Everybody should learn how to use GPG.
#gpg #gnupg #encryption #security #privacy #cybersecurity #linux #pgp
Everybody should learn how to use GPG.
#gpg #gnupg #encryption #security #privacy #cybersecurity #linux #pgp
š If Privacy is outlawed...
Here's how you can stop them: š t.co/8z8lI9eRDo
#PrivacyMatters #Encryption #CyberSecurity #TurnOnPrivacy #PGP
An amendment to the āNarcotraficā law is moving to the French National Assembly. Remind your legislators that a backdoor for the good guys only is not possible.Tuta
Hier kƶnnt ihr unser aktuelles Spotlight-Interview mit @Tutanota, einer datenschutzfreundlichen E-Mail-, Kalender- und Kontaktlƶsung aus Deutschland lesen:
blog.iode.tech/de/tuta-datenscā¦
#tuta #spotlight #privacy #cybersecurity #opensource #datenschutz
February 16th #BlackHistoryMonth spotlight:
Get to know @blackgirlshack!
"BlackGirlsHack meets the #InfoSec needs left unmet by existing services by providing hands-on skills that are focused on people who are upskilling and reskilling in #cybersecurity."
BlackGirlsHack is the leading cybersecurity training nonprofit in the country. The nonprofit organization, which is open to all, provides training, career services, study groups, and resources people looking to upskill and reskill in technology and cā¦blackgirlshack.org
"The consensus among cybersecurity experts could not be clearer:
There is no way to provide government access to end-to-end encrypted data without breaking end-to-end encryption, thus putting every userās security and privacy at risk."
Join the voice of experts in the joint letter to stop the UK's order to break encryption ā Sign and share our petition today ā¬ļø
#encryption #privacy #Apple #cybersecurity #ukpolitics #ukpol
you.38degrees.org.uk/petitionsā¦
It is reported that the Home Office has ordered Apple to build a backdoor into its encrypted services so that they can get hold of content that any Apple user has upload to the cloud. Encryption keeps our private information safe and secure.38 Degrees
ORG and over 150 signatories call on the UK government to RESCIND its demand to create a backdoor to Apple encryption.
It "jeopardises the security and privacy of millions, undermines the UK tech sector, and sets a dangerous precedent for global cybersecurity."
"The worldās second-largest provider of mobile devices would be built on top of a systemic security flaw, putting all of its usersā security and privacy at risk."
#encryption #privacy #cybersecurity #ukpolitics
globalencryption.org/2025/02/jā¦
On 13 February 2025, 109 civil society organizations, companies, and cybersecurity experts, including Global Encryption Coalition members, published a joint letter to the British Home Secretary Yvette Cooper calling on the UK Home Office to rescind iā¦Ryan Polk (Global Encryption Coalition)
Unbelievable
#ElonMuskās US #DOGE Service are feeding sensitive data into #AI software via #Microsoftās #cloud
#Muskās US #DOGE Service have fed sensitive data from across the #Education Dept into #ArtificialIntelligence software to probe the agencyās programs & spendingā¦.ā©The AI probe includes data w/personally identifiable info for people who manage grants, & sensitive internal financial dataā¦
#law #security #InfoSec #CyberSecurity #NationalSecurity #Trump #TrumpCoup
washingtonpost.com/nation/2025ā¦
This is what I think about whenever infosec wonks on here start telling people they should use matrix or xmpp+omemo or whatnot instead of signal
To be fair, I understand the arguments and to a large extent I agree with the critiques. However, I think anyone making these recommendations is vastly underestimating the capacity or appetite for most people to deal with the user experiences presented by these alternatives.
User experience is the ultimate force multiplier. For anything that requires network effects to function (ie most anything involving communication), if it doesn't *just work* then you've lost 90% of your audience.
#matrix #xmpp #infosec #cybersecurity #signal #ux #design #ui #encryption #privacy #crypto
Via Tom's Hardware: Facebook flags Linux topics as 'cybersecurity threats' ā posts and users being blocked
Does this mean that Meta/Facebook is going to also ban mentions of:
What an absolutely asinine thing to do. Linux is incredibly prevalent in the technology landscape today. Yes, #linux on the desktop is a small percentage of the overall devices on the market today. However, linux usage in #embedded, #server, and #appliance applications is to a level where censoring references to it is insanity.
The irony of all of this? Zuckerfaces recent pull back of moderation on Meta's sites.... Meaning it's now okay to bash socially vulnerable populations, spread tons of mis-information on many social and political topics... But linux?"Oh no! That's a #CyberSecurity threat!"
This reeks of political #tomfoolery. I won't be surprised if it's eventually revealed that our new overlords put pressure on #Meta to #censor linux.
tomshardware.com/software/linuā¦
DistroWatch is one of the largest affected organizations.Mark Tyson (Tom's Hardware)
Let's say China manages to get just a little bit of data about people from just a few of these ... š
"China's overlapping tech-industrial ecosystems"
high-capacity.com/p/chinas-oveā¦
#cybersec #cybersecurity #infosec #itsec #china #privacy #gdpr #dataprotection #dataskydd
EVs, batteries, lidar, drones, robotics, smartphones, AI. China's progress across a range of overlapping industries creates a mutually reinforcing feedback loop.Kyle Chan (High Capacity)
Thinking about a new Linux laptop to run Linux on? Going with Linux laptop vendors can be a good option as they offer seamless hardware-software integration, pre-installed Linux distros, and guaranteed driver compatibility. Here are available Linux laptop vendors šš
Find high-res pdf books with all my #linux and #cybersecurity related infographics at study-notes.org
Explore high-quality infographics on Linux, cybersecurity, and networking. Perfect for certifications, technical knowledge, and tech career upskilling.study-notes.org
Microsoft Office 2016 and Office 2019 will no longer receive software updates, technical support, or bug and security fixes after 14.10.2025.
Consider migrating to LibreOffice.
LibreOffice is free to use.
LibreOffice supports Office file formats.
Install LibreOffice and compare it with your version of Office.
Website: libreoffice.org
Mastodon: @libreoffice
1/4
#Microsoft #Office2016 #Office2019 #Office #LibreOffice #CyberSecurity #Privacy #InfoSec #FreeSoftware #OpenSource #FOSS
Free office suite ā the evolution of OpenOffice. Compatible with Microsoft .doc, .docx, .xls, .xlsx, .ppt, .pptx. Updated regularly, community powered.www.libreoffice.org
Think twice before scanning QR codes: 60% of them are spam. Be careful when travelling for business, too - scammers are even putting fake QR codes on parking meters. Stay cautious to protect your business data
#QRCodes #PhishingScam #CyberSecurity techradar.com/pro/security/theā¦
Almost 60% of emails with a QR code are spam, so be on your guardEllen Jennings-Trace (TechRadar pro)
Wow. US CISA recommends using end to end encrypted mobile communications.
Found this via @Tutanota blog
cisa.gov/sites/default/files/2ā¦
Short passwords are an open door for hackers. šµļø š
š Longer = Stronger.
How long is yours?
š Learn more & secure your accounts today: tuta.com/blog/minimum-passwordā¦
Why password length matters for online security & best practices to protect your online accounts.Tuta
Governments need digitally sovereign, secure and interoperable communications. The demand for Matrix is palpable.Steve Loynes (Element Blog)
This dumb password rule is from Xfinity Modem.
Only letters and numbers are valid. No spaces or special characters.
Seen on model TG3482G. ARRIS Group, Inc. Firmware: TG3482PC2_3.5p17s1_PROD_sey
dumbpasswordrules.com/sites/xfā¦
#password #passwords #infosec #cybersecurity #dumbpasswordrules
Only letters and numbers are valid. No spaces or special characters. Seen on model TG3482G. ARRIS Group, Inc. Firmware: TG3482PC2_3.5p17s1_PROD_seydumbpasswordrules.com
This dumb password rule is from Oracle.
*Should not* or *must not*? RFC 2119 may want a word with you.
dumbpasswordrules.com/sites/orā¦
#password #passwords #infosec #cybersecurity #dumbpasswordrules
This dumb password rule is from MySwissLife.
User ID *has to* be 8 characters exactly, password *has to be* 8 characters and numbers only.
dumbpasswordrules.com/sites/myā¦
#password #passwords #infosec #cybersecurity #dumbpasswordrules
Important reminder, if you own a domain name and don't use it for sending email.
There is nothing to stop scammers from sending email claiming to be coming from your domain. And the older it gets, the more valuable it is for spoofing. It could eventually damage your domain's reputation and maybe get it blacklisted, unless you take the steps to notify email servers that any email received claiming to come from your domain should be trashed.
Just add these two TXT records to the DNS for your domain:
TXT v=spf1 -all
TXT v=DMARC1; p=reject;
The first says there is not a single SMTP server on earth authorized to send email on behalf of your domain. The second says that any email that says otherwise should be trashed.
If you do use your domain for sending email, be sure to add 3 records:
SPF record to indicate which SMTP server(s) are allowed to send your email.
DKIM records to add a digital signature to emails, allowing the receiving server to verify the sender and ensure message integrity.
DMARC record that tells the receiving email server how to handle email that fails either check.
You cannot stop scammers from sending email claiming to be from your domain, any more than you can prevent people from using your home address as a return address on a mailed letter. But, you can protect both your domain and intended scam victims by adding appropriate DNS records.
UPDATE: The spf and the dmarc records need to be appropriately named. The spf record should be named "@", and the dmarc record name should be "_dmarc".
Here's what I have for one domain.
One difference that I have is that I'm requesting that email providers email me a weekly aggregated report when they encounter a spoof. gmail and Microsoft send them, but most providers won't, but since most email goes to Gmail, it's enlightening when they come.
#cybersecurity #email #DomainSpoofing #EmailSecurity #phishing
#curl 8.11.1 has been released. It includes a fix to #CVE_2024_11053 - a #vulnerability I discovered.
It is a logic flaw in the way curl parses .netrc file. In certain situations, the configured password can be sent to a incorrect host. Luckily the affected configurations should be quite rare and thus the situation is unlikely to occur often.
The issue has existed in the curl source code for almost twenty-five years.
⢠curl.se/docs/CVE-2024-11053.htā¦
⢠hackerone.com/reports/2829063
No AI tools were used in discovering or reporting the vulnerability.
šØ Are your passwords long enough?
Our survey shows 16% of Tuta users use passwords under 10 characters!
NIST & CISA recommend at least 16 to defend against malicious attackers & modern threats like quantum computing.
š Protect your data: tuta.com/blog/minimum-passwordā¦
Why password length matters for online security & best practices to protect your online accounts.Tuta
šØ Biggest US Hack in History! šØ
If China can breach US telcos, whatās stopping them from exploiting encryption backdoors? Nothing.
Backdoors donāt make us safer - they put everyone at risk.
Demand #PrivacyFirst: Say NO to backdoors! š
Read more here: tuta.com/blog/china-salt-typhoā¦
#Cybersecurity #Encryption #Privacy #StopBackdoors
Salt Typhoon has infiltrated major telecom networks, proving backdoors to encryption are a catastrophic risk.Tuta
Repeat offenders drive bulk of tech support scams via #Google #Ads
"Search engines, and Googleās in particular, are our gateway to the web. Yet, that door sometimes opens up to unsavory places thanks to sponsored search results, AKA ads."
This is part of the reason I recommend using an #adblocker (whether in browser, on device, or network-based.)
#cybersecurity #scams #security #privacy
malwarebytes.com/blog/scams/20ā¦
Consumers are getting caught in a web of scams facilitated by online ads often originating from the same perpetrators.JƩrƓme Segura (Malwarebytes)
Google's dark web report helps track whether personal information, such as your name, address, phone number, or email, was leaked in a data breach.Ana Altchek (Business Insider)
Get ready for the transition to @thunderbird mobile!
blog.iode.tech/get-ready-for-tā¦
#thunderbird #android #rom #privacy #cybersecurity #adblocker #iodƩ #degoogle #opensource
We will replace pā”p (pretty easy privacy), our default email app, with Thunderbird. Here's all you need to know for the transition.antoine (iodĆ©)
Wild ass day in the Tor node operator world. Got an email from my VPS, forwarding a complaint from WatchDog CyberSecurity saying that my box was scanning SSH ports!
> Oh no, oh no, I knew I should have set up fail2ban, oh god why was I so lackadaisical!
So I remote in to the machine: no unusual network activity, no unusual processes, users, logins, command history, no sign that anything is doing anything I didn't tell it to do.
So what's up? Turns out there's been a widespread campaign where some actor is spoofing IPs to make it look like systems running Tor are scanning port 22: forum.torproject.org/t/tor-relā¦
Operators from all over are saying they're getting nastygrams from their VPS providers because WatchDog is fingering their source IPs (which are being spoofed and NOT part of a global portscanning botnet).
@delroth did an amazing writeup of the whole thing here: delroth.net/posts/spoofed-massā¦
#tor #infosec #cybersecurity #threatintel #privacy
It would be hard to explain to Verizon I run Tor relays since they technically don't allow servers. I hope I'm not forced onto AT&T Internet Air as my particular co-op rental unit won't let met get Spectrum even when other units can, not that I wanteā¦Tor Project Forum
Happy birthday to ARPANET, the forerunner of the modern internet! 53 years ago, the first message was sent over this pioneering network, paving the way for a world of interconnection and innovation.
As a tech enthusiast, I am constantly amazed by the ways the internet has transformed our lives, allowing us to communicate, learn and share ideas across boundaries and borders. From social media to e-commerce, from telemedicine to remote work, the internet has become an essential part of our daily routines, enabling us to connect with others and access a wealth of information at our fingertips.
#ARPANET #InternetAnniversary #Transhumanism #TechInnovation
#InternetHistory #Networking #DigitalRevolution #Innovation #Communication #Cyberculture #OnlineCommunity #TechHerstory #NetNeutrality #OpenSource #Decentralization #DataPrivacy #Cybersecurity #DigitalRights #Accessibility #Inclusion #SocialImpact #DigitalTransformation #FutureTech #TechOptimism #InternetOfThings #AI
š¦¾6 AI Tos Used by Hackers
š¹Poisongpt
š¹Wormgpt
š¹Speechif.ai
š¹Deepl.ai
š¹Freedom.ai
š¹Passgan.ai
š#infosec #cybersecurity #hacking #pentesting #security
To better manage growing responsibilities, 84% of CISOs believe the role should be split into technical (CISO) and business-focused roles.Help Net Security
ICYMI: Internet Archive hacked, data breach impacts 31 million users
1. Nobody is safe.
2. A non-profit is using bcrypt to hash passwords, no reason why your for-profit company can't do the same.
American Water shuts down online services after #cyberattack
American Water is the largest water and wastewater treatment utility in the USā¦
OT systems not affected - so appears this only affects their IT systems. Suspected nation state activity (Russia).
(I encourage everyone sharing this with their friends because cyber attacks absolutely can have direct āreal worldā consequences.)
T-Mobile reaches $31.5 million settlement with FCC over past data breaches
Apparently, T-mobile is now mandated to implement better cybersecurity controls, such as properly segmenting networks and using phishing resistant #MFA.
This settlement covers the breaches in 2021, 2022, and 2023. Will we get a 2024 special? š
Today I made my threat hunt book publicly known on LinkedIn. So far the feedback has been overwhelming. I do hope my efforts will contribute to educate both threat hunters and SOC analysts!
Tor insists its #network is safe after German cops convict CSAM dark-web admin
Kind of boils down to opsec fail here. Using outdated software, which in this case didnāt properly secure Tor connections.
Timing attacks are still viable (especially with hostile nodes), but this reads as an #opsec fail to me.
Remember: a major part of anonymity is maintaining great opsec.
Obligatory: Tor is not ājust for criminals,ā despite one getting caught in this case (glad he did tbh). Regular people use Tor everyday.
#cybersecurity #security #privacy
theregister.com/2024/09/19/torā¦
Outdated software blamed for cracks in the armorIain Thomson (The Register)
Say it with me...
Network vulnerability!!!
A quick story/rant.. my cousin got my mother a new coffee maker. I don't expect my mom to use the WiFi functionality, but I'm still concerned about why we would need a whole coffee maker to have a small computer in it... I understand the versatility of not having a hub, and that hubs are also a single point of access for any malicious actors, but I'm sure a hub for multiple devices instead of a thing for a coffee maker would be updated much more frequently, and supported for longer.
If nothing else, maybe I can pull it into my janky Home Assistant setup somehow.
Even if it doesn't end up being a gateway for snooping on home network, it is quite silly, in my opinion.
Now, I must go check to see if anyone's hacked at these yet lol...
#NetSec #Networking #cybersecurity #cybersec #IoT #smarthome #coffee #keurig #hacking