Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Vulnerabilities
Katelyn Bowden
medus4_cdc
I think the most toxic thing about infosec is the weaponization of humanity within the industry. People don’t trust each other, and everyone is always keeping info as ammunition for
Read more
Robert J. DeNault
robertjdenault
The 2016 election was dominated by hacking of one candidate/party, systematic dump of hacked materials, and hacking of elections systems. Republicans blocked election security bills for 4 years, insisting it
Read more
Ed Bellis
ebellis
Distribution Rules Everything Around Me. A thread on vulnerability scoring... I sometimes find myself in discussions with people on why they think a vulnerability is scored too low or too
Read more
Robert M. Lee
RobertMLee
The fact that so many are focusing on the water plant using Windows 7, which had nothing to do with how the attack was done, is interesting. Folks have an
Read more
Julian Suleder
jsuleder
Today the final report of the @BSI_Bund project #ManiMed was published in which we at #ERNW as contractor examined medical devices for security vulnerabilities.https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/DigitaleGesellschaft/ManiMed
Read more
Mary-Dan Johnston
mdjohnsto
Just because McNeil is leaving doesn't mean the rest of his caucus should be allowed to escape responsibility for this government's egregious record on labour rights, accountability and transparency, housing
Read more
Tim Jones
tim_jones6
1/ Private lenders have been telling borrowing governments you need to keep paying your debt and interest in full during the crisis, to be able to borrow in the future.
Read more
Azeria
Fox0x01
I just choked on my food reading this nonsense, then realized the article came from a popular far-right blog that is also known to spread pro-Russia disinformation. The dEeP StATe
Read more
Jennifer Cohn ✍🏻 📢
jennycohn1
Voting machine vulnerabilities are an “‘industry-wide concern,’ @jhalderm said. ‘There’s no logical reason to be singling out one company,’” Dominion, while ignoring the others, including voting machine vendor behemoth E
Read more
Thomas H. Ptacek
tqbf
Mudge is the new head of security at Twitter, which got me talking about cDc, hacking groups, cliques, and the distinctions between them. I mentioned 8lgm and TESO as examples
Read more
Devon Cantwell
devon_cantwell
If you are a BIPOC and/or woman activist/activist-scholar, you should start locking down your social media and digital presence ASAP. Get LastPass (or a similar service) and change bank and
Read more
Lesley Carhart
hacks4pancakes
I’m really tired of explaining that hacking into an individual device in a complex physical process does not in most cases equate to successfully and meaningfully tampering with the process.
Read more
Brian O’Kelly - Commentator
brianyourbro
2017: SmartMatic Executive"It is therefore with the deepest regret that we have to report that the turnout numbers for the constituent assembly were tampered with.The turnout was manipulated."#Smartmatic #DominionVotingSystems #El
Read more
David Reaboi
davereaboi
Read Jim’s thread. This has been the problem with “evidence” from the beginning re Dominion. Plenty of *possible* vulnerabilities, but your iPhone has them too; you can’t establish definitively you’ve
Read more
Robᵉʳᵗ Graham😷, provocateur
ErrataRob
I was an early 1980s Internet hacker. Let me explain why "Bugtraq" is probably the most important achievement in the world of cybersecurity.https://twitter.com/attritionorg/status/1350206109617975303 Most of what you know of the
Read more
Tarek ⚡️
tareksales
Lessons learned from going through a freeze recently...-Quick Thread-We had little food, little water, lots of love, lots of drama, lots of hard work, no electricity nor heat for 30+
Read more
‹
1
2
3
4
5
6
7
8
...
23
24
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree