Show more

Since apparently this is a major concern to the fediverse, I, the instance owner of infosec.exchange have worked with law enforcement on matters involving the security of the company I’m paid to protect, and my membership to infraguard is pending approval.

Commence defederation if you must.

/peace.

Jerry Bell boosted

More evidence today that public-by-default social networks are pretty broken, this time here on Mastodon.

The specific shit-fit doesn't matter. But it does raise an interesting question: When rumors spread in social networks, how may they be quelled?

In a privacy-embracing social network, is there a way to defend yourself against rumors that doesn't involve exposing yourself? I don't think there is.

Is there a way to reduce rumors and witch-hunts?

Avoiding the federation model might help...

I need to get into a rhythm of writing more for my blogs. That felt good.

Jerry Bell boosted

will make available soon to the public as an open source release. Long time I didn't had fun with assembly, but curious to have a look at this software reverse engineering framework 😎 nsa.gov/resources/everyone/ghi

Jerry Bell boosted
Jerry Bell boosted

Warning - it's possibly the most-NSFW "Smashing Security" podcast yet. But if you dare listen to the show, here's what's on the menu...

Why is Tampa’s mayor tweeting about blowing up the airport? Are hackers trying to connect with you via LinkedIn? And has @maria succeeded in her attempt to survive February without Facebook?

Plus, we have a bonus chat with security veteran Martin Overton to take a deeper look into cyber insurance.

Find the full show at smashingsecurity.com/117

Jerry Bell boosted
Jerry Bell boosted

Just published on opensource.com - writeup on Reducing Security Risks with Centralized Logging opensource.com/article/19/2/re

Jerry Bell boosted

Need some help here.

What are the basics of infosec? What should everyone in this field should learn/ know/ be able to do?

The reason I am asking: I am kinda lost bc this field is so big. There is so much to learn which makes it kinda difficult to detect the basics (as a beginner).

Personal experience, book/ resource recommendations and and other feedback is highly welcome and preferable with a reason why s.o. should know it.

Jerry Bell boosted

Has someone expierence with pentesting "Zeta-Producer"?

Jerry Bell boosted

People do not “just install Linux” not because they’re too dumb or because they don’t care about their freedom or privacy but because they have brain surgery to perform in the morning and they have three kids. When people get a car, they expect to drive it, not to have to replace the engine.

I predict that, between the NIS, GDPR, and the forthcoming copyright law (arstechnica.com/tech-policy/20), an increasing portion of the internet will soon be inaccessible to Europeans. Also creates high barriers to start new Internet-based businesses in the EU.

Jerry Bell boosted
Jerry Bell boosted
Jerry Bell boosted

Anyone here working with containers on AWS ECS? I'm looking at ecsworkshop.com/introduction/3 but butting heads with mu trying to abstract things away...

Jerry Bell boosted
Jerry Bell boosted
Jerry Bell boosted

Well, it finally happened to me: My very own creepy Facebook moment.

But I don't even use Facebook.

brainonfire.net/blog/2019/02/1

TL;DR: Facebook account I opened 8.5 years ago and never used receives "recommendation", out of the blue, to check out a small store I only just learned existed and started patronizing.

(That account: No phone number, no friends, no profile info, sort-of-fake name, dedicated email address. Me: No smartphone, didn't pay by credit card.)

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.