hacking   59934

« earlier    

The Attorney Fighting Revenge Porn - The New Yorker
Carrie Goldberg is a pioneer in the field of sexual privacy, using the law to defend victims of hacking, leaking, and other online assaults.
revengeporn  law  thenewyorker  hacking  leaking  technology  onlineharrassment  privacy 
yesterday by brendanmcfadden
Phishing with Unicode Domains
wow, fascinating! "Punycode makes it possible to register domains with foreign characters. It works by converting individual domain label to an alternative format using only ASCII characters. For example, the domain "xn--s7y.co" is equivalent to "短.co"."
dns  security  vulnerability  hacking  design 
yesterday by teffalump
Tainted Leaks: Disinformation and Phishing With a Russian Nexus - The Citizen Lab
This report describes an extensive Russia-linked phishing and disinformation campaign. It provides evidence of how documents stolen from a prominent journalist and critic of Russia was tampered with and then “leaked” to achieve specific propaganda aims. We name this technique “tainted leaks.”
hacking  security  russia  research 
yesterday by SimonHurtz
OpenVAS Vulnerability Scanner Online | HackerTarget.com
Online security vulnerability testing using OpenVAS scanner. Test Internet connected servers and web sites now with this powerful open source security tool.
security  hacking 
yesterday by lucapostBo

« earlier    

related tags

201  2017  3d  6502  advertising  ai  alexa  analytics  arcade  arduino  articles  artificialintelligence  assembly  authentication  automation  automotive  bots  browser  business  businessmodels  capitalism  car  cheats  clever  code  coding  community  comparison  computing  crime  critique  cryptography  cybercrime  cyberlaw  cybersecurity  cyberwar  cyberwarfare  database  dc:creator=morozovevgeny  dctagged  debugging  democracy  design  development  devops  disection  diy  dns  election  election2016  electronics  email  emulation  encryption  excellent  experience  forum  game  gameboy  gamecube  git  github  growth  hack  hardware  history  homebrew  how-to  howto  hunt  iebc  important  incentives  infosec  intel  intelligence  internals  iot  it  ke2017  kenya  l0pht  law  leaking  leaks  learn  learning  malware  marketing  memory  microprocessor  microsoft  midi  mobile-privacy  mod  monitor  monopolies  netsec  nintendo  nsa  onlineharrassment  opensource  papers  password  pentesting  people  personal  php  playstation  political.philosophy  politics  privacy  product  producthunt  programming  protocol  ransomware  raspberry-pi  raspberrypi  rentiership  research  retrocomputing  reuters  revengeporn  review  robots  rom  rowhammer  russia  search  security  sensors  siliconvalley  smarthome  socialmedia  software  softwareasservice  sony  spam  stratechery  surveillance  tanzania  tech  techniques  technology  thenewyorker  tool  tools  top  usa  user  ux  vulnerability  wannacry  web  website  windows  wireless 

Copy this bookmark: