shortridge, to Cybersecurity
@shortridge@hachyderm.io avatar

zealots often shame humans for writing down their passwords, but as someone who just had to excavate the digital remains of a loved one who died suddenly:

please write down your credentials somewhere a trusted human can find them, especially your phone passcode and any primary passwords (like for email accounts, password manager, etc.)

the humans who care about you will need that access for many reasons; a "badass" threat model will only add helplessness to their grief

voxel, (edited ) to privacy

Hey 👋 dear Linux Community,

I'm still kinda new to Linux (started using this year 😅) I already made it to my main OS, even if I still missing some things which I used on Windows, anyway. What I wanted to ask you guys, what recommendations do you have for Linux Mint (Cinnamon)? In terms of security, optimization, (a way to make the UI looking modern ;-;) and privacy? I would be very interested in what you do guys to optimize your Linux setup :) I'm pretty technical, so there is nothing which could overwhelm me (probaly).

Thx! 🤍

@linux

taeluralexis, (edited ) to infosec

What are your thoughts on the Certified Ethical Hacker (CEH)? If you were offered a scholarship to take the cert for $200 instead of the standard $1k would you take it? Would you say it would benefit someone’s efforts towards getting interviews for a role in vulnerability analysis/pentesting? Asking for a friend, I’m trying to help her rn 🥴

chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

Look what came in the mail? My @purism Librem 5, but I am still waiting on my SIM card For the Librem cell service for some testing between that and @Efani but this will be an interesting review of the battle of the privacy phone ecosystems I have made.
Android/Graphene OS on Pixel 7a and PureOS on Purism Librem 5

Scraft161, to infosec

Hardware security key options?

I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.
My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.

I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).
The key work work together with already existing passwords, not replace them.

As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.

PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.

@linux @technology @technology @privacy

shortridge, to Cybersecurity
@shortridge@hachyderm.io avatar

I’m in a reflective mood this week and it’s kind of wild to me that I’m known as a “provocateur” in for takes like:

💡 don’t shame victims

💡 UX matters, a lot

💡we should understand what we’re supposed to protect

💡 if someone clicking a thing on the thing-clicking machine leads to security failure, they are not the foolish one

💡 the best things a security program can invest in aren’t in the RSAC vendor hall

💡 maybe we should start actually proving outcomes??????????

¯_(ツ)_/¯

voxel, to privacy
evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

In hotels I often make up my name, adress and birthdate when they ask for it. Because I don’t trust their IT security.
Some people laugh at me for that - they think it's paranoia. But a few days ago 6 TB of data from the big European hotel chain was leaked by a ransomware group - including millions of customer names and dates. So maybe it’s not paranoia not to give your real data to hotels. (The same counts for online shops, gyms and many other institutions of course)

bitwarden, to Cybersecurity
@bitwarden@fosstodon.org avatar

Further secure your digital life with . What is your favorite authenticator? https://bitwarden.com/blog/top-10-burning-questions-on-2fa/

taeluralexis, to infosec

Do ya'll study or work on security-related stuff on the weekends? For the most part I do..reading about diff vulnerabilities or doing TryHackMe or writing a script but sometimes I just chill and do nothing lol. Today I'm on HackTheBox prepping for the interview

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

One of the world's largest online travel agencies, Booking.com, is being used by fraudsters to trick hotel guests into handing over their payment card details.

How do I know? The fraudsters tried the trick with me.

https://grahamcluley.com/fraudsters-target-booking-com-customers-claiming-hotel-stay-could-be-cancelled/

protonmail, (edited ) to Cybersecurity
@protonmail@mastodon.social avatar

Let's start the Cybersecurity Awareness Month with a quick self-assessment! How would you rate your overall cybersecurity knowledge?

And make sure to share your personal tips in the comments below.

hacks4pancakes, to Cybersecurity
TheConversationUS, to tech
@TheConversationUS@newsie.social avatar

An Israeli technology company has developed the means of delivering spyware via online ad networks. There’s no defense against the spyware and the Israeli government has given the company approval to sell the technology.

For now, take comfort in the fact that it’s a hefty $6.4 million price tag for a single ad infection.

https://theconversation.com/spyware-can-infect-your-phone-or-computer-via-the-ads-you-see-online-report-213685

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar
shortridge, to Cybersecurity
@shortridge@hachyderm.io avatar

hello fediverse, here's my new infographic comparing two dynamics we can nurture when doing things: security theater vs.

it's meant as a handy reference to validate that your org's security efforts are nurturing resilience rather than fomenting theater (and I don't mean writing your design docs in iambic pentameter, that's fine)

imo security theater is one of the core pillars holding up the status quo of security-as-gatekeeper... so let's do resilience instead <3

evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar
fifonetworks, to privacy

This post is about cybersecurity, OSINT, and privacy.

REMINDER
Today’s surveillance cameras perform very well in low light conditions. In theaters, or any other public space, never assume that you can’t be seen because it’s dark. You can be seen. You are being seen. You are being recorded.

alx, to fediverse
@alx@mastodon.design avatar

I found today that there are some downside in being mostly in this amazing ad-free space that the is. I check my Facebook account everyday for notification-only, as many people still use it sometimes to get in touch with me. Today, casually, I decided to scroll. And OMG.

1/

gcluley, to ilaughed
@gcluley@mastodon.green avatar

Great news! Amazon has got back to me about the £700 iPhone they failed to deliver (and wouldn't refund or replace) Bad news: what they told me...

Based on this experience, why would anyone buy anything expensive from Amazon ever again? Please share, like and comment if you agree.

Watch my #video.

#amazon #delivery #scam #jeffbezos #cybersecurity

Cybersecurity expert Graham Cluley ordered an iPhone 15 from Amazon for £700. Amazon failed to deliver it to him... but also refuse to refund Graham or send him a replacement. You can probably guess how that makes him feel...

mastodonmigration, to infosec
@mastodonmigration@mastodon.online avatar

We talk about wanting professional journalists to ditch Twitter and come to Mastodon.

When they do we need to make them welcome!

Today Chris Bing @Bing_Chris a distinguished Reuters reporter covering hacking and foreign affairs has joined Mastodon saying "Hi - Twitter is a garbage fire. I am going to try to use this platform more. Love,-Bing."

Let's show Chris some love!

Morishima, to security
@Morishima@ieji.de avatar
mttaggart, (edited ) to infosec

Hey, KeePassXC did get its own vuln!: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35866

Basically neither the master password change dialog nor the 2FA settings dialog require the current master password to function. So to exploit this, you'd need GUI access to a machine with an unlocked KeePassXC session. It's not nearly as scary as the KeePass vuln we saw a few weeks ago, but appears to be planned to be addressed in version 2.8.0.

EDIT: This is a BOGUS CVE that was created in bad faith. None of this should be considered a "vulnerability" so much as "how password managers work." Apologies to @keepassxc, who do fantastic work and whose project I use professionally and endorse.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • thenastyranch
  • magazineikmin
  • ethstaker
  • InstantRegret
  • tacticalgear
  • rosin
  • love
  • Youngstown
  • slotface
  • ngwrru68w68
  • kavyap
  • cubers
  • DreamBathrooms
  • megavids
  • mdbf
  • modclub
  • GTA5RPClips
  • normalnudes
  • khanakhh
  • everett
  • cisconetworking
  • osvaldo12
  • anitta
  • Leos
  • Durango
  • tester
  • JUstTest
  • All magazines