0
21.1K
0
21.1K
Ukraine’s decentralized Internet for the win! “There was a realization that it's a natural, healthy way to organize the network. When you have a variety of traffic exchange points, you have a variety of internet service providers across _...Read More_
Ukraine’s decentralized Internet for the win! “There was a realization that it's a natural, healthy way to organize the network. When you have a variety of traffic exchange points, you have a variety of internet service providers across _...Read More_
10
128
10
128
"Disappointed with the lack of US response to the Hermit Kingdom's attacks against US security researchers, one hacker took matters into his own hands."
"Disappointed with the lack of US response to the Hermit Kingdom's attacks against US security researchers, one hacker took matters into his own hands."
0
50
0
50
>"The data breach apparently includes source code, gamer payouts, and more."
>"The data breach apparently includes source code, gamer payouts, and more."
0
158
0
158
"The anonymous hacker said they were releasing the information to "foster more disruption and competition" in the online video _...Read More_
"The anonymous hacker said they were releasing the information to "foster more disruption and competition" in the online video _...Read More_
0
103
0
103
Amy Coney Barrett argues Supreme Court isn't driven by politics, after being introduced by Mitch McConnell at at event celebrating the anniversary of the McConnell Center.
Amy Coney Barrett argues Supreme Court isn't driven by politics, after being introduced by Mitch McConnell at at event celebrating the anniversary of the McConnell Center.
0
35
0
35
Military-grade Israeli spyware was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives and the fiancee of murdered Saudi journalist Jamal Khashoggi, a global _...Read More_
Military-grade Israeli spyware was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives and the fiancee of murdered Saudi journalist Jamal Khashoggi, a global _...Read More_
0
60.7
0
60.7
"A full fix for the “Half-Double” technique will require rethinking how memory semiconductors are designed."
"A full fix for the “Half-Double” technique will require rethinking how memory semiconductors are designed."
0
14.2
0
14.2
>"The company’s investigation into a Chinese espionage campaign took researchers beyond Facebook’s own platforms."
>"The company’s investigation into a Chinese espionage campaign took researchers beyond Facebook’s own platforms."
0
21.1K
0
21.1K
Im confused. Why would a water treatment facility have remote access? Why would it not have an additional manual authentication aspect? Finally, and most importantly, have these people never watched a Die Hard movie? Cmon.
Im confused. Why would a water treatment facility have remote access? Why would it not have an additional manual authentication aspect? Finally, and most importantly, have these people never watched a Die Hard movie? Cmon.
0
1.3K
0
1.3K
>"This year saw plenty of destructive hacking and disinformation campaigns—but amid a pandemic and a historic election, the consequences have never been graver."
>"This year saw plenty of destructive hacking and disinformation campaigns—but amid a pandemic and a historic election, the consequences have never been graver."
0
73.7
0
73.7
A supply chain attack against IT company SolarWinds has exposed as many as 18,000 companies to Cozy Bear's attacks.
A supply chain attack against IT company SolarWinds has exposed as many as 18,000 companies to Cozy Bear's attacks.
0
245
0
245
Last year, a hacker gave Glenn Greenwald a trove of damning messages between Brazil’s leaders. Some suspected the Russians. The truth was far less boring.
Last year, a hacker gave Glenn Greenwald a trove of damning messages between Brazil’s leaders. Some suspected the Russians. The truth was far less boring.
0
17.2
0
17.2
>"The tool attacks a device’s UEFI firmware—which makes it especially hard to detect and destroy."
>"The tool attacks a device’s UEFI firmware—which makes it especially hard to detect and destroy."
0
0
>"This malware is designed to steal users' personal data such as financial and application data, contact lists, as well as _...Read More_
>"This malware is designed to steal users' personal data such as financial and application data, contact lists, as well as _...Read More_
0
7K
0
7K
"All it took to compromise a smartphone was a single phone call over WhatsApp. The user didn't even have to pick up the phone."
"All it took to compromise a smartphone was a single phone call over WhatsApp. The user didn't even have to pick up the phone."