[-] IllNess@infosec.pub 23 points 1 month ago

Shoutout to Sony BMG putting rootkits in legally bought CDs.

Source: Wikipedia

You would be safer pirating.

[-] IllNess@infosec.pub 22 points 2 months ago

Hi, can you send me copy of the video too? You have me email address.

[-] IllNess@infosec.pub 22 points 2 months ago

When I say Linux phones, I mean selling a phone with Linux already or Linux ready, not taking existing phones with Android and putting Linux on them.

Examples:
Purism Librem 5
PinePhone Pro
Pro1 X
Volla Phone X23

[-] IllNess@infosec.pub 21 points 2 months ago

This is the main reason they got rid of the headphone jack. Some headphones lasted forever.

Now you have Bluetooth earbuds with tiny batteries that goes in a case with another small battery. Batteries that small will last 5 years tops. On top of that sound quality hasn't improved and latency got worse.

[-] IllNess@infosec.pub 20 points 2 months ago

Most professional programmers, graphic artist, and designers I met use MacOS.

[-] IllNess@infosec.pub 22 points 3 months ago

Libgen had a 502 error a couple days ago. Glad to see them back.

Anyway completely opposite as one of my teachers. I had to buy my teachers book for his course. The book he gave us was a binder with photocopied pages... Wtf?...

You own the fucking copyright. Give it to us for free.

[-] IllNess@infosec.pub 21 points 3 months ago

Google also laid off thousands of people. Yeah, that product is gone.

[-] IllNess@infosec.pub 23 points 3 months ago

Why would there be a divide when Trump said he wants Gaza leveled?

[-] IllNess@infosec.pub 21 points 3 months ago

Everyone in the US should freeze their credit. Yes, it sucks that you have to unfreeze it to apply for new credit but it doesn't actually suck that bad. Everything is done through the websites.

Also what ever email you use, enable 2 factor authentication. I think using OTA is better because people have had their numbers sim swapped.

[-] IllNess@infosec.pub 20 points 3 months ago

I can sue X for not advertising on the my Instagram page then? Lol.

[-] IllNess@infosec.pub 23 points 5 months ago

Technically we are just keeping the waters clean of unusable, useless garbage. The ad corps are invading our waters.

7

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

13
8
[-] IllNess@infosec.pub 22 points 9 months ago

I want to know what happens when something is only a criminal activity in a state.

Is an Alabama resident moving eggs and IVF clinics to a different state considered criminal activity?

How about a Texas resident talking about getting an abortion in a different state?

I'm not sure if state governments can even requests this but it does interest me what Proton's response would be. What if it was countries instead of states?

14

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

16

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

18

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

16

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

18

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
15

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
18
32
101
submitted 9 months ago by IllNess@infosec.pub to c/privacy@lemmy.ml

However, this bug caused some DNS queries to be sent to the DNS server configured on the computer, usually a server at the user's ISP, allowing the server to track a user's browsing habits.

view more: ‹ prev next ›

IllNess

joined 2 years ago