cybersecurity

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

Ok_imagination, in 3D-Printed USB Dead Man Switch (Prototype Demo)

Ha, that’s awesome! Give those to those execs that won’t stop traveling with their work laptop.

Tar_alcaran,

But for all that is sacred in this world, do NOT turn on the shred function. A device that will destroy my data if I stand up quickly is the stuff of nightmares for me…

slazer2au, in Thought experiment on legitimizing hacking

Legitimised hacking exists. Bug Bounty programs exist like Bugcrowd, HackerOne, Open Bug Bounty, and Hack The Box just to name a few.

Then there are all the pwn2own contests too.

Agility0971,
@Agility0971@lemmy.world avatar

I think you misunderstood. Obviously bug bounty programs exists, and some companies participate in them. The idea was on a legislative level where this would apply for all companies.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • cybersecurity@lemmy.world
  • DreamBathrooms
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • mdbf
  • tacticalgear
  • megavids
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • JUstTest
  • lostlight
  • All magazines