Forem

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs
Cover image for Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs

Comments
2 min read
Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Comments
4 min read
Why macOS Looks Healthy While Your Storage Fails
Cover image for Why macOS Looks Healthy While Your Storage Fails

Why macOS Looks Healthy While Your Storage Fails

2
Comments
7 min read
How My Phone Was Taken Over

How My Phone Was Taken Over

1
Comments
2 min read
Your Personal Data Economy And How To Shrink It
Cover image for Your Personal Data Economy And How To Shrink It

Your Personal Data Economy And How To Shrink It

Comments
5 min read
Tech Horror Codex: Vendor Lock‑In
Cover image for Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
Hidden Backdoors & Fake Plugins: How Hackers Live in Your WordPress Dashboard

Hidden Backdoors & Fake Plugins: How Hackers Live in Your WordPress Dashboard

Comments
4 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
Practical Identity Protection Without Tools Or Subscriptions
Cover image for Practical Identity Protection Without Tools Or Subscriptions

Practical Identity Protection Without Tools Or Subscriptions

Comments
3 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
Social Media Safety In A Permanent Online World
Cover image for Social Media Safety In A Permanent Online World

Social Media Safety In A Permanent Online World

Comments
4 min read
When App Privacy Rules Become Platform Power Levers
Cover image for When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
Cover image for Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

1
Comments 2
5 min read
Corporate Wargames: Red Teams vs Blue Teams

Corporate Wargames: Red Teams vs Blue Teams

2
Comments
3 min read
Online Scams Targeting Older Adults And How To Stop Them
Cover image for Online Scams Targeting Older Adults And How To Stop Them

Online Scams Targeting Older Adults And How To Stop Them

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.