martin_casado
@martin_casado  
RECENTLY SHARED
Experts: Spy used AI-generated face to connect with targets
apnews · 4 days ago
RapidAPI nabs $25M led by Microsoft as its API marketplace cracks 10K APIs and 1M users – TechCrunch
techcrunch · 5 days ago
Ultimate limit of human endurance found
bbc · 7 days ago
How Ledger Hacked an HSM - Cryptosense
cryptosense · 8 days ago
What 10,000 Steps Will Really Get You
theatlantic · 15 days ago
100 percent renewable energy, for the second year in a row
blog.google · 11 days ago
Google confirms that advanced backdoor came preinstalled on Android devices
arstechnica · 10 days ago
Chrome to limit full ad blocking extensions to enterprise users - 9to5Google
9to5google · 18 days ago
There Is Too Much Stuff
theatlantic · 23 days ago
WebAuthn Web Authentication with YubiKey 5 | Linux Journal
linuxjournal · 26 days ago
'core' ORC extension by clintropolis · Pull Request #7138 · apache/incubator-druid
github · 26 days ago
Everyone is an Analyst: Opportunities in Operational Analytics
a16z · 31 days ago
What's Behind Lyft's Choices in Big Data Tech
datanami · 31 days ago
Titan-ic disaster: Bluetooth blunder sinks Google's 2FA keys, free replacements offered
theregister.co.uk · 32 days ago
An eBPF overview, part 1: Introduction
collabora · 32 days ago
Advisory: Security Issue with Bluetooth Low Energy (BLE) Titan Security Keys
security.googleblog · 32 days ago
The Empty Promise of Data Moats
a16z · 38 days ago
PSA: SMS 2FA Is Weak AF
gizmodo · 36 days ago
Introducing faast.js · faast.js
github · 45 days ago
Server maker Super Micro to ditch 'made-in-China' parts on spy fears
asia.nikkei · 47 days ago
Apple spends more than $30 million on Amazon's cloud every month, making it a top AWS customer
cnbc · 55 days ago
DeepMap Broadens Leadership Team; Amer Akhtar Joins as Chief Revenue Officer
medium · 61 days ago
Reused Cooking Oil Ups Risk Of Metastases In Breast Cancer Patients
techtimes · 63 days ago
Why Two Sigma is using SigOpt for Automated Parameter Tuning
twosigma · 65 days ago
Spectrum Auctions Are Killing Competition And Failing Rural Access
manypossibilities · 67 days ago
Get in touch with us on Twitter
Researchers Find Google Play Store Apps Were Actually Government Malware - Motherboard
motherboard.vice · 78 days ago
Inmates in Finland are training AI as part of prison labor
theverge · 79 days ago
Pat Gelsinger: Cisco ACI 'Bicycle' Will Never Match VMware NSX 'Lamborghini’
crn · 78 days ago
Kong raises $43M Series C for its API platform
techcrunch · 80 days ago
One-liner Safari sandbox escape exploit
medium · 82 days ago
Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
youtube · 93 days ago
Stable Channel Update for Desktop
chromereleases.googleblog · 102 days ago
About - Mural
muralnet · 108 days ago
News Releases
vmware · 109 days ago
The best hardware security keys for two-factor authentication
theverge · 114 days ago
Practical Enclave Malware with Intel SGX
arxiv · 125 days ago
O.MG Cable
mg.lol · 127 days ago
How to Delete Your Data From 23andMe, Ancestry, and Other Sites
consumerreports · 129 days ago
WHY WE SWITCHED TO CILIUM – MobiLab Solutions GmbH – Medium
medium · 135 days ago
Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up
9to5mac · 139 days ago
Software Chasms with Martin Casado - Software Engineering Daily
softwareengineeringdaily · 139 days ago
GoDaddy Now Offering YubiKey 2FA Authentication | DomainInvesting.com
domaininvesting · 141 days ago
Arborists Have Cloned Ancient Redwoods From Their Massive Stumps
e360.yale.edu · 143 days ago
China Has Blocked Microsoft Bing, The Only Major Foreign Search Engine Its Citizens Could Access
buzzfeednews · 143 days ago
Immigration Trends and Prep for Startups
a16z · 146 days ago
PG&E stock crashes nearly 50% as utility says it will file for bankruptcy because of wildfires liability
cnbc · 153 days ago
2FA codes can be phished by new pentest tool
nakedsecurity.sophos · 156 days ago
A YubiKey for iOS Will Soon Free Your iPhone From Passwords
wired · 158 days ago
I Gave a Bounty Hunter $300. Then He Located Our Phone
motherboard.vice · 159 days ago
Yubico announces the first Lightning security key for iPhones
theverge · 159 days ago
1   2   3   4   5