How Threads’ privacy policy compares to Twitter’s (and its rivals’)

reader comments 98 with Meta’s long-awaited Twitter alternative is here, and it’s called Threads. The new…

MOVEit app mass-exploited last month patches new critical vulnerability

reader comments 21 with MOVEit, the file-transfer software exploited in recent weeks in one of the…

Mastodon fixes critical “TootRoot” vulnerability allowing node hijacking

reader comments 10 with The maintainers of the open-source software that powers the Mastodon social network…

Actively exploited vulnerability threatens hundreds of solar power stations

Getty Images reader comments 4 with Hundreds of Internet-exposed devices inside solar farms remain unpatched against…

Brave aims to curb practice of websites that port scan visitors

reader comments 103 with The Brave browser will take action against websites that snoop on visitors…

336,000 servers remain unpatched against critical Fortigate vulnerability

reader comments 9 with Researchers say that nearly 336,000 devices exposed to the Internet remain vulnerable…

Torrent of image-based phishing emails are harder to detect and more convincing

Enlarge / Man hand holding a mobile phone with QR code. Getty Images reader comments 103…

Red Hat’s new source code policy and the intense pushback, explained

Enlarge / A be-hatted person, tipping his brim to the endless amount of text generated by…

TSMC says some of its data was swept up in a hack on a hardware supplier

reader comments 4 with Chipmaker TSMC said on Friday that one of its hardware suppliers experienced…

Op-ed: Why the great #TwitterMigration didn’t quite pan out

Enlarge / Let’s look deep within. Aurich Lawson | Getty Images reader comments 229 with I’ve…