Computer and Network Security (security) group
-
ghostDancer (ghostdancer@quitter.se)'s status on Thursday, 02-Nov-2017 08:59:15 UTC ghostDancer Penetration testing has a new meaninghttps://gizmodo.com/if-your-vibrator-is-hacked-is-it-a-sex-crime-1820007951 !security #internetofshit -
Jens Kubieziel (qbi@quitter.se)'s status on Tuesday, 31-Oct-2017 22:05:23 UTC Jens Kubieziel Warum HTTPS verwenden, wenn es auch anders geht …
!security #tls
https://twitter.com/troyhunt/status/925462678516019200 -
ghostDancer (ghostdancer@quitter.se)'s status on Tuesday, 31-Oct-2017 15:01:44 UTC ghostDancer #KRACK Wi-Fi #Attack: How to Protect our ESP8266 and ESP32? http://qttr.at/1zie !security -
Jens Kubieziel (qbi@quitter.se)'s status on Monday, 30-Oct-2017 21:49:46 UTC Jens Kubieziel TLS fingerprints:
https://tlsfingerprint.io/top/
!security !crypto -
Kuro Sawai (kuro@quitter.se)'s status on Monday, 30-Oct-2017 13:23:45 UTC Kuro Sawai Firefox will nun endlich gegen Canvas-Fingerprinting vorgehen https://is.gd/jxwXZD !privacy !security -
ghostDancer (ghostdancer@quitter.se)'s status on Wednesday, 18-Oct-2017 16:52:43 UTC ghostDancer !lineageos beats Google to the punch, fixes #KRACK WPA2 vulnerability in #android http://qttr.at/1z3o !security -
ghostDancer (ghostdancer@quitter.se)'s status on Wednesday, 11-Oct-2017 11:47:41 UTC ghostDancer Beware #Apple #iOS users http://qttr.at/1yw6 !security #phishing -
ghostDancer (ghostdancer@quitter.se)'s status on Thursday, 07-Sep-2017 12:45:00 UTC ghostDancer A Simple Design Flaw Makes It Astoundingly Easy To #Hack #Siri And #Alexa http://qttr.at/1xrc !privacy !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Friday, 01-Sep-2017 00:32:03 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ Steven Maske @ITSecurity: There is no such thing as "being secure" there's just operating at an acceptable level of risk. #infosectruth ¶ via Twitter https://twitter.com/ITSecurity/status/903256164594573317 !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Wednesday, 23-Aug-2017 02:38:26 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca This needs to go in !security and !grr -
Jens Kubieziel (qbi@quitter.se)'s status on Friday, 11-Aug-2017 06:41:55 UTC Jens Kubieziel Is your encrypted USB drive secure? – Forscher greifen vermeintlich sichere sticks an https://quitter.se/url/4282847
!security !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Sunday, 30-Jul-2017 06:14:03 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @papervote: You know, you can just say “threats”, “risks” & “computer security”. You don’t have to use some meaningless phrase like “cyber-hacks”. ¶ via #Twitter !security -
pettter ✅ (pettter@social.umeahackerspace.se)'s status on Friday, 28-Jul-2017 14:40:54 UTC pettter ✅ "Moxie Marlinspike responded that Signal is "working on an entirely new group mechanism that we should be deploying soon"."
Aaaaaany day now.
https://web-in-security.blogspot.se/2017/07/insecurities-of-whatsapps-signals-and.html
!crypto !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Wednesday, 26-Jul-2017 02:04:12 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Krebs on Security: "Often the most time-consuming and costly aspect of malware sales and development is helping customers with any tech support problems they may have in using the crimeware." https://krebsonsecurity.com/2017/07/how-a-citadel-trojan-developer-got-busted/ !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Tuesday, 27-Jun-2017 01:35:20 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca So for less than $8 I can buy a password that has no characters at all? https://assets.octodon.social/media_attachments/files/000/322/871/original/17ad5726a805f55b.jpg !security -
ghostDancer (ghostdancer@quitter.se)'s status on Tuesday, 23-May-2017 11:58:44 UTC ghostDancer Chaos Computer Clubs breaks iris recognition system of the Samsung Galaxy S8 http://qttr.at/1udb #CCC !security #biometry !hack -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Sunday, 14-May-2017 18:35:02 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ Jeff Jarmoc @jjarmoc: In a relatively short time we've taken a system built to resist destruction by nuclear weapons and made it vulnerable to toasters. ¶ via @HackerFantastic on #Twitter !security -
ghostDancer (ghostdancer@quitter.se)'s status on Thursday, 27-Apr-2017 16:50:07 UTC ghostDancer This Hacker Is My New Hero http://qttr.at/1syx #IoT !security !hack #gizmodo -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Tuesday, 25-Apr-2017 21:12:21 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @ocdtrekkie@mastodon.cloud: If you use Chrome, Google can use a network protocol for tracking and ad delivery that can't be seen or blocked by extensions. TL;DR: You really shouldn't use a web browser made by an ad company. "AdBlock Plus, uBlock Origin, and other extensions cannot block QUIC requests. Recommended best practice is to disable QUIC from the chrome://flags/ URL." https://blog.brave.com/quic-in-the-wild-for-google-ad-advantage/ ¶ !security and !surveillance -
ghostDancer (ghostdancer@quitter.se)'s status on Saturday, 15-Apr-2017 08:57:59 UTC ghostDancer Chrome and Firefox #Phishing #Attack Uses Domains Identical to Known Safe Sites http://qttr.at/1s9i !security