31. | | Free phishing assessment (Duo Insight) (duo.com) |
|
1 point by casca on Sept 3, 2018 | past
|
32. | | Accenture Cyber Threatscape Report 2018 [pdf] (accenture.com) |
|
1 point by casca on Aug 21, 2018 | past
|
33. | | On Doctors, Mechanics, and Computer Specialists: The Economics of Credence Goods [pdf] (uibk.ac.at) |
|
3 points by casca on July 20, 2018 | past
|
34. | | Data Rights Finder – Find, understand and use information from privacy notices (datarightsfinder.org) |
|
2 points by casca on June 29, 2018 | past
|
35. | | Exploiting CVE-2018-1038 – Total Meltdown (xpnsec.com) |
|
1 point by casca on April 30, 2018 | past
|
36. | | Build amazing company culture with Donut (donut.ai) |
|
1 point by casca on April 29, 2018 | past
|
37. | | [dupe] Supreme Court Upholds Patent Office Power to Invalidate Bad Patents (eff.org) |
|
34 points by casca on April 25, 2018 | past | 6 comments
|
38. | | GSMA puts eSIM work 'on hold' due to US collusion investigation (engadget.com) |
|
88 points by casca on April 24, 2018 | past | 61 comments
|
39. | | No “Material Difference Between 5G and LTE” (wirelessone.news) |
|
105 points by casca on April 20, 2018 | past | 152 comments
|
40. | | What a Labor Union Is and How It Works (teenvogue.com) |
|
2 points by casca on March 13, 2018 | past | 1 comment
|
41. | | Encryption 101: How to break encryption (malwarebytes.com) |
|
1 point by casca on March 7, 2018 | past
|
42. | | #Metoo and Why an Abused Person Can't Just Move On (psychologytoday.com) |
|
13 points by casca on March 6, 2018 | past
|
43. | | How to change the course of human history (eurozine.com) |
|
4 points by casca on March 6, 2018 | past
|
44. | | The Open-Office Trap (2014) (newyorker.com) |
|
1 point by casca on March 5, 2018 | past
|
45. | | More Is Less: End-To-End Security of Group Chats In,Signal, WhatsApp and Threema [pdf] (iacr.org) |
|
1 point by casca on Jan 12, 2018 | past
|
46. | | HestiaPi – Open Smart thermostat without the personal data harvesting (hestiapi.com) |
|
2 points by casca on Nov 27, 2017 | past
|
47. | | Sudo – Potential overwrite of arbitrary files on Linux (sudo.ws) |
|
1 point by casca on May 31, 2017 | past
|
48. | | Make your own beautiful logo (logopony.com) |
|
2 points by casca on May 23, 2017 | past
|
49. | | How One Major Internet Company Helps Serve Up Hate on the Web (propublica.org) |
|
5 points by casca on May 8, 2017 | past | 4 comments
|
50. | | Analyzing the DOUBLEPULSAR Kernel DLL Injection Technique (countercept.com) |
|
2 points by casca on April 26, 2017 | past
|
51. | | Inside the crash of Fling, burned through $21M (businessinsider.com) |
|
27 points by casca on Feb 10, 2017 | past
|
52. | | Cisco 2017 Annual Cybersecurity Report [pdf] (cisco.com) |
|
1 point by casca on Feb 5, 2017 | past
|
53. | | Reverse Engineering Cisco ASA for EXTRABACON Offsets (zerosum0x0.blogspot.com) |
|
5 points by casca on Sept 19, 2016 | past
|
54. | | Millions of Wireless Keyboards Can Let Hackers See What You're Typing (gizmodo.com) |
|
2 points by casca on Aug 1, 2016 | past
|
55. | | Social Security Administration Cutting Off Users Who Can’t Receive Text Messages (vortex.com) |
|
2 points by casca on Aug 1, 2016 | past
|
56. | | The celebrity privacy case that exposes hypocrisy of SiliconValley power brokers (theguardian.com) |
|
2 points by casca on May 30, 2016 | past
|
57. | | The Wrong Way to Teach Math (nytimes.com) |
|
1 point by casca on March 6, 2016 | past
|
58. | | IoT Outlook 2015 [pdf] (f5.com) |
|
2 points by casca on Aug 18, 2015 | past
|
59. | | Data-For-Doughnuts Vision Inspires Auto Insurers to Chase Google (bloomberg.com) |
|
1 point by casca on July 30, 2015 | past
|
60. | | 2015 State of Devops Report [pdf] (puppetlabs.com) |
|
38 points by casca on July 22, 2015 | past | 8 comments
|
|
|
More |