Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Malware
Satoshi
Dmj_dev
Top 10 Most Secure Smartphones In The WorldA THREAD Surprisingly, Most of them have evolved rapidly in terms of privacy and security over the last few years. Almost every smartphone
Read more
Mark Leach
markmleach
So you look at a day like this and it's hard not to agree with @xtophercook that DfE is not fit for purpose (thread)1) We start the day with a
Read more
A.J. 🖥ComputerMane 💻
AJ901
Yesterday, I said I'd do a thread on whether a Macbook is "worth it"After thinking about it, I realized there's right answer. It comes down to personal preferenceSo instead, here's
Read more
Lesley Carhart
hacks4pancakes
Just a reminder that you can’t build a successful threat hunting program to detect the APT indicators everyone is posting unless you actually build the capacity to threat hunt -
Read more
Schools Week
SchoolsWeek
Gibb says there is a plan. There are "clear criteria" for emerging from the lockdown, including hospitalisation rates."We've always been clear that schools will be last to close and first
Read more
Linda🏴 💙#Notmybrexshit #ProEU 🇪🇺
lindaarella
"Hello, IT? My economy has stopped working.""Have you tried -""Yes.""Okay. Check settings. What does it say under software?""Compatible with EU membership.""Do you have that?""
Read more
Patrick Howell O'Neill
HowellONeill
Today we’re publishing some new interviews and documents on NSO Group and the whole surveillance industry. Here is a thread that I hope provides some new insight into the surveillance
Read more
ThinkSmartPrepper
SmartPrepperMom
THIS Dutch Ethical hacker hacked into Trump' twitter page.7 tries! PASSWORD: MAGA2020. 2016, 44 yr old Victor Gevers & 2 others did so as well, PASSWORD, YOUREFIRED Does he have
Read more
Costin Raiu
craiu
1/9 The French National Cybersecurity Agency @ANSSI_FR released a report on Hades / Sandworm infecting Centreon servers with a PHP backdoor, followed by deploying the Exaramel Linux backdoor. Some notes:
Read more
Esther
U039b
A thread about counterfeit Android applications.A counterfeit application impersonates the genuine application by looking exactly the same and offering identical features. That way users cannot spot them. Counterfeit applications u
Read more
Nathaniel Gleicher
ngleicher
1/ Today we announced two takedowns of networks conducting cyber-espionage — one operating in Vietnam, and the other in Bangladesh.https://about.fb.com/news/2020/12/taking-action-against-hackers-in-bangladesh-and-vietnam/ 2/ The Vietnam o
Read more
Kyle Becker
kylenabecker
GEORGIA.FULTON COUNTY.Sworn affidavit from co-founder of @VoterGa attests to glaring anomalies in election reportage.20K GAIN for Biden and 1K LOSS for Trump. This is averred to have been reported on
Read more
Loren Brichter
lorenb
So it turns out that Google Chrome was making everything on my computer slow *even when it wasn’t running*, because it installs something called Keystone which is basically malware.I made
Read more
Pwn All The Things
pwnallthethings
Interesting article, and worth bearing in mind. But also important to remember this isn't the security model Signal is (or can) defend against.https://www.forbes.com/sites/thomasbrewster/2021/02/08/can-the-fbi-can-hack-into-private-sign
Read more
Eric Garland
ericgarland
Facebook hired a member of the intelligence community to protect elections in 2018. But it appears just an attempt to cover up their continued threat to democracy.https://www.theguardian.com/technology/2020/jul/26/yael-eisenstat-facebook-is
Read more
Homer Simpleton
BrandMkono
The Truth About Twitter Suspending Accounts.{It's not the DM for Promo}[THREAD] Reminder It is"Their platform. Their rules. Their last word." No one can protect you from platform changes. All you can
Read more
‹
1
2
3
4
5
6
7
8
...
11
12
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree