Join Free - pithysecurity.substack.com
Made By - @mrcomputerscience.bsky.social
2. Forget US-based big tech.
3. Use Protonmail/Tuta.
4. Use ProtonVPN or a VPN you trust. (TOR is good, but overkill for many.)
5. Remember that all accounts you created previously are still attached to you, as you said.
6. Signal.
pithysecurity.substack.com/p/americas-c...
pithysecurity.substack.com/p/crisis-ave...
pithysecurity.substack.com/p/i-trusted-...
#cybersecurity #spying
Federal highway officials just warned that solar panels powering traffic lights & cameras have secret radios that could be used for spying or remote tampering.
Those panels you drive past daily? They might be watching you back.
pithysecurity.substack.com/p/solar-pane...
#cybersecurity #spying
#cybersecurity #nevada #hacked
pithysecurity.substack.com/p/ransomware...
#cybersecurity #nevada #hacked
A strong lock is a good start.
But the real value is in who you give the keys to.
Be wary of third-party apps and permissions.
They're the easiest way to accidentally lose (or give away) your best digital assets.
#cybersecurity #privacy #datasecurity
A strong lock is a good start.
But the real value is in who you give the keys to.
Be wary of third-party apps and permissions.
They're the easiest way to accidentally lose (or give away) your best digital assets.
#cybersecurity #privacy #datasecurity
pithysecurity.substack.com/p/how-a-phon...
pithysecurity.substack.com/p/how-a-phon...
pithysecurity.substack.com/p/870k-peopl...
pithysecurity.substack.com/p/870k-peopl...
pithysecurity.substack.com/p/dragonforc...
pithysecurity.substack.com/p/dragonforc...
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
www.malwarebytes.com/blog/news/20...
www.malwarebytes.com/blog/news/20...
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
#cybersecurity
arstechnica.com/security/202...
#cybersecurity
arstechnica.com/security/202...
#Cybersecurity
www.malwarebytes.com/blog/scams/2...
#Cybersecurity
www.malwarebytes.com/blog/scams/2...
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
🖥️ Targets universities & gov orgs in N. America & Asia
🔓 Grants hackers full remote access
🕵️ Evades detection with clever tricks
🔒 Requires root privileges
Stay vigilant, Linux users! Patch & update! #CyberSecurity
thehackernews.com/2025/02/new-...
🖥️ Targets universities & gov orgs in N. America & Asia
🔓 Grants hackers full remote access
🕵️ Evades detection with clever tricks
🔒 Requires root privileges
Stay vigilant, Linux users! Patch & update! #CyberSecurity
thehackernews.com/2025/02/new-...
🔓 Harvests contacts, photos, location & more 📞📸🗺️
#CyberSecurity
www.malwarebytes.com/blog/news/20...
🔓 Harvests contacts, photos, location & more 📞📸🗺️
#CyberSecurity
www.malwarebytes.com/blog/news/20...
#CyberSecurity
www.helpnetsecurity.com/2025/02/24/b...
#CyberSecurity
www.helpnetsecurity.com/2025/02/24/b...
www.tomshardware.com/tech-industr...
www.tomshardware.com/tech-industr...
#CyberSecurity #Privacy
www.bleepingcomputer.com/news/securit...
#CyberSecurity #Privacy
www.bleepingcomputer.com/news/securit...
#VPN #CyberSecurity
www.bleepingcomputer.com/news/microso...
#VPN #CyberSecurity
www.bleepingcomputer.com/news/microso...
#CyberSecurity #AI
www.bleepingcomputer.com/news/securit...
#CyberSecurity #AI
www.bleepingcomputer.com/news/securit...
#CyberSecurity #AI #Google
security.googleblog.com/2025/01/how-...
#CyberSecurity #AI #Google
security.googleblog.com/2025/01/how-...