A multinational operation by Interpol and the FBI cracked down on attempts in Moldova to sabotage one of the international police agency's key tools, the Red Notice system, officials said Tuesday. Four people were detained in the eastern European country.
"Cybersecurity, Lepassaar argues, will inevitably need to become second nature to designers and consumers.
“I do believe that we have a societal challenge ahead of us to understand digital security in the same way that we understand, security in the everyday traffic environment,” he said."
I'm having a few thoughts on social norms. I'm used to IRC and Usenet, where a channel or group is understood to be an open forum and, when people make a statement, it is seen as normal for anyone else, acquainted or not, to respond to it, even tangentially.
But on more social-network-style graph-based communications where the flow is determined by a follow edge between nodes or something like it, a lot of people find it disturbing or invasive to have strangers pop into their mentions to rebut, add, or jump off from their point.
I think this causes a lot of friction and expectation mismatches. I don't think either norm is wrong, though it is useful if people make it clear which one they're expecting.
For the avoidance of doubt, I'm an IRC-type person. If I'm posting public or unlisted, I do not mind strangers to disagree with me, add their own twist, or give their own reaction. I will also respect the desire of graph people who don't want me to do that to them.
Leider wird gerne "Der Westen" noch als die #IT-Übermacht gesehen.
»Nordkorea – Wie Kims Elite-#Hacker zum globalen #Sicherheit'sproblem werden: #Nordkorea ist international isoliert und seine Ressourcen sind begrenzt – doch im #Cyber'bereich gehört das Land zur #Weltspitze. Dass selbst westliche Großkonzerne nicht sicher vor Kims Cybersoldaten sind, beweist das Regime immer wieder. Experten warnen, dass die kritische #Infrastruktur westlicher Länder gefährdet ist«
Any #infosec folks recommend the best #cyber contractor hiring in vicinity of Ft. Eisenhower? (Ft. Gordon). A friend is looking for an established contractor with good benefits hiring people at GS-13 equivalent level to staff CYBERCOM, TRADOC or other major commands. #USArmy
Join the leading cyber security institute near you with Blitz Academy's specialized cyber security courses. Learn from expert instructors and gain practical skills for a successful career. Enroll now!
:HackerCatRainbow: https://cyberpunk.lol is open for registrations!!! :HackerCatRainbow:
WHO ARE WE?
we're a small scrappy relatively fresh-faced underdog instance of glitch mastodon. we have but one humbly stated mission: to put the PUNK back into cyberpunk here on the fediverse
WHO AM I?
i'm vanta. trans enby girl polyam lesbian gender terrorist, the fediverse's favorite pirate radio DJ, DIY clothing auteur, and rogue wordsmith extraordinaire. i've been a hardcore fedi user since 2017
THREADS?
not only is this instance a fedipact instance that has threads.net blocked, but... i'm the one who made the whole pact to begin with lmao
The Security Service of Ukraine (SBU) said on April 4 that it uncovered evidence that Russian forces were able to hack into the devices of military personnel in order to guide a missile to strike the 128th Mountain Assault Brigade, killing at least 19 Ukrainian soldiers, in November last year.
#surveillance New traffic signs equipped with lasers to scan drivers inside cars to determine if they hold cell phones or are "distracted". #privacy#cyber#tech
Cyber Safety Review Board Releases Report on Microsoft Online Exchange Incident from Summer 2023
Highly recommend you do so, or at least read the executive summary its 🔥
"The Board finds that this intrusion was preventable and should never have occurred. The Board also concludes that Microsoft’s security culture was inadequate and requires an overhaul..."
The xz issue highlights once again that we can't just hope that private sector corporations invest in the #opensource that makes their business (and profits) possible.
Perhaps we need public sector investment in carefully selected open source - and by that I don't mean the big fancy stuff, but the tiny tools that most people don't even know is there - like xz.
After all - how much of the world around us would collapse if all open source vanished at midnight?
Avons nous, en France et en français, une plate-forme éthique de divulgation de faille cyber à but non lucratif ?
Type openbugbounty ?
Si oui, laquelle ?
The Canada Air AI chatbot bereavement refund Court finding is such an interesting canary in the coal mine. If you thought individual people hiding bad behavior behind the shield of being anonymous online was a problem, wait until for profit companies increasingly weasel out of the consequences of their actions by saying it was AI that made the decision, and not an employee.
" Cyber security course near me | Cyber security institute near me" (www.blitzacademy.org)
Join the leading cyber security institute near you with Blitz Academy's specialized cyber security courses. Learn from expert instructors and gain practical skills for a successful career. Enroll now!
SBU: Russian forces used cyberattack to target Ukraine's 128th brigade (kyivindependent.com)
The Security Service of Ukraine (SBU) said on April 4 that it uncovered evidence that Russian forces were able to hack into the devices of military personnel in order to guide a missile to strike the 128th Mountain Assault Brigade, killing at least 19 Ukrainian soldiers, in November last year.