It's OK Google: nobody will even notice.
Coming soon from your favorite botnet
To the Tumblr refugees: welcome!
Having been on the Internet for over thirty years, I have one piece of advice for creative folks working online:
Control Your Platform.
Don't build a business around Facebook, Tumbler, G+, Geocities, MySpace, AltaVista, or any of these other third parties that claim to offer quick and easy results.
They all go away. Every one of them.
Build your own site. Use third parties to steer people to your site.
Third parties are the devil--useful devils, but devils.
the Hinternet, unlike the Dark Web/Deep Web, simply consists of the parts of the internet that are far from the beaten paths. The land of personal servers, search-engine pessimization, and the Protocols of the Old Ways (e.g. XMPP, IRC, Gopher, etc.).
The Dark Web is something seen as "edgy" and "exciting" and is often popularized in the media. The Hinternet, on the other hand, is sparse, humble, and often considered primitive, but it's also home to a sense of humanity that is often absent in the central web.
This is quite an interesting cybercrime campaign.
"The ad fraud scheme that utilizes the Kovter botnet runs a hidden Chromium Embedded Framework (CEF) browser on the infected machine that the user cannot see. A C2 server tells the infected machine to visit counterfeit websites. When the counterfeit webpage is loaded in the hidden browser, requests are made for ads to be placed on these counterfeit pages. The infected machine receives the ads and loads them into the hidden browser."
Holiday Shopping Safety Tips: LastPass 2018 Online Retailer Security List
Keep your information safe this holiday season! LastPass ranks 2018’s top 10 online retailers from most to least secure and shares what to lookout for.
Many free mobile VPN apps are based in China or have Chinese ownership | ZDNet
Chinese affiliation raises a sign of alarm in light of China's recent clampdown of "unauthorized" VPN services.
Shoutout to #Debian for giving the world an amazing non-corporate community distro.
Here is my new #ubuntu animal illustration :). Inspired by Ubuntu release 18.10. https://www.deviantart.com/sylviaritter/art/Cosmic-Cuttlefish-766515479 #art #illustration #mastoart
UNIX loves files. And files love UNIX.
Here are some ways to read files from your filesystem.
Ever heard of tac? No, then have a look ^^
"Command line quick tips: Reading files different ways"
Naming & Shaming Web Polluters: Xiongmai
In late 2016, the world witnessed the sheer disruptive power of Mirai, a powerful botnet strain fueled by Internet of Things (IoT) devices like DVRs and IP cameras that were put online with factory-default passwords and other poor security settings.
Draw.io for threat modeling | michenriksen.com
However that is leaving out some key details. For one Qualys does some questionable things, like seemingly rating the "X25519" exchange lower (if enabled) than secp386, despite being better.
It also doesnt test key security elements. Mozillas Observatory ( https://observatory.mozilla.org/ ) will instantly fail you if your site allows you to connect via http without being redirected to https for example. And it also tests applications themselves, because X-Options are just as important.
Upcoming changes in chrome extensions:
- User controls for host permissions
- Ext. requesting powerful permissions => additional compliance review
- Ext. with obfuscated code no longer allowed
- in 2019 2SV mandatory for dev accounts
Achieving a high security score for TLS
I thought Mastodon was already secure?
Well, it depends. You see, a Mastodon instance is just a web server, like any other on the internet. It's only as secure as how the sto...
States- Rights seem to only be acceptable when they conform to certain political agendas for some in this era. Good on California for asserting protections for their citizens in this time of division.
Calif. enacts net neutrality law—US gov’t immediately sues to block it [Updated]
Justice Department sues California—Ajit Pai called state rules "illegal."