tj, to opsec
@tj@howse.social avatar

You are not immune to being scammed.

Today I was half a second away from tapping a link in an SMS that was informing me I need to renew my credit card details because my CC was expiring.

My CC IS expiring this month. I updated my CC details on two other services yesterday. Through sheer dumb luck the scammer happened to bait their hook correctly.

I must not be complacent.
Complacency is the opsec-killer.
Complacency is the little death that brings identity theft.

douginamug, to infosec
@douginamug@mastodon.xyz avatar

"Random Mosaic – Detecting unauthorized physical access with beans, lentils and colored rice"

https://dys2p.com/en/2021-12-tamper-evident-protection.html#random-mosaic-rm

  1. put device in bag 2) put bagged device in another bag 3) pour in a mixture of different colored beans, forming a visual mosaic 4) send picture of mosaic to recipient

monkeyflower, to opsec
tinker, to infosec

If your first instinct is to try and find blame when a security vulnerability is pointed out...

...you have already created an environment where everyone will hide issues from you.

You currently live in a fake reality where you think everything is fine and you have no idea the rot that is underneath you.

If you fire or punish a person every time a vulnerability is found, you will have no one left. Hell, fire yourself first to save us all the trouble.

Vulnerabilities exist. The world changes. Software changes. Attacks change. Business needs change.

Life is fucking impermanence.

So create an environment where folks come to you quickly and tell you what needs to be fixed as they find it.

How do you do that?! Reward vulnerability discovery. Reward mitigations. Reward patch management. Reward security improvement. Reward safety improvement.

#informationsecurity #infosec #operationalsecurity #opsec #ics #ot

JulianOliver, to opsec
@JulianOliver@mastodon.social avatar

Test case: You get a voice msg from a friend in the middle of the night. They're in a local park and they need your help right now.

Soon, we will not know whether to act.

Time to work on 'code words' with family and friends, to help filter people from their simulations

https://www.theguardian.com/technology/2024/mar/31/openai-deems-its-voice-cloning-tool-too-risky-for-general-release

avoidthehack, to windows

Brave Browser's latest update installs services without user consent on

From @alternativeto

sigh another transparency issue from Brave.

The argument from Brave is that it is “set to manual” (so not automatically enabled) but you absolutely should prompt users first.

If I download a browser, I expect a browser - not for it to add to my VPN configuration settings without prompting first.

https://alternativeto.net/news/2023/10/brave-browser-s-latest-update-installs-vpn-services-without-user-consent-on-windows/

monkeyflower, to infosec

This may be the most poetic/ ironic screenshot of all time. 🙃

thegrugq, to opsec

If you’re interested in OPSEC you’ll find this talk extremely informative. Lots of important information on how to operate safely.

https://www.youtube.com/watch?v=9XaYdCdwiWU

avoidthehack, to random

Interview With a Investment Spammer

In light of the crypto spam campaigns that targeted various Mastodon communities.From @briankrebs

https://krebsonsecurity.com/2023/05/interview-with-a-crypto-scam-investment-spammer/

avoidthehack, to privacy

SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool

Benign (and "good") tools can be used to carry out phishing campaigns, such as this campaign targeting Canadian users who've placed legitimate orders with legitimate retailers.

https://krebsonsecurity.com/2023/06/sms-phishers-harvested-phone-numbers-shipment-data-from-ups-tracking-tool/

@briankrebs

ianonymous3000, to Cybersecurity
@ianonymous3000@mastodon.social avatar

📚 Just completed the 'Basics of Personal Threat Modeling' course by @privacyguides 🛡️

Threat modeling is crucial because it helps identify and prioritize the most probable security and privacy risks. It enables focused resource allocation, tailored defenses, and heightened awareness.

Check it out: https://learn.privacyguides.org

image/png

monkeyflower, to tech
avoidthehack, to privacy

Inside , The Tool That Lets ICE Monitor Pregnancy Tracking Sites and Fortnite Players

What a piece by @404mediaco

ShadowDragon: Feeding the mass surveillance machine by tracking people who play Fortnite (and probably, I guess, other popular online games), scraping images from BabyCenter (a site for expectant parents), and social media sites for the Black community, the bodybuilding community, and others.

ShadowDragon also has the capability to monitor/scrape information from hundreds of social media sites/games/websites. Who plays a game and expects to end up in an ICE database?

This is insane.

You are being watched.

https://www.404media.co/inside-shadowdragon-ice-babycenter-pregnancy-fortnite-black-planet/

monkeyflower, to infosec

US nuke reactor lab hit by 'gay furry hackers' demanding cat-human mutants

https://www.theregister.com/2023/11/22/nuclear_lab_hacked/

"The self-styled furry hackers meanwhile have offered to remove the staff records if the lab performs experiments that at best could be described as highly irregular.

"We're willing to make a deal with INL. If they research creating IRL catgirls we will take down this post," the group said. The creation of real cat-human female hybrids is a frequently posted meme in certain corners of the internet, but it's not the laboratory's specialty.

According to the hacktivists, the invaders gained access to "hundreds of thousands of user, employee and citizen data," among it full names, dates of birth, email addresses, social security numbers, employment info and "lots lots more!"

INL employs more than 6,100 people in and around Idaho Falls at its massive 890-square mile site, which houses the densest concentration of nuclear reactors in the world. The 70-year-old facility has been instrumental in the development of nuclear power, was the home of the first nuclear generator to provide a usable amount of electricity, and developed the first nuclear propulsion system for US Navy submarines.

It's unclear what motivated SiegedSec's attack on INL. In its previous network penetration of NATO the group attributed its actions to the military org's "attacks on human rights," adding that it's also "fun to leak documents." ®"

avoidthehack, to infosec

Ask Fitis, the Bear: Real Crooks Sign Their

Default thinking (and the intention of digital signing) should, in theory, "guarantee" the identity of developers/vendors of

Threat actors can use code signing certs to bypass common detection mechanisms - AKA your .

So, if it's signed, is it safe? Depends.

@briankrebs

https://krebsonsecurity.com/2023/06/ask-fitis-the-bear-real-crooks-sign-their-malware/

gerowen, to Facebook
@gerowen@mastodon.social avatar

If you ever want to feel depressed about humanity, just do a search for things like on your social media platform of choice. I found this one on . This guy works for a bank.

Don't be this guy. He could be impersonated, or this picture could be used as a template to forge a fake ID complete with a valid barcode to gain access to bank facilities or infrastructure.

I censored the bar code and ID#, they were visible in the original.

ths, to opsec German

wird bei unseren Behörden groß geschrieben:

„Für Aufregung in Sicherheitskreisen sorgte am Nachmittag eine vorzeitige Meldung von Bundesjustizminister Marco Buschmann. Seine Pressestelle verbreitete ein Statement zu den Festnahmen bereits zu einem Zeitpunkt, als die GSG9 noch nicht alle Beschuldigten überwältigt hatte und der Polizeieinsatz noch nicht abgeschlossen war.“

https://www.tagesschau.de/inland/gesellschaft/hamas-generalbundesanwalt-100.html

avoidthehack, to opensource

Google Threatens to Kill Front-End Invidious for Letting You Watch Videos without Tracking or Ads

Not a conspiracy theorist... but now all of a sudden, after years (or rather, the "rise of "), Big Tech wants to change/enforce API rules/pricing/you name it. Hmmm...

https://tutanota.com/blog/google-youtube-invidious-privacy-alternative

avoidthehack, to random

What are you exposing to the web?

Fingerprinting uses many different methods to pull unique characteristics about your device/browser - especially since browsers tend to be "leaky."

So, what is your device/browser sharing? This page gives you an idea.

https://personaldata.info/

avoidthehack, to infosec

Over 60,000 apps secretly installed for past six months

Fake security software - to include (not limited to) , game cheats, Netflix, and other utility apps. These in particular not directly found in the Google Play store.

Be wary when installing new apps - whether from the Google Play store or manually via APK.

https://www.bleepingcomputer.com/news/security/over-60-000-android-apps-secretly-installed-adware-for-past-six-months/

kkarhan, to languagelearning

So that's how the cracked shit...

Thanks @tails for the info:
https://tails.boum.org/security/argon2id/index.en.html

I guess a lot of people now have their weekends f**ked because they gonna need to re-encrypt shit.

Gladly I'm not affected as I user 128-digit passwords wherever possible...
https://github.com/kkarhan/misc-scripts/blob/260f087c8337417c69f94787358abf4faf5090f9/bash/.bash_aliases#L5

But a lot of you folks may be!

Please check your crypto settings NOW!

arcadetoken, to Cybersecurity
@arcadetoken@autistics.life avatar

Please be super careful using public wi-fi, even with a VPN. Zero day in existence for over 20 YEARS was announced impacting VPN use with regards to rogue or compromised DHCP servers on the LAN, which allows redirection of VPN traffic. If you can avoid public network use (i.e. using a cell service/hotspot instead of a public wifi network in a cafe, store, etc.), just avoid it. https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/?comments=1&comments-page=1

antiaall3s, to opsec
@antiaall3s@chaos.social avatar

Communication habits among leftist that i no longer understand:

Why still use twitter, instagram, facebook to promote stuff? Steal your data, you are their product.
Use the Fediverse instead. (Blsky no better)

Why still use telegram, whatsapp to chat, organise? Encryption iffy, cannot be trusted.
Use @signalapp instead.

Why still use GoogleDocs to collaborate on texts, documents? Steal your data, track you.
Use @cryptpad instead.

We have the tools for better .

MagicLike, to hosting
@MagicLike@mstdn.social avatar

I got a DM about how to host a Website as anonymous as possible, especially viewed from the outside with as little attack surface as possible. I already threw a bunch of my ideas in the room, but maybe you can think of something I haven't thought of...
Please just answer to this post if something crosses your mind from security over hoster to the website itself, I will link it to the person.

:boost_requested:

@askfedi

xyhhx, to opsec
@xyhhx@438punk.house avatar

re: my recent boost (linked below)

mics (machine identification code) are nearly invisible marks most printers add to anything they print, as a means of tracking where each peice of printed material was printed from - down to the exact printer. not model, the individual printer

it's allegedly to curb counterfeit money, but obviously it can be used to connect material you print for, say, activism or political stuff down to the exact printer you used. if you're going to bureau en gros to print, or if you used a printer you bought, it can be traced to you

the @eff has some material that tried to identify printers that do or do not use mics, but it's no longer maintained:

https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots

makeuseof.com has another informative article on the subject including possible mitigations:

https://www.makeuseof.com/machine-identification-codes-printer-privacy-risk/

some mitigations they suggest include:

these are both only useful to technically savvy people i think tho

anyway stay vigilant gang

#opsec #privacy #activism

https://infosec.exchange/@jxhn/112400527690021252

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • cubers
  • osvaldo12
  • mdbf
  • magazineikmin
  • normalnudes
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • khanakhh
  • ethstaker
  • Leos
  • ngwrru68w68
  • everett
  • cisconetworking
  • tacticalgear
  • anitta
  • thenastyranch
  • Durango
  • tester
  • GTA5RPClips
  • modclub
  • megavids
  • provamag3
  • lostlight
  • All magazines