Nathan Wasson πŸ‡ΊπŸ‡¦

83 Followers
134 Following
1.2K Posts
Inquiring mind, data sovereignty proponent, car guy, and gamer.
Privacy Guideshttps://www.privacyguides.org
PixelFedhttps://pixelfed.social/nathan_wasson
β€œThis Is Not The Computer For You” Β· Sam Henri Gold

Sam Henri Gold is a product design engineer building playful, useful software.

I often get accused of bashing on Windows too much, but to be fair I bash on linux all the time.

NEW: The FBI said it is investigating a hack on its networks.

The breach affected the FBI's systems to manage wiretaps and surveillace requests, according to CNN.

https://techcrunch.com/2026/03/05/fbi-investigating-hack-on-its-wiretap-and-surveillance-systems-report/

FBI investigating hack on its wiretap and surveillance systems: Report | TechCrunch

Hackers allegedly broke into the FBI’s networks, according to a report by CNN.

TechCrunch

The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.

https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/

Wikipedia hit by self-propagating JavaScript worm that vandalized pages

The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.

BleepingComputer
because the macbook neo has an A18 Pro SoC & 8GB of RAM in it, apple should let me plug an iPhone Pro with the A19 Pro SoC and 12GB of RAM into a USB-C/Thunderbolt monitor and use it as a Mac - charge me a $200 Mac enablement fee if you have to
Is the UK okay?

NEW: There have been a few reports and some statements from government officials that suggest cyber operations played a significant role in the first days of the war in Iran.

At the end of the day this war is about dropping bombs, but these reports show cyber can have an important supporting role β€” for surveillance, intelligence gathering, disruption, and PYOPs β€” in real world conflict.

http://techcrunch.com/2026/03/03/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/

Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran | TechCrunch

After U.S. and Israeli forces started bombing Iran, reports say cyber operations have disrupted communications, supported surveillance activities, and have been used in psychological operations.

TechCrunch
Yo - we back! Our new isecjobs.com is live again helping you find the best jobs in InfoSec/Cybersecurity - FAST + SIMPLE πŸ‘‰οΈ https://isecjobs.com πŸŽ‰
isecjobs.com

The go-to, no-nonsense, fast and lean job site in InfoSec + Cybersecurity.

isecjobs.com
Morning at Okayama Castle, by Kawase Hasui (#KawaseHasui), 1955.
#shinhanga

Great article on #Git and some of the changing being made.

While I'm happy to see the transition from SHA-1 to SHA-256, the user interface improvements cannot be understated. Git truly is "use 10% of the tools to complete 90% of the work", largely because it's so damn complicated.

https://lwn.net/Articles/1057561/

Evolving Git for the next decade

Git is ubiquitous; in the last two decades, the version-control system has truly achieved world [...]

LWN.net