Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Malware
ashkan soltani
ashk4n
Since its #antitrust day, two more examples of the subtle ways platforms favor their own products/services in the marketplace:1) Latest MacOS ‘Network Extensions’ framework prevents the firewall extensions from blocking/monitoring
Read more
Patribotics
patribotics
Nothing to hide, nothing to fear @realDonaldTrump.PS: most of the intercepts at Trump Tower were made by then @NewYorkStateAG Eric Schneiderman, under state law.FISA is not the only fruit.https://twitter.com/realdonaldtrump/status/126570664
Read more
ESET research
ESETresearch
Last week, Bitdefender reported about a campaign where the first stage was a malicious 3ds Max encrypted script (.MSE) containing a malicious DLL (https://www.bitdefender.com/files/News/CaseStudies/study/365/Bitdefender-PR-Whitepaper-APTHac
Read more
Yield Farmer Joe 🌾🚜 🌾🐖
YieldFarmerJoe
Things I wished I knew about Hardware Wallets1) Use a passphrase for added security for your hardware wallet. It's an added word or phrase that YOU choose in addition to
Read more
Murray 🇺🇸
Rothbard1776
BREAKING: Retired Army Colonel [30 yrs] w/ over 15 years of experience in Information Warfare, Electronic & Special Electronic Warfare, Computer Network Operations, Op Sec & more in PA Hearing:
Read more
Jake Highwell (Text LIFE to 88022)
JakeHighwell
.@TuckerCarlson So, let me get this straight1) China releases a virus2) Everyone has to work remotely3) Zoom appears out of nowhere4) China has access to it5) Privileged information from our
Read more
Fundación Karisma
Karisma
1/10 Sabemos que tú y muchas personas están usando Zoom en estos días de cuarentena. Aquí te compartimos una serie de advertencias y de consejos para mejorar tu privacidad y
Read more
𝕔hi𝓁𝓁iຖ໐iˢ
chiIIum
Okay.https://twitter.com/CJBdingo25/status/1126908445783986182 Old thread on Ryan and Bruni, by Chris. (Total badass)https://twitter.com/cjbdingo25/status/1066674388689436672?s=21 https://www.rusi.org.au/RUSI-SA-Home April 13, 2015 Mark Ryan and
Read more
Omar Mokhtar 🇲🇾
omarqe
"Hacker boleh ke embed code dalam gambar?" – ya, boleh.Kebiasaannya, file media seperti gambar, video, PDF dan sebagainya digunakan sebagai "loader" (atau dropper) untuk download program backdoor di sebalik tabir
Read more
Elliot Alderson
fs0c131y
1/ Technically, an iOS app can't use Bluetooth all the time.As a consequence, a contact tracing app which use Bluetooth cannot work on iOS. 2/ 3 weeks ago, Singapore published
Read more
Greg Asquith
Greg_Asquith
1 - Lots of chat at the moment on keyword/content blocking by digital advertisers and the likes of @integralads @doubleverify killing news publishers. My two cents - the problem goes
Read more
Venkatesh Rao
vgr
This QT is my election livetweet thread. Now that things are winding down into a tight endgame with a cloud of murky lawsuits and doubt-merchanting hanging over them... I hereby
Read more
Christopher Glyer
cglyer
This shouldn’t be news to anyone,but human operated ransomware is a problem that has gotten completely out of controlThe reasons are relatively straightforward: The cost to pay is often significantly
Read more
Jacob Atkinson
Jacob_Atkinson1
@zoom_us has now been accused of selling our data, recording and exposing thousands of meetings, and letting AA meetings be breached. This platform has 100% lost all of my trust
Read more
The Time Has Come For Freedom | Redpill Project
EthicalHackerXs
What if Q told us exactly what was going to happen on Election night?Power OutagesCyber Attacks11.4?When did the votes get uploaded for BIDEN?Power Outages have not even been mentioned yet...
Read more
John Reed Stark
JohnReedStark
I worked at the SEC for 18+ yrs, the last 11 as Chief of the SEC Office of Internet Enforcement. I have taught cyber law at Georgetown and Duke Law
Read more
‹
1
2
...
5
6
7
8
9
10
11
12
13
›