SMS 2FA isn’t just insecure—it’s inaccessible. In rural Appalachia, lack of cell coverage means locked accounts, missed codes, and no way in without driving to town. A tech barrier dressed up as a security feature.
Search
Items tagged with: cybersecurity
🔥 The EU Vulnerability Database (EUVD) is LIVE at euvd.enisa.europa.eu/homepage 🇪🇺💪
Finally, we've got our OWN vulnerability tracking system that's not dependent on …
Three awesome dashboards: critical vulns, actively exploited stuff, and EU-coordinated disclosures. … intel we need to patch our systems PROPERLY!
This is digital sovereignty and resilience in action, folks! No more single points of failure in global vuln tracking. 🧙♂️🖥️
Privacy is calling. Will you answer?
Ditch surveillance phones.
Try the Librem 5 + AweSIM — privacy-first smartphone + service.
✅ Unlimited talk, text, & data
✅ Built on PureOS (open-source Linux)
✅ Your data ≠ their profit
✅ No contracts, no ads, no spyware
Big carriers track your every move.
AweSIM shields your identity from Big Tech & foreign surveillance.
Take back control: puri.sm/products/librem-awesim…
#PrivacyMatters #CyberSecurity #LinuxPhone #SurveillanceCapitalism #Librem5 #AweSIM
The Liberty Phone delivers uncompromising security for government communications- No Surveillance.
Link to Video: puri.sm/posts/the-liberty-phon…
#LibertyPhone #MadeInUSA #SupplyChainSecurity #OpenSource #PureOS #EndToEndEncryption #HardwareSecurity #GOTSSolution #CyberSecurity
The Liberty Phone: Secure Government Mobility – Purism
Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security.Purism SPC
「 Finland, Sweden, Norway, Denmark and Estonia are rolling out offline card payment systems to provide a back-up if internet connections are lost, including due to sabotage, Bank of Finland board member Tuomas Valimaki said on Wednesday 」
The Liberty Phone delivers uncompromising security for government communications- No Surveillance.
puri.sm/products/liberty-phone…
#LibertyPhone #SecureGovMobile #MadeInUSA #SupplyChainSecurity #OpenSource #PureOS #EndToEndEncryption #HardwareSecurity #GOTSSolution #CyberSecurity
This dumb password rule is from Polytechnique Montreal.
Passwords must have a minimum length of 8 characters
Passwords must have a maximum length of 30 characters
Passwords must contain a minimum of 2 digits
Passwords must contain a minimum of 2 letters
Password must be different than the last one used
Passwords may contain these special characte...
dumbpasswordrules.com/sites/po…
#password #passwords #infosec #cybersecurity #dumbpasswordrules
Polytechnique Montreal - Dumb Password Rules
Passwords must have a minimum length of 8 characters Passwords must have a maximum length of 30 characters Passwords must contain a minimum of 2 digits Passwords must contain a minimum of 2 letters Password must be different than the last one use…dumbpasswordrules.com
Long passwords are important.
Source: reddit.com/r/dataisbeautiful/c…
#tech #technology #encryption #password #passwords #Security #cybersecurity #computing #computers #computer
Python now ships with 15,000 lines of verified cryptographic code from HACL*, covering all default hash and HMAC algorithms. The integration was seamless and automated, aiming to eliminate bugs like the 2022 SHA3 CVE. A major milestone for verified crypto in mainstream software.
jonathan.protzenko.fr/2025/04/…
#Python #CyberSecurity #Cryptography #AppSec
15,000 lines of verified cryptography now in Python
In November 2022, I opened issue 99108 on Python’s GitHub repository, arguing that after a recent CVE in its implementation of SHA3, Python should embrace verified code for all of its hash-related infrastructure.Jonathan Protzenko
npr.org/2025/04/15/nx-s1-53558…
#cybersecurity #doge #privacy
🧠 Microsoft is reintroducing Recall in Windows 11 — a feature that captures screenshots every 3 seconds of your activity to create an AI-powered memory. What could go wrong?
It now includes:
🔐 Opt-in only
📍 Local device processing
🧑💻 Windows Hello authentication
But many still ask: is it a productivity boost or a privacy liability? 😳
Even with safeguards, the idea of your system quietly watching everything you do raises serious concerns about digital trust.
#Privacy #Windows11 #AI #Cybersecurity #TechNews
arstechnica.com/security/2025/…
That groan you hear is users’ reaction to Recall going back into Windows
Snapshotting and AI processing a screen every 3 seconds. What could possibly go wrong?Dan Goodin (Ars Technica)
Woke this morning with an email from #Scotia bank about my account. I don't have a Scotia account.
Usually, I ignore these as phishing, but I have a #Thunderbird add-on that tells me when SPF and DKIM pass. And the "from" domain was truly scotia bank. So, yes, it did come from them.
Spent 30 minutes on the phone bouncing around, queuing and waiting while they checked. Their conclusion is that their customer carelessly entered my email address instead of their own, and they will contact the customer.
Two things.
Email addresses should always be validated with an OTP. When will banks learn this?
Second: Some people are a pain in the ass.
#Tuta birthday sale: 62% off Legend plan
tuta.com/special-offer/?t-src=…
#email #privacy #cybersecurity
Tuta: Turn ON privacy for free with secure emails, calendars & contacts | Tuta
Tuta guarantees your data stays private for free & without ads. Quantum-resistant encryption makes Tuta the best secure technology solution to protect your privacy.Tuta
This dumb password rule is from Bank Millennium.
Passwords limited to 8 digits.
dumbpasswordrules.com/sites/ba…
#password #passwords #infosec #cybersecurity #dumbpasswordrules
🛡️#Curl has been around for 26 years—and it’s still secure! How?
European Open Source Academy member, @bagder Stenberg, joined the latest episode of Security Weekly Productions, discussing how Curl and #libcurl have maintained security and reliability over decades.
A must-listen for #developers and #cybersecurity enthusiasts! 👨💻🔒
📺 Explore the episode : youtube.com/watch?v=0UavY_kKKic
👉 Learn more about the Academy : europeanopensource.academy/new…
#CyberSecurity #CurlProject #AppSec
Open Source in Europe Enters a New Era with a Successful First European Open Source Awards Ceremony | European Open Source Academy
A significant milestone for the European open source community was reached on January 30, 2025, when the European Open Source Awards (OSAwards 2025) celebrated the launch of the European Open Source Academy with the Inaugural Ceremony.europeanopensource.academy
So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use.
Let me put the important words in uppercase.
So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use.
[Edit with H/T: benjojo.co.uk/u/benjojo/h/cR4d…]
blog.cloudflare.com/password-r…
#cloudflare #password #cybersecurity
Password reuse is rampant: nearly half of observed user logins are compromised
Nearly half of observed login attempts across websites protected by Cloudflare involved leaked credentials. The pervasive issue of password reuse is enabling automated bot attacks and account takeovers on a massive scale.The Cloudflare Blog
"Google refuses to deny it received encryption order from UK government"
The UK’s encryption-breaking order for a backdoor into iCloud isn’t a one-off.
The secret hearing happening RIGHT NOW is bigger than just Apple. If the government wins, our right to privacy and security falls.
Other services will be hit.
therecord.media/google-refuses…
Sign our petition ➡️ you.38degrees.org.uk/petitions…
#e2ee #encryption #apple #google #privacy #security #cybersecurity #ukpol #ukpolitics #tech
Google refuses to deny it received encryption order from UK government
U.S. lawmakers say Google has refused to deny that it received a Technical Capability Notice from the U.K. — a mechanism to access encrypted messages that Apple reportedly received.therecord.media
This dumb password rule is from TreasuryDirect.
Will allow most passwords longer than 8 characters. Doesn't tell you there is a
maximum length of 16 characters. Then forces you to type it with an on-screen keyboard
with no capital letters.
dumbpasswordrules.com/sites/tr…
#password #passwords #infosec #cybersecurity #dumbpasswordrules
TreasuryDirect - Dumb Password Rules
Will allow most passwords longer than 8 characters. Doesn't tell you there is a maximum length of 16 characters. Then forces you to type it with an on-screen keyboard with no capital letters.dumbpasswordrules.com
📣 Break the silence: Save encryption!
The UK government wants to be able to access anything, anywhere, any time — from your pics to your docs.
It begins with Apple. Other services will be next. That's why we must take a stand NOW!
Sign and share our petition ⬇️
you.38degrees.org.uk/petitions…
#encryption #e2ee #Apple #privacy #security #cybersecurity #ukpolitics #ukpol #icloud #tech
Keep our Apple data encrypted
It is reported that the Home Office has ordered Apple to build a backdoor into its encrypted services so that they can get hold of content that any Apple user has upload to the cloud. Encryption keeps our private information safe and secure.38 Degrees
The message is clear across the political divide: let's hear it!
The UK government should argue in open court why they want to make us less secure by ordering a backdoor into Apple encryption.
A secret Tribunal would be an affront to the privacy and security issues at stake. It must be held in public.
Read the joint letter from ORG, Big Brother Watch and Index on Censorship ⬇️
openrightsgroup.org/press-rele…
#Apple #encryption #e2ee #privacy #security #cybersecurity #ukpol #ukpolitics #tech
Make the Investigatory Powers Tribunal on Apple Encryption a Public Hearing
Rights groups call for Apple’s closed appeal against the Home Office’s encryption-breaching order to be opened to the public.Open Rights Group
Bipartisan US Congress Members want the secrecy around the UK's encryption-breaking order to be lifted.
"It is imperative that the UK's technical demands of Apple - and of any other US companies - be subjected to robust, public analysis and debate."
“Secret court hearings featuring intelligence agencies and a handful of individuals approved by them do not enable robust challenges on highly technical matters.”
wyden.senate.gov/news/press-re…
#encryption #e2ee #Apple #privacy #security #cybersecurity
Bipartisan Members of Congress to UK Spy Court: UK Gag Orders for Surveillance Backdoors Threaten Americans’ Security and Privacy, Impede Congressional Oversight | U.S. Senator Ron Wyden of Oregon
The Official U.S. Senate website of Senator Ron Wyden of Oregonwww.wyden.senate.gov
UK MPs have joined the chorus of voices wanting the Apple case to be held in public.
"If the Home Office wants to have effectively unfettered access to the private data of the (innocent) general public, they should explain their case in front of the public."
🗣️ David Davis MP.
"People deserve to know what's happening to their private personal information."
🗣️ Victoria Collins MP.
news.sky.com/story/apple-vs-ho…
#encryption #e2ee #Apple #privacy #security #cybersecurity #ukpolitics #ukpol
Apple vs Home Office encryption court battle must be held in public, say MPs
A row between the tech giant and the government over customer data will reportedly move to London's High Court this week – but the hearing will be held behind closed doors.Tim Baker (Sky News)
📣 Make it public!
The call is getting louder for a public hearing of the appeal over the UK's order to break Apple encryption.
Alongside the joint letter from ORG, Big Brother Watch and Index on Censorship, UK MPs, US Congress Members and the BBC want the secrecy to end.
bbc.co.uk/news/articles/c4g0rr…
#encryption #e2ee #privacy #security #cybersecurity #ukpol #ukpolitics #Apple #tech
Pressure grows to hold secret Apple privacy hearing in public
Civil liberties campaigners have joined US politicians and the BBC in saying Friday's hearing should not be secret.Tom Singleton (BBC News)
#Linux, #macOS users infected with #malware posing as legitimate #Go packages
csoonline.com/article/3841336/…
Linux, macOS users infected with malware posing as legitimate Go packages
Threat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems.Shweta Sharma (CSO Online)
Everybody should learn how to use GPG.
#gpg #gnupg #encryption #security #privacy #cybersecurity #linux #pgp
🔐 If Privacy is outlawed...
Here's how you can stop them: 👉 t.co/8z8lI9eRDo
#PrivacyMatters #Encryption #CyberSecurity #TurnOnPrivacy #PGP
France is about to pass the worst surveillance law in the EU. We must stop them now! | Tuta
An amendment to the “Narcotrafic” law is moving to the French National Assembly. Remind your legislators that a backdoor for the good guys only is not possible.Tuta
Hier könnt ihr unser aktuelles Spotlight-Interview mit @Tutanota, einer datenschutzfreundlichen E-Mail-, Kalender- und Kontaktlösung aus Deutschland lesen:
blog.iode.tech/de/tuta-datensc…
#tuta #spotlight #privacy #cybersecurity #opensource #datenschutz
February 16th #BlackHistoryMonth spotlight:
Get to know @blackgirlshack!
"BlackGirlsHack meets the #InfoSec needs left unmet by existing services by providing hands-on skills that are focused on people who are upskilling and reskilling in #cybersecurity."
BlackGirlsHack - About
BlackGirlsHack is the leading cybersecurity training nonprofit in the country. The nonprofit organization, which is open to all, provides training, career services, study groups, and resources people looking to upskill and reskill in technology and c…blackgirlshack.org
"The consensus among cybersecurity experts could not be clearer:
There is no way to provide government access to end-to-end encrypted data without breaking end-to-end encryption, thus putting every user’s security and privacy at risk."
Join the voice of experts in the joint letter to stop the UK's order to break encryption – Sign and share our petition today ⬇️
#encryption #privacy #Apple #cybersecurity #ukpolitics #ukpol
you.38degrees.org.uk/petitions…
Keep our Apple data encrypted
It is reported that the Home Office has ordered Apple to build a backdoor into its encrypted services so that they can get hold of content that any Apple user has upload to the cloud. Encryption keeps our private information safe and secure.38 Degrees
ORG and over 150 signatories call on the UK government to RESCIND its demand to create a backdoor to Apple encryption.
It "jeopardises the security and privacy of millions, undermines the UK tech sector, and sets a dangerous precedent for global cybersecurity."
"The world’s second-largest provider of mobile devices would be built on top of a systemic security flaw, putting all of its users’ security and privacy at risk."
#encryption #privacy #cybersecurity #ukpolitics
globalencryption.org/2025/02/j…
Joint Letter on the UK Government's use of Investigatory Powers Act to attack End-to-End Encryption – Global Encryption Coalition
On 13 February 2025, 109 civil society organizations, companies, and cybersecurity experts, including Global Encryption Coalition members, published a joint letter to the British Home Secretary Yvette Cooper calling on the UK Home Office to rescind i…Ryan Polk (Global Encryption Coalition)
Unbelievable
#ElonMusk’s US #DOGE Service are feeding sensitive data into #AI software via #Microsoft’s #cloud
#Musk’s US #DOGE Service have fed sensitive data from across the #Education Dept into #ArtificialIntelligence software to probe the agency’s programs & spending…. The AI probe includes data w/personally identifiable info for people who manage grants, & sensitive internal financial data…
#law #security #InfoSec #CyberSecurity #NationalSecurity #Trump #TrumpCoup
washingtonpost.com/nation/2025…
This is what I think about whenever infosec wonks on here start telling people they should use matrix or xmpp+omemo or whatnot instead of signal
To be fair, I understand the arguments and to a large extent I agree with the critiques. However, I think anyone making these recommendations is vastly underestimating the capacity or appetite for most people to deal with the user experiences presented by these alternatives.
User experience is the ultimate force multiplier. For anything that requires network effects to function (ie most anything involving communication), if it doesn't *just work* then you've lost 90% of your audience.
#matrix #xmpp #infosec #cybersecurity #signal #ux #design #ui #encryption #privacy #crypto
Via Tom's Hardware: Facebook flags Linux topics as 'cybersecurity threats' — posts and users being blocked
Does this mean that Meta/Facebook is going to also ban mentions of:
- #Android phones?
- #SteamDeck / #SteamOS?
- Most "smart" cars, TV's, appliances?
- Most (somewhere around 90 percent) of the top Websites?
- Talk of Meta's own internal infrastructure?
What an absolutely asinine thing to do. Linux is incredibly prevalent in the technology landscape today. Yes, #linux on the desktop is a small percentage of the overall devices on the market today. However, linux usage in #embedded, #server, and #appliance applications is to a level where censoring references to it is insanity.
The irony of all of this? Zuckerfaces recent pull back of moderation on Meta's sites.... Meaning it's now okay to bash socially vulnerable populations, spread tons of mis-information on many social and political topics... But linux?"Oh no! That's a #CyberSecurity threat!"
This reeks of political #tomfoolery. I won't be surprised if it's eventually revealed that our new overlords put pressure on #Meta to #censor linux.
tomshardware.com/software/linu…
Facebook flags Linux topics as 'cybersecurity threats' — posts and users being blocked
DistroWatch is one of the largest affected organizations.Mark Tyson (Tom's Hardware)
Let's say China manages to get just a little bit of data about people from just a few of these ... 😑
"China's overlapping tech-industrial ecosystems"
high-capacity.com/p/chinas-ove…
#cybersec #cybersecurity #infosec #itsec #china #privacy #gdpr #dataprotection #dataskydd
China's overlapping tech-industrial ecosystems
EVs, batteries, lidar, drones, robotics, smartphones, AI. China's progress across a range of overlapping industries creates a mutually reinforcing feedback loop.Kyle Chan (High Capacity)
Thinking about a new Linux laptop to run Linux on? Going with Linux laptop vendors can be a good option as they offer seamless hardware-software integration, pre-installed Linux distros, and guaranteed driver compatibility. Here are available Linux laptop vendors 😎👇
Find high-res pdf books with all my #linux and #cybersecurity related infographics at study-notes.org
Dan Nanni's Infographics and Study Notes
Explore high-quality infographics on Linux, cybersecurity, and networking. Perfect for certifications, technical knowledge, and tech career upskilling.study-notes.org
Microsoft Office 2016 and Office 2019 will no longer receive software updates, technical support, or bug and security fixes after 14.10.2025.
Consider migrating to LibreOffice.
LibreOffice is free to use.
LibreOffice supports Office file formats.
Install LibreOffice and compare it with your version of Office.
Website: libreoffice.org
Mastodon: @libreoffice
1/4
#Microsoft #Office2016 #Office2019 #Office #LibreOffice #CyberSecurity #Privacy #InfoSec #FreeSoftware #OpenSource #FOSS
Home | LibreOffice - Free and private office suite - Based on OpenOffice - Compatible with Microsoft
Free office suite – the evolution of OpenOffice. Compatible with Microsoft .doc, .docx, .xls, .xlsx, .ppt, .pptx. Updated regularly, community powered.www.libreoffice.org
Think twice before scanning QR codes: 60% of them are spam. Be careful when travelling for business, too - scammers are even putting fake QR codes on parking meters. Stay cautious to protect your business data
#QRCodes #PhishingScam #CyberSecurity techradar.com/pro/security/the…
The majority of QR codes are spam, new survey claims
Almost 60% of emails with a QR code are spam, so be on your guardEllen Jennings-Trace (TechRadar pro)
Wow. US CISA recommends using end to end encrypted mobile communications.
Found this via @Tutanota blog
cisa.gov/sites/default/files/2…