THIS is why clown hosted DNS is never a good idea for ANY largish business.. host it yourself or just use paper and telephone :)
"Curve. finance had their DNS hijacked in the past hour. Hacker put a malicious contract on the home page. When the victim approved the contract, it would drain the wallet. Damage is around $570k so far. We are monitoring." ( text stolen from @cz_binance on tweeter)
If you use Atlassian products, time to put on a helmet: https://www.theregister.com/2022/07/21/atlassian_critical_security_advisories/
This is why collecting & storing this sort of data should not happen( by anyone!)
I LOVE the last line of this article though "China's cybersecurity administration did not respond to a fax requesting comment." LOL!!
@jerry Just an FYI - it seems your Mastodon Instance went tits up around 0700 UTC , and didn't respond at all - I am not sure if you restarted it , but obviously it is working now 12:30 UTC
Defensive Security Podcast Episode 266
I thought I would just pop this link here for anyone who may be interested in what is happening with "web 3" - (a great as an RSS feed too) https://web3isgoinggreat.com/
Please Don't Misuse Content Warnings on #Mastodon https://karl-voit.at/2022/06/05/mastodon-cw-misuse/
@jeff_schmidt here in Cobb County, we take great pride in paying for pointless things to protect our kids rather than dealing with the actual issue: https://www.ajc.com/news/atlanta-news/after-malfunction-cobb-to-remove-uv-lights-from-schools/V57CN5MBJZB6HIRDTYL5US7NDY/
Not sure folk are aware that using Google fonts by URL in their CSS undermines the privacy of each and every site visitor, sending their IP to GG with every visit. How? Because with each visit they download the font from GG, not your server.
If you will use GG fonts, don't do this
Download that font, and resource it locally instead
In folklore, you needed to get rid of nail and hair clippings, those could give a witch or sorcerer power over you.
We have this now with our electronic clippings, we give our clippings to social networks and that gives a whole heap of power to them and to the buyers of that data who can then analyse it.
Testimony by #privacy advocate @johnnyryan to @CalPrivacy on #adtech realtime bidding data collection, inc industry codes for people w/ "special n…
So if you write an article and give image credits, you don't credit the place you found it, you credit the SOURCE.
Stealing an image, and pointing to a place that has also stolen that image isn't how it works.
If you find an image you'd like to use, you check to see if this is the original source of the image.
If it is, then see if there are any usage rights shown - and follow them.
If there aren't any, you contact the publisher and ask permission to use the image.
internet of tractors in time of war
In a parallel universe, where John Deere is a Russian company, those UA farmers can't tow away those tanks. If they didn't disconnect in time or they've accidentally enabled the connection, there is no more towing for them. With everything on the internet, they've got a #TowBan and a #PlowBan
Whonose!! somewhere in Europe most of the time...
A Mastodon instance for info/cyber security-minded people.