Best of CybersecurityFebruary 2025

  1. 1
    Video
    Avatar of fireshipFireship·1y

    UK demands backdoor for encrypted Apple user data...

    The UK government has issued a technical capability notice to Apple, demanding a backdoor to access users' encrypted iCloud data. The notice, part of the Investigatory Powers Act 2016, aims to allow access to private data globally, which could impact all Apple users and other end-to-end encrypted services like Telegram and WhatsApp. Despite Apple's history of protecting user data, it's unclear how they will respond. Users are advised to use encryption, VPNs, and other privacy tools to safeguard their information.

  2. 2
    Video
    Avatar of communityCommunity Picks·1y

    the ultimate guide to an open source life, i spent 2 months on this, i hope you enjoy it!!!

    A comprehensive guide to living an open source life, including building your own router, setting up secure VPNs, implementing home surveillance, replacing Google services with open source alternatives, and more. Detailed instructions and a video guide ensure ease of understanding and implementation, even for beginners. The author meticulously verified each step to ensure reliability.

  3. 3
    Video
    Avatar of networkchuckNetworkChuck·1y

    You're Going to Get Hacked in 2025

    Cybersecurity threats, including AI-powered hacking, deepfakes, and ransomware, will become increasingly sophisticated by 2025, making it almost impossible to avoid being hacked. Common-sense measures like using password managers, backing up data, updating software, and employing advanced antivirus solutions like Bitdefender can help. To stay safe, it's advised to maintain strict 'zero trust' behavior towards digital communications and stay informed about emerging threats.

  4. 4
    Article
    Avatar of communityCommunity Picks·1y

    BadDNS: Open-source tool checks for subdomain takeovers

    BadDNS is an open-source Python tool for detecting domain and subdomain takeovers. It distinguishes itself by not only identifying takeover opportunities in CNAME, NS, and MX records but also by inspecting client-side references and CSP/CORS headers for vulnerabilities. Additionally, it automates the update of takeover signatures from reputable sources, ensuring users stay protected against the latest threats. BadDNS is available for free on GitHub, with future developments planned to include support for additional DNS record types and DNSSEC vulnerabilities.