#cyber security

LIVE

Writers of the past warned us about letting Big Brother and alike in our lives, either with or without consent for a generous and obvious amount of reasons. Today we have compromised quite a bit with the triangulation of privacy between us, government, corporations, and where the value should be placed at; however, there’s also a great deal in politics that comes with it.

This week Amazon publicly bloomed another interesting idea in terms of delivery and privacy polarization which involved the users receiving his/her goods, with theAmazon Keyservice where the delivery person has access to your home via a kit costing $249.99. This service requires Amazon Prime and the bundle includes a smart lock and a cloud cam to monitor the delivery personnel to your home, which basically translates into Amazondropping your package entering your doors.

Paying to have strangers in your home?


I’ve heard different complains up until now about couriers dropping packages to the front door and eventually getting stolen by someone else. We are talking about packages which cannot fit in the common mail box and are delivered the homeowner aren’t in. Here we have a common problem where there’s data missing in the form of service between the user and the business. But delivering a package without anyone stealing it is more an issue of drop-off timing and setups.

Ever since the internet became widely and commercially available we stepped backwards in terms of privacy rights and user rights. There’s an ongoing battle to protect not only the neutrality of the internet but also the privacy of the user. This is not a confrontation to safeguard what we go online for, it’s a struggle to keep sensible data away from those who might use it against us. Social Security numbers, credit cards information, shopping habits, health status, and so on; the struggle gets more and more intense every time

The extension of 3rd party body into our privacy is now a reality…


In terms of privacy users aren’t helping the cause as they are voluntarily giving up personal information at no cost to online social platforms. Facebook knows a great deal of every user and it crosses such data with other apps like Instagram to provide exact persona and behavior; great amount of data sold to corporations for business purposes comes from platforms like Twitter, Tinder, Snapchat, Youtube . 

By using Amazon Key we remove the last boundary of security we hold by letting strangers in our homes despite being monitored; however, how secure will these locks be? If modern cars can get hacked, how long do you think it’ll take to remotely open a door? But ultimately, how much are you willing to give just to have your package inside your door. Is this all worth it?

Autistic People Can Solve Our Cybersecurity CrisisBy Kevin PelphreyALAN TURING WAS the mastermind wh

Autistic People Can Solve Our Cybersecurity Crisis

By Kevin Pelphrey

ALAN TURING WAS the mastermind whose role in cracking the Nazi Enigma code helped the Allies win World War II. He built a machine to do the calculations necessary to decipher enemy messages and today is hailed as the father of the com­puter and artificial intelligence. He’s also widely believed to have been autistic.

Continue Reading


Post link

sibyl-of-space:

anarchy-in-new-vegas:

sarasa-cat:

It would’ve been one thing if they were upfront about this, but hiding it means they can’t be trusted. Time to look for a new search engine. Any one know any other tracker-resistant search engines?

I looked into this because I use DuckDuckGo and I think it’s really important to keep organizations accountable especially when they claim to be different TM than shitty ones. So it looks like this is true (as of now) for the mobile browser application specifically, not the search engine in general.

which means that using the search engine on another browser like Firefox should be fine, and also now is a great time to let the company know exactly why you are uninstalling their *application* on your device to hopefully either force a backpedal or heavily discourage further shit like this down the line.

it’s a slimy move to be sure. I just think it’s important to be specific and precise. Here’s another article on the subject:

https://www.searchenginejournal.com/duckduckgo-microsoft-trackers/452006/

Listen to Ian Lucas On LBC with James O'Brien | 14 Nov 2019 | 10-10:30am by No More Unicorns on #SoundCloud

https://soundcloud.com/user-648562818/ian-lucas-on-lbc-with-james-obrien-14-nov-2019-10-1030am

“Russian Interference” LBC with James O'Brien 14 Nov 2019 | 10-10:30am Full segment with Ian Lucas (minus ad break) from @mrjamesob’s @LBC programme earlier today

sibyl-of-space:

anarchy-in-new-vegas:

sarasa-cat:

It would’ve been one thing if they were upfront about this, but hiding it means they can’t be trusted. Time to look for a new search engine. Any one know any other tracker-resistant search engines?

I looked into this because I use DuckDuckGo and I think it’s really important to keep organizations accountable especially when they claim to be different TM than shitty ones. So it looks like this is true (as of now) for the mobile browser application specifically, not the search engine in general.

which means that using the search engine on another browser like Firefox should be fine, and also now is a great time to let the company know exactly why you are uninstalling their *application* on your device to hopefully either force a backpedal or heavily discourage further shit like this down the line.

it’s a slimy move to be sure. I just think it’s important to be specific and precise. Here’s another article on the subject:

https://www.searchenginejournal.com/duckduckgo-microsoft-trackers/452006/

Rogues And Spyware: Pegasus Strikes In Spain

Rogues And Spyware: Pegasus Strikes In Spain

Weapons, lacking sentience and moral orientation, are there to be used by all. Once out, these creations can never be rebottled. Effective spyware, that most malicious of surveillance tools, is one such creation, available to entities and governments of all stripes. The targets are standard: dissidents, journalists, legislators, activists, even the odd jurist.
Pegasus spyware, the fiendishly…


View On WordPress

                     G   A   L   L   E    R    Y     Y    U    H    S    E    L     F               

                     G   A   L   L   E    R    Y     Y    U    H    S    E    L     F

                          From the Facebook page of Daren Dhorey

Check out the T&T Guardian for an article which I contributed to regarding the current Cyber Threat landscape.Some key takeaways that weren’t mentioned:

1. Install and keep updated Anti-Virus and Anti-Malware software - purchased options preferred. MacOS isn’t immune, consider Sophos as an option

.2. Use strong passwords and wherever possible, set up 2 Factor Authentication. Accept that 2FA may become the norm so get used to it at home and the office.

3. As convenient as it may be, don’t register your CC with small providers. User PayPal if that’s an option or even have a separate lower limit CC for online shopping and freight forwarders.

4. Pirated Software can be a doorway to malware and ransomeware so for other than obvious reasons, it’s not a good idea to install

5. Email Phishing attacks are on the rise and extremely sophisticated so take extra caution when acting on some emails. Don’t change passwords from links sent via email, instead, login to the site directly and update your info there.

6. Backup and test restore strategy. Cloud backups are good but keep an offline backup of your most important files ie not always connected to the internet so an external drive which you can unplug. Ransomeware can and will find everything connected and encrypt it all.

7. CyberSafety awareness is a must for both home and workplace. Cybersafett can assist here.At some point, you or your organization may become the victim of an attack. The most you can do is try to minimize the impact and reduce your time to recovery.


Post link
quarantine has got the hackers going hard & last week, I was one of their latest victims :( SO-

quarantine has got the hackers going hard & last week, I was one of their latest victims :( SO- today on the blog I am sharing some BADASS cyber security tips to keep you protected if you get hacked!! >> https://www.fashionlush.com/what-to-do-when-you-get-hacked/


Post link
image


Son dönemin en popüler uygulamalarından olan Clubhouse’a düzenlenen siber saldırı sonucu kullanıcı verileri ele geçirildi. İnternette yayınlanan dosyalara göre hangi bilgilerin çalındığı tespit edildi.


SQL veritabanı aracılığıyla ele geçirilen data dosyasının içinde kullanıcıların ID'leri, kullanıcı isimleri, gerçek isimleri ve fotoğraf URL'leri yer alıyor. Toplamda 1.3 milyon kişiye ait verinin sızdırıldığı, uygulamanın iOS sürümünde hesabını Twitter ve Instagram profilleriyle bağlayanların hesap isimlerinin, takipçi sayılarının ve takip ettiği kişi listesinin de ele geçirildiği ifade ediliyor. Saldırı sonrası özellikle güvenlik anlamında çalışmalarını hızlandıran Clubhouse, yeni sürümün 2-3 ay içerisinde geleceğini ve önümüzdeki dönemlerde davetiye ile üyelik sürecinin tamamen kaldırılacağını belirtiyor.

image


Alem-i Cihan

Trust no one. Seriously. Everything you ever say can be used against you and your written word is pe

Trust no one. Seriously. Everything you ever say can be used against you and your written word is permanent. Think before you speak or write. Watch your back.


Post link
People don’t take security serious enough. That virgin’s blood better not just be the fi

People don’t take security serious enough. That virgin’s blood better not just be the first Pokemon GO player you can convince that your van is the best place to catch pikachu; most of those players are not virgins, it better be good virgin blood or you’ll totally get hacked.


Post link
loading