realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Just submitted a to the to try and see if they did have any investigation into potential retaliation for the sentencing of the "Atlanta 3" hackers who were linked to Legion of Doom.

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Uploaded some court documents from an appeal by Electra, a phone phreak who was caught up in Operation Sun Devil for hacking voicemail systems and sharing calling card codes.

https://archive.org/details/com.-v.-gerulis

danie10, to hacking
@danie10@mastodon.social avatar

Hackbat: This Raspberry Pi hacking tool is what the Flipper One could have been

The whole thing runs off of a Raspberry Pi RP2040 and open-source code. It has modules for NFC, SD card, and Wi-Fi communication, plus it features a miniature display so you can tell what it’s doing. If you want to make your own, the Hackster page f ...continues

See https://gadgeteer.co.za/hackbat-this-raspberry-pi-hacking-tool-is-what-the-flipper-one-could-have-been/

#hacking #opensource #raspberrypi #technology

kubikpixel, to hacking German
@kubikpixel@chaos.social avatar

Tut man nicht den anderen die Schuld zuweisen um selber nicht schuldig angesehen zu werden und auch sich selbst, anhand gegenüber dem Gegenangriffe, zu rechtfertigen? Dies ist mMn sogar min Europa weit so (ähnlich).

»Kommentar zur Debatte über IT-Sicherheit – "Die Empörten sind nackt​":
Deutschlands Politik beschwert sich über russische Hacker. Zurecht – aber handeln müsste sie selbst.​ […]«
– von @fsteiner auf @heiseonline

📰 https://www.heise.de/news/Kommentar-zur-Debatte-um-IT-Sicherheit-Die-Empoerten-sind-nackt-9708160.html


thejapantimes, to worldwithoutus
@thejapantimes@mastodon.social avatar

China is likely building profiles of British military personnel and people in other sensitive roles using hacked data, government officials and cyber experts said. https://www.japantimes.co.jp/news/2024/05/08/asia-pacific/politics/china-hacks-uk-defense-personnel/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Stumbled across this 1984 episode of the comedy series Night Court called "The Computer Kid" about a precocious boy who winds up in trouble for his school and I love it.

"He's plugged his computer into the phone!"

video/mp4

asbestos, to bbs
@asbestos@toot.community avatar

d00d3 go7 any warez?

NeadReport, to hacking
@NeadReport@vivaldi.net avatar

Here's another rant about a large corporation bending us over a chair with a huge security breach. But first the bits emailed to me from Dropbox:

"We can confirm that Dropbox Sign customer information such as emails, usernames, phone numbers, hashed passwords, multi-factor authentication, and general account settings were obtained."

Me: Fuck you Dropbox

"At Dropbox, our number one value is to be worthy of trust. We hold ourselves to a high standard when protecting our customers and their content. We didn’t live up to that standard here, and we’re deeply sorry for the impact it caused our customers."

Me: Fuck you Dropbox

schizanon, to internet_funeral
@schizanon@mastodon.social avatar
  1. is a shaping engine, it's used in , , , , , +, , , , , , , , , , , Engine, and other places.

  2. Harfbuzz 8.0 introduces a shaper, that allows to be embedded in a file. https://www.phoronix.com/news/HarfBuzz-8.0

  3. It's only a matter of time until someone embeds a in a font file.

kubikpixel, to email German
@kubikpixel@chaos.social avatar

Die machen Werbung über sich, dass ihre KI toll einsetzbar sei und dann das, eine übliche Schwäche von Profi-Dienste. Nicht im Detail, sondern was es betrifft.

»Account-Übernahme möglich – Kritische Gitlab-Schwachstelle wird aktiv ausgenutzt:
Die Schwachstelle ermöglicht es Angreifern, beliebige Nutzerpasswörter über eine eigene E-Mail-Adresse zurückzusetzen. Tausende von Gitlab-Instanzen sind gefährdet.«

👉 https://www.golem.de/news/account-uebernahme-moeglich-kritische-gitlab-schwachstelle-wird-aktiv-ausgenutzt-2405-184798.html

tness16, to hacking French
@tness16@mastodon.social avatar

violence et coup de pression, qui a tenté d’empêcher la diffusion ?

La fait elle la police en ?
Hacking violence et coup de pression, qui a tenté d’empêcher la diffusion ?

Alerté en amont, Envoyé Spécial a pu suivre et filmer une opération clandestine de la à . Une à peine croyable racontée dans un exceptionnel qui dérange la Chine.

https://invidious.fdn.fr/watch?v=-oOuo6fDcIY

redhotcyber, to IT Italian
@redhotcyber@mastodon.bida.im avatar
realhackhistory, to hacking
@realhackhistory@chaos.social avatar

An article by David E. Sanger
via the New York Times News Service which was published in the Pittsburgh Post-Gazette on the 24th of November, 1988.

This reminds me of Russian news headlines about Russian hackers:

"Envious of computer virus
Well-behaved Japanese programmers have not developed the creative of U.S. competitors"

chizeck, to beer
@chizeck@beige.party avatar

I've been waiting to write my first toot on beige.party until I had something important enough to share. I have now found that important information. You're welcome.

https://www.scq.ubc.ca/how-to-brew-beer-in-a-coffee-maker-using-only-materials-commonly-found-on-a-modestly-sized-oceanographic-research-vessel/

gtbarry, to Canada
@gtbarry@mastodon.social avatar

London Drugs pharmacy chain closes stores after cyberattack

Canadian pharmacy chain London Drugs has closed all its retail stores to contain what it described as a "cybersecurity incident."

"London Drugs is closing all stores across Western Canada until further notice"

https://www.bleepingcomputer.com/news/security/london-drugs-pharmacy-chain-closes-stores-after-cyberattack/

sidde, to apple
@sidde@bitbang.social avatar

Another post about G4 12" events from ~20 years ago.

a late November evening of 2005. With a "larger" antenna and standing on a mountain to the north of the city.

I used an antenna made for point to point "broadband" connections.
A bit on the larger size than the popular "pringles cantennas" people used to make.

(Funny to think about that I ended up with a work in Cybersecurity a few years later)

Antenna Connection to the Powerbook 12"
KisMAC output

thejapantimes, to worldnews
@thejapantimes@mastodon.social avatar

Russian programmers are playing a "cat-and-mouse" game with authorities to bypass controls on what citizens can access online. https://www.japantimes.co.jp/news/2024/04/27/world/politics/russia-programmers-outsmart-censors/

thejapantimes, to Japan
@thejapantimes@mastodon.social avatar

As the U.S. faces security threats across the globe, Japan has committed to stepping up as a trusted defense partner — but Tokyo's cyber and information security vulnerabilities remain a concern. https://www.japantimes.co.jp/news/2024/04/26/japan/politics/japan-security-vulnerabilities/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Been reading about the case of Edward Austin Singh in the UK, a #hacker who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various #hacked computers, by UK police in 1988.
#hacking #history

TechDesk, to Cybersecurity
@TechDesk@flipboard.social avatar

With over 50 elections set to take place around the globe in 2024, around two billion people will head to the polls before the year is out. That creates a greater opportunity than ever for hostile nations to trial new and refined cyber-attack techniques, according to cybersecurity firm Mandiant.

As reported by Techradar: “Data theft, distributed-denial-of-service (DDoS) attacks, hack and leak operations, and various information operation (IO) campaigns using social media are all ranked as some of the most likely tactics used to affect election campaigns and voters, with Mandiant assessing that these could be used in layered campaigns that each seek to magnify the effect of each other.”

https://flip.it/Pc5hQs

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Hacker posts fake story about Ukrainians trying to kill Slovak President.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/hacker-posts-fake-story-about-ukrainians-trying-to-kill-slovak-president/

gtbarry, to security
@gtbarry@mastodon.social avatar

LastPass users targeted in phishing attacks good enough to trick even the savvy

Password-manager LastPass users were recently targeted by a convincing phishing campaign that used a combination of email, SMS, and voice calls to trick targets into divulging their master passwords

https://arstechnica.com/security/2024/04/lastpass-users-targeted-in-phishing-attacks-good-enough-to-trick-even-the-savvy/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Can anyone help me find references, videos or news reports relating to this, as seen in The Sydney Morning Herald, 7th November 1988?

It concerns a incident and Belgian Prime Minister Wilfried Martens in, I think, October of 1988.

kubikpixel, to IT German
@kubikpixel@chaos.social avatar

Genau das, denn KI und Werbung ist selten bis gar nicht die Wahrheit.

»Künstliche Intelligenz vergleichen: Auch eine Frage des Gefühls:
Es gibt viele KI-Systeme. Aber welches ist das richtige für mich? Eine Frage, die erstaunlich schwer zu beantworten ist.«

🔊 https://www.srf.ch/wissen/technik/ki-benchmarks-kuenstliche-intelligenz-vergleichen-auch-eine-frage-des-gefuehls

#ki #kunstlicheintelligenz #KISysteme #it #radio #audio #ai #antwort #werbung

kubikpixel,
@kubikpixel@chaos.social avatar

AI models inch closer to hacking on their own:

Some large language models already have the ability to create exploits in known security vulnerabilities, according to new academic research.

🤖 https://www.axios.com/2024/04/26/ai-model-hacking-security-vulnerabilities


realhackhistory, to hacking
@realhackhistory@chaos.social avatar

The story of the first person convicted of planting a destructive computer virus, Donald Gene Burleson, from the March 1989 issue of Texas Monthly. This is a great write up of the story behind an incident that had taken place in 1985 and the resulting court case.

https://www.texasmonthly.com/true-crime/search-and-destroy/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • magazineikmin
  • khanakhh
  • InstantRegret
  • everett
  • osvaldo12
  • Youngstown
  • slotface
  • Durango
  • rosin
  • PowerRangers
  • kavyap
  • DreamBathrooms
  • Leos
  • tester
  • hgfsjryuu7
  • GTA5RPClips
  • tacticalgear
  • mdbf
  • vwfavf
  • ngwrru68w68
  • ethstaker
  • normalnudes
  • modclub
  • cisconetworking
  • cubers
  • provamag3
  • All magazines