[-] IllNess@infosec.pub 38 points 1 month ago

There are already a lot of products and services created to block adult material. Instead of wasting millions of dollars and thousands of hours of human power, they could've made a law to opt-in to these services at the service provider level.

For example, in this situation, nearly all blocking services would block 4chan.

[-] IllNess@infosec.pub 36 points 3 months ago

Because people don't want to pay for shit content. Let's take pirating out of the equation. If I read a book I borrowed and I really like it, I would buy. If the content was trash then I wouldn't. Same goes if I watch a movie, listen to an album, or eat a microwavable burrito at a friend's or family member's house.

[-] IllNess@infosec.pub 37 points 8 months ago

Reading the title and looking at the thumbnail, I was thinking, "sure I'll do a good deed and help out a noob." Then I read your post and I realized you know what you're doing better than me.

HomerInBushes.gif

[-] IllNess@infosec.pub 39 points 9 months ago

He works for the USA. The government isn't allowed to hinder free speech ESPECIALLY criticism of the government. That's the main reason why it was there in the first place.

Why did Jimmy Carter sell his peanut farm but Elon Musk get's to keep his propaganda machine?

[-] IllNess@infosec.pub 40 points 1 year ago

If this is the case then artists should be able to shut down internet access for AI companies that steal their work in those states.

25

The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.

53

Researchers Ian Carroll and Sam Curry discovered the vulnerability in FlyCASS, a third-party web-based service that some airlines use to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). KCM is a Transportation Security Administration (TSA) initiative that allows pilots and flight attendants to skip security screening, and CASS enables authorized pilots to use jumpseats in cockpits when traveling.

Definitions:

SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

-Wikipedia

29

North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM privileges using a Windows Kernel exploit.

Citrine Sleet targets financial institutions, focusing on cryptocurrency organizations and associated individuals, and has been previously linked to Bureau 121 of North Korea's Reconnaissance General Bureau.

8

In the watering-hole attacks, threat actors infected two websites, cabinet.gov[.]mn and mfa.gov[.]mn, which belong to Mongolia's Cabinet and Ministry of Foreign Affairs. They then injected code to exploit known flaws in iOS and Chrome on Android, with the ultimate goal of hijacking website visitors' devices.

Definitions:

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected.

-Wikipedia

Whereas zero-days are a class of vulnerability that is unknown to a software developer or hardware manufacturer, an N-day is a flaw that is already publicly known but may or may not have a security patch available.

-Dark Reading

2

cross-posted from: https://infosec.pub/post/16863645

This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

4

This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

4

Today, the Cybersecurity and Infrastructure Security Agency (CISA) announces its cyber incident reporting form moved to the new CISA Services Portal as part of its ongoing effort to improve cyber incident reporting.

CISA Services Portal

25
[-] IllNess@infosec.pub 37 points 1 year ago

The French government said that Telegram is being used to distribute illegal material like child pornography. He is not accused of distributing it himself.

[-] IllNess@infosec.pub 37 points 1 year ago

That's like 8 years ago.

...

Wait... crap. We are old.

[-] IllNess@infosec.pub 36 points 1 year ago

Why don't these communicate with each other?

Lidar, 29 cameras, radar and high end CPU and GPU but they can only communicate with other through honking?

Really?

Is this a security feature?

[-] IllNess@infosec.pub 39 points 1 year ago

They are releasing stories like this to promote the new that requires adults to login to pornsites and to limit their use of it.

[-] IllNess@infosec.pub 35 points 1 year ago

The mechanical keyboard community was working on an ortholinear keyboard module. Having every dimension in digital form would make fitting the keyboard a lot easier with less wasted materials for prototyping.

[-] IllNess@infosec.pub 37 points 2 years ago

I bought two printers in the last 2 decades. One looked like the model in the article, which I gave to a family member. The other one is a Brother Laser printer with a scanner.

I'd rather get a 50 pack of markers and start coloring in my printouts than buy a crappy inkjet printer. Plus it's bonding time with my nieces and nephews. I pay them in cookies.

26
13
11
25
[-] IllNess@infosec.pub 36 points 2 years ago

Completely right. This is an education issue.

There are several other issues how these two handled this situation.

Court and police records show that police began investigating 17-year-old Celeste Burgess and her mother Jessica Burgess after receiving a tip-off that the pair had illegally buried a stillborn child given birth to prematurely by Celeste.

Don't discuss this or involve anyone else.

The two women told detective Ben McBride of the Norfolk, Nebraska Police Division that they’d discussed the matter on Facebook Messenger, which prompted the state to issue Meta with a search warrant for their chat history and data including log-in timestamps and photos.

Why are they even talking to police? Lawyer up, even if the lawyer is free.

(E2EE is available in Messenger but has to be toggled on manually. It’s on by default in WhatsApp.)

Facebook messenger and text message is the absolute worse way to discuss things like this. They should've at least turned on E2EE but they already admitted fault and their devices would've been taken away anyway.

They seem like they together. They should've just discussed this in person.

view more: ‹ prev next ›

IllNess

joined 2 years ago