Search

Items tagged with: CyberSecurity


Big F5 stuff dropping, starting with disclosure of incident and 8K filing. If you've got F5 in your stack, you're going to want to brew more coffee. No, more than that.

Keep going.

#threatintel #cybersecurity #infosec

infosec.exchange/@cR0w/1153783…


The #Signal App gets only a 9 out of 10 for #Privacy protection, and it's not just because it requires a phone number.

"While most of Google’s analytics are turned off in the Signal app, it still uses the Google Maps API to handle location data. Calls to Google Maps turn over a bunch of metadata, including the IP you’re connecting from. For a project that’s so invested in privacy, it’s surprising that Signal doesn’t use an open source alternative such as Open Street Map."

They call a Google API with location data and hand over the IP? Seriously?

mozillafoundation.org/en/nothi…

#cybersecurity


Microsoft Office 2016 and Office 2019 are no longer receiving software updates, technical support, or bug and security fixes.

Consider migrating to LibreOffice.

Microsoft recommends migrating to a Microsoft 365 subscription.

LibreOffice supports the features that a majority of users need for free.

Website: libreoffice.org
Mastodon: @libreoffice

4/4

#Microsoft #Office2016 #Office2019 #Office #LibreOffice #Privacy #InfoSec #CyberSecurity #Encryption #FOSS #FreeSoftware #OpenSource


šŸŽ£ Phishing Alert!

Malicious attackers use lookalike domains to trick you into clicking fake links. These sites steal logins, banking info & more.

šŸ›”ļø Stay safe:
šŸ”¹ Double-check URLs
šŸ”¹ Don’t log in via links
šŸ”¹ Bookmark official sites

šŸ‘‰ Check the full guide: tuta.com/blog/how-to-prevent-p…

Stay alert this #CyberSecurityMonth

#CyberSecurity #Phishing



If President Trump can authorize the killing of civilians in international waters without credible justification, lawful arrest, or due process, we should have no illusions about the U.S. government’s ability to access our clouddata or about the true value of legal safeguards.
#cloud #trump #ICT #cybersecurity


Poll: How many screens do you work with? šŸ–„ļø

Vote + Boost šŸ” = ā¤ļø

(Feel free to reply with how this setup helps you šŸ‘‡)

#Linux #Arch #LinuxMint #Fedora #Debian #Ubuntu #Desktop #FOSS #Privacy #Security #OpenSource #Microsoft #Windows #TechNews #CyberSecurity #Tech #Technology #Apple #OS #iOS #MacOS #OperatingSystem #Monitor #Monitors #Screen #Screens #TV #OLED #2k #4k #HD #Job #Work #Productivity #Multitasking #Dev #DevOps #Development #Developers #DevLife #SysAdmin #TechCommunity

  • šŸ§ Just 1 screen (0 votes)
  • šŸ§‘ā€šŸ’» Dual setup (2) (0 votes)
  • 🧠 Triple or more (0 votes)
Poll end: 1 month ago


šŸ” Tuta Mail introduces key verification to strengthen end-to-end encryption and defend against MITM attacks šŸ‘„
Users can now verify contacts’ public keys via QR code or manual comparison.
If skipped, Tuta defaults to TOFU (Trust On First Use) for seamless encryption 🧩

@Tutanota
šŸ”— tuta.com/blog/key-verification

#Encryption #CyberSecurity #Privacy #Tuta #Tutanota #TutaMail #EmailSecurity #OpenSource #FOSS #E2EE #PGP #Email #Mail #TechNews #DataProtection #Crypto #DigitalRights #OnlinePrivacy


I DID IT!

Dewey invented the Dewey Decimal System, Morse invented the Morse Code, Plato invented the plate. I, influenced by what I saw at a #CyberSecurity conference I have designed and dedicated to the Public Domain the penultimate way to get removed from #infosec sales offerings.

I present to you the "No Purchasing Authority" seal. Put it on a button, wear it as a sticker, respond to emails with it. Regardless, this helps you and the sales person understand that this relationship is going nowhere.




Adobe is now processing all your PDFs in the cloud, by default. The setting to ā€œEnable generative AI features in Acrobatā€ was on, and I didn’t know it until I opened a document and Adobe asked me if I wanted a document summary. It’s annoying to have to click ā€œNo,ā€ so I opened settings to disable the prompt.

THE PROBLEM
I sign Non-Disclosure Agreements for many of my clients. Adobe is a potential leak of protected information. I don’t know what Adobe does with this information. I don’t know what they store, or for how long. I don’t know what country (or countries) the data is stored in. I don’t know what LLMs are trained with this data. And I don’t need to know. What I need to know is that they won’t use default opt-in as a legal excuse to wiretap my information.

I recommend that you check your Adobe settings on all devices, for all Adobe accounts.

#CallMeIfYouNeedMe #FIFONetworks

#cybersecurity


Startpage is a search engine that has been promoted as a European alternative to Google Search.

This is a misleading statement.

CLARIFICATION

Headquartered in the Netherlands.

Owned by System1: mastodon.online/@blueghost/111…

Revenue is consolidated with System1's financial statements.

System1 supports employee salaries, technology investments, and marketing initiatives.

Source: support.startpage.com/hc/artic…

Website: startpage.com

#Startpage #StartpageSearch #Privacy #InfoSec #CyberSecurity


How can Europe better secure the open #digitalinfrastructure that underpins its public services, or #digitaleconomy?

We are delighted to announce the next #EOSA Webinar, #OpenSource for #Cybersecurity: Securing and Maintaining Europe's Open Source Dependencies.
This webinar looks at how Europe's cybersecurity and digital policy agendas are increasingly intertwined.

Learn more and register today: tinyurl.com/yf7xyadr


FBI Warning on Messaging Apps: Time to Rethink What "Secure" Really Means

The FBI recently urged Americans to switch from SMS to encrypted messaging apps like WhatsApp and Signal.

Read More at: puri.sm/posts/fbi-raises-alarm…

#Cybersecurity #Privacy #Surveillance #Signal #WhatsApp


šŸ”„ The EU Vulnerability Database (EUVD) is LIVE at euvd.enisa.europa.eu/homepage šŸ‡ŖšŸ‡ŗšŸ’Ŗ

Finally, we've got our OWN vulnerability tracking system that's not dependent on …

Three awesome dashboards: critical vulns, actively exploited stuff, and EU-coordinated disclosures. … intel we need to patch our systems PROPERLY!

This is digital sovereignty and resilience in action, folks! No more single points of failure in global vuln tracking. šŸ§™ā€ā™‚ļøšŸ–„ļø

#Cybersecurity #EUVD #DigitalSovereignty #FOSS #NIS2


Privacy is calling. Will you answer?

Ditch surveillance phones.

Try the Librem 5 + AweSIM — privacy-first smartphone + service.

āœ… Unlimited talk, text, & data
āœ… Built on PureOS (open-source Linux)
āœ… Your data ≠ their profit
āœ… No contracts, no ads, no spyware

Big carriers track your every move.

AweSIM shields your identity from Big Tech & foreign surveillance.

Take back control: puri.sm/products/librem-awesim…

#PrivacyMatters #CyberSecurity #LinuxPhone #SurveillanceCapitalism #Librem5 #AweSIM


The Liberty Phone delivers uncompromising security for government communications- No Surveillance.

Link to Video: puri.sm/posts/the-liberty-phon…

#LibertyPhone #MadeInUSA #SupplyChainSecurity #OpenSource #PureOS #EndToEndEncryption #HardwareSecurity #GOTSSolution #CyberSecurity


ļ½¢ Finland, Sweden, Norway, Denmark and Estonia are rolling out offline card payment systems to provide a back-up if internet connections are lost, including due to sabotage, Bank of Finland board member Tuomas Valimaki said on Wednesday ļ½£

reuters.com/business/finance/n…

#cybersecurity #estonia


This dumb password rule is from Polytechnique Montreal.

Passwords must have a minimum length of 8 characters

Passwords must have a maximum length of 30 characters

Passwords must contain a minimum of 2 digits

Passwords must contain a minimum of 2 letters

Password must be different than the last one used

Passwords may contain these special characte...

dumbpasswordrules.com/sites/po…

#password #passwords #infosec #cybersecurity #dumbpasswordrules


Python now ships with 15,000 lines of verified cryptographic code from HACL*, covering all default hash and HMAC algorithms. The integration was seamless and automated, aiming to eliminate bugs like the 2022 SHA3 CVE. A major milestone for verified crypto in mainstream software.

jonathan.protzenko.fr/2025/04/…

#Python #CyberSecurity #Cryptography #AppSec


Outstanding and alarming reporting by @npr here on what appears to be major violations of security and data privacy protocol by the DOGE folks on National Labor Relations Board Data. Big props to the brave whistleblower, Daniel Berulis, who has come forward despite receiving threatening notes with personal information and pictures taken from overhead (drones?) of him walking his dog.
npr.org/2025/04/15/nx-s1-53558…
#cybersecurity #doge #privacy


🧠 Microsoft is reintroducing Recall in Windows 11 — a feature that captures screenshots every 3 seconds of your activity to create an AI-powered memory. What could go wrong?

It now includes:
šŸ” Opt-in only
šŸ“ Local device processing
šŸ§‘ā€šŸ’» Windows Hello authentication

But many still ask: is it a productivity boost or a privacy liability? 😳
Even with safeguards, the idea of your system quietly watching everything you do raises serious concerns about digital trust.

#Privacy #Windows11 #AI #Cybersecurity #TechNews
arstechnica.com/security/2025/…



šŸ›”ļø#Curl has been around for 26 years—and it’s still secure! How?

European Open Source Academy member, @bagder Stenberg, joined the latest episode of Security Weekly Productions, discussing how Curl and #libcurl have maintained security and reliability over decades.

A must-listen for #developers and #cybersecurity enthusiasts! šŸ‘Øā€šŸ’»šŸ”’

šŸ“ŗ Explore the episode : youtube.com/watch?v=0UavY_kKKic

šŸ‘‰ Learn more about the Academy : europeanopensource.academy/new…

#CyberSecurity #CurlProject #AppSec


So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use.

Let me put the important words in uppercase.

So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use.

[Edit with H/T: benjojo.co.uk/u/benjojo/h/cR4d…]

blog.cloudflare.com/password-r…

#cloudflare #password #cybersecurity


"Google refuses to deny it received encryption order from UK government"

The UK’s encryption-breaking order for a backdoor into iCloud isn’t a one-off.

The secret hearing happening RIGHT NOW is bigger than just Apple. If the government wins, our right to privacy and security falls.

Other services will be hit.

therecord.media/google-refuses…

Sign our petition āž”ļø you.38degrees.org.uk/petitions…

#e2ee #encryption #apple #google #privacy #security #cybersecurity #ukpol #ukpolitics #tech


This dumb password rule is from TreasuryDirect.

Will allow most passwords longer than 8 characters. Doesn't tell you there is a
maximum length of 16 characters. Then forces you to type it with an on-screen keyboard
with no capital letters.

dumbpasswordrules.com/sites/tr…

#password #passwords #infosec #cybersecurity #dumbpasswordrules


šŸ“£ Break the silence: Save encryption!

The UK government wants to be able to access anything, anywhere, any time — from your pics to your docs.

It begins with Apple. Other services will be next. That's why we must take a stand NOW!

Sign and share our petition ā¬‡ļø

you.38degrees.org.uk/petitions…

#encryption #e2ee #Apple #privacy #security #cybersecurity #ukpolitics #ukpol #icloud #tech


The message is clear across the political divide: let's hear it!

The UK government should argue in open court why they want to make us less secure by ordering a backdoor into Apple encryption.

A secret Tribunal would be an affront to the privacy and security issues at stake. It must be held in public.

Read the joint letter from ORG, Big Brother Watch and Index on Censorship ā¬‡ļø

openrightsgroup.org/press-rele…

#Apple #encryption #e2ee #privacy #security #cybersecurity #ukpol #ukpolitics #tech


Bipartisan US Congress Members want the secrecy around the UK's encryption-breaking order to be lifted.

"It is imperative that the UK's technical demands of Apple - and of any other US companies - be subjected to robust, public analysis and debate."

ā€œSecret court hearings featuring intelligence agencies and a handful of individuals approved by them do not enable robust challenges on highly technical matters.ā€

wyden.senate.gov/news/press-re…

#encryption #e2ee #Apple #privacy #security #cybersecurity


UK MPs have joined the chorus of voices wanting the Apple case to be held in public.

"If the Home Office wants to have effectively unfettered access to the private data of the (innocent) general public, they should explain their case in front of the public."

šŸ—£ļø David Davis MP.

"People deserve to know what's happening to their private personal information."

šŸ—£ļø Victoria Collins MP.

news.sky.com/story/apple-vs-ho…

#encryption #e2ee #Apple #privacy #security #cybersecurity #ukpolitics #ukpol


šŸ“£ Make it public!

The call is getting louder for a public hearing of the appeal over the UK's order to break Apple encryption.

Alongside the joint letter from ORG, Big Brother Watch and Index on Censorship, UK MPs, US Congress Members and the BBC want the secrecy to end.

bbc.co.uk/news/articles/c4g0rr…

#encryption #e2ee #privacy #security #cybersecurity #ukpol #ukpolitics #Apple #tech

⇧