Show more

The CDC isn't going to email you personally. The WHO isn't going to ask you to click on download and open documents.

vice.com/en_us/article/n7jdxw/

Hey, here's an idea. Instead of trusting our students and professors, lets force them to use tracking apps to make sure they say where they are!

There's no downsides to this!
There's no way that this information won't be used illicitly.
There's no way for this system to be hacked.
There's no way to tell your phone to report a fake location!

:facepalm:

campusreform.org/?ID=14274

Holy cow. So much Fail in a single device that you can't "just" throw away.

solarcybersecurity.com/

The inverter pwds used are short and do not differ between units.

The network protocols used ... are unencrypted

attacker can read a customer’s WiFi access creds from the SolarInfo wifi dongle.

settings can be accessed via the ... the smartphone app ... . Intentional misconfiguration of these settings could lead to Battery explosion and fire.

Samsung Phone users:
hackaday.com/2020/01/09/spywar

not much you can do about this (I won't recommend anybody inexperienced rooting their phone)

All Wawa PoS (point of sale e.g. cash registers) had malware stealing credit cards on it from March until December.

I don't know if using chip readers makes you immune from the fallout, but if your card doesn't have a chip yet and you used your card at Wawa, get a new one ASAP.

6abc.com/wawa-announces-data-b

Some of you might have gotten the notice that your email appeared in the Zynga breach.

It's ok, they got salted hashed passwords. This means that unless the attackers also got the salt value, they can't look up your hash in a rainbow table to find your password. (Think of a dictionary with a random order where each word is a password, but only the entry number was saved and the salt value being the specific edition of the dictionary)

it's Krebs, but I haven't found another source yet:

Krystal, Moes, McAlister’s Schlotzsky’s succumbed to a credit card skimming attack.

My Moe's was affected for 1 week.

krebsonsecurity.com/2019/11/sa

New CC info grabbing technique found in the wild.

This time, instead of skimming your CC info while you're typing it in, attackers are now sending you to their site pretending to be a 3rd party payment provider where you gladly type in your CC#.

You probably won't notice until they redirect you to the actual payment provider and are asked to type in your CC# again.

arstechnica.com/information-te

Stop Stalker Ware

stopstalkerware.org/

There's few, if any, legitimate reasons to use stalkerware. And *0* reasons to use it against a lucid adult.

I'm sure there are even better alternatives to the "legitimate" reasons.

ok, time.

Android phones were susceptible to an attack which allowed a malicious app to use the microphone, camera and if geo-tagging photos was on, your location even if you didn't give the app permissions to use the camera and mic.

Google has fixed this on their Pixel line, and Samsung has confirmed a fix. No word as to who else may have been or still is affected.

arstechnica.com/information-te

It's confirmed: The Disney + hack was due to credential stuffing.

Yet another reason to USE A PASSWORD MANAGER AND A UNIQUE PASSWORD PER SITE!


A bunch of Kali linux-based books just dropped on Humble Bundle.

folk in Southern New England:

BSides CT is tomorrow at CCSU - only $20. I'll be there, if you want to meet up or collaborate on the CTF.

bsidesct.org/
(edited to add link, fix typo)

So that SMS snafu where valentines messages were delivered a yesterday?

arstechnica.com/information-te

This highlights yet another reason not to use SMS as a 2FA if it can be avoided. This is not the only 3rd party carrier to handle your data. Who's to say there's not a trusted insider threat who placed a back door in one of these systems?

If you run TrendMicro at home, don't fall for an ongoing phone scam.

They had a malicious insider threat steal a bunch of phone #'s and are calling people under the guise of being TrendMicro support. They also took names, emails and support ticket numbers.

blog.trendmicro.com/trend-micr

Don't be these people.

Use a password manager. Make sure you use it to create random passwords that even you can't remember.

longer is better


Show more

<invalid character>

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.