Posts

What's the point of secure software if you can't trust your CPU? - Computing. This is exactly the reason the PP 250 instruction set was built to guarantee security in hardware

Exclusive: Inside the ProtonMail siege: how two small companies fought off one of Europe's largest DDoS attacks - TechRepublic

Fwd: [cap-talk] [friam] Re: UX resources for object capabilities

Domain Shadowing - Wild West Of Internet Cyber Attacks »

EXCLUSIVE: Entire US national security system possibly compromised by year-long cyber-assault

How Hacking Team Created Spyware that Allowed the FBI To Monitor Tor Browser

Hacking Team Project X

Google Photos and the unguessable URL | The Verge

BBC News: US hit by 'massive data breach'

North Korean hackers 'could kill'

Delegation

Bug in 1,000 apps could open Apple devices to hacking - CBS News