Someone needs to tell "IBM X-Force" that LoserSquad was by no measure a hacktivist group. There was no moral or even political goal, half the children were literally going for fame.

guys come on at least ensure your mailer is properly configured before sending out the email blast about your breach

Looks like I'll have to turn off Facebook's encrypted messages. @protonmail appears to be wrapping the PGP-encrypted messages Facebook sends with another layer of PGP, causing this error.

This is what happens when pi-hole forwards to bind9 which fails to find dnsproxy so it recurses to pi-hole, which fowards to bind9, which fails to find dnsproxy, so it recurses to----

Also fun: /pol/ has discovered a list of printers in New Zealand and some Arab countries that expose telnet on port 9100. You know, the same port used by @hackergiraffe

Those of you who had "political memefare" in the what-will-unsecured-printers-do-next pool, come collect your winnings!

Let's talk about banning stuff. Books. Websites.

This graph shows ~3 months of posts on 4chan from New Zealand.

See that spike at the end? Where people posted one hell of a lot more than they used to? That's where New Zealand started blocking/banning 4chan.

Bans don't work.

Dear paid software vendors: Eugen can do it in under 15 seconds. 72 hours for a basic question is horseshit.

So, this looks like one of the first steps towards "Encrypted Facebook"... You can add a PGP public key in your profile. After doing so, you can ask that Facebook encrypts all email sent to you ***including password reset emails***

Gave them the public key for the relevant ProtonMail address, and there was no extra work.

If they're going to build end-to-end encrypted services on top of PGP, this could be super interesting.

If you search for "docusign legally binding", the Assistant answer, the top three web results, and the top three video results are all *from* DocuSign.

The fourth web result is a story about a bankruptcy attorney that was sanctioned for exclusively using DocuSign, with no live signature on paper to go with it.

While it's refreshing to see many firms offering U2F keys, this *is* a security product, with inherent concerns to match.

When you race to the bottom with security products, you quickly run into slap-dash efforts, missing functionality, and even vulnerabilities like sharing random seeds, or using poor entropy sources.

Better than nothing, sure, but an end user's one bad first experience will turn them, and everyone they talk to about it, away from multifactor.

Manages 10.57% CPU utilization, still thinks he can take out IRIS.

Skids will be skids.

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.