Show more

New DDoS Attacks Leverage TCP Amplification

Attackers over the past month have been using a rarely seen approach to disrupt services at large organizations in several countries

darkreading.com/attacks-breach

Hey, . I came across this thread with lots of good infosec people to follow. I wonder how many of them we could get to come over on this side of the digital divide?

twitter.com/j_opdenakker/statu

I would like to think that even fanboys now acknowledge that Apple is every bit as predatory as their rivals. This Corellium business stinks.

///

twitter.com/Fox0x01/status/119
Apple vs. Corellium

Unredacted version of Corellium’s legal answer is public t.co/JXoyk6yI8F

This entire lawsuit is an obvious attempt to decreases the value of Corellium to either
1) own them, or
2) put them out of business to prevent researchers from finding bugs

Here's some humor: A breach excuse generator. Click the Equifax button it refresh to generate new ones.

whythefuckwasibreached.com/

This is really cool. Office files will open in their own tiny VM container to thwart macro viruses and other such things.

twitter.com/GossiTheDog/status

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

MEMS mics respond to light as if it were sound. No one knows precisely why.

arstechnica.com/information-te

👋 Welcome, new CoSoNauts!

Time to crack those eggs: Upload a profile pic, fill out your profile and say hello. Follow @CoSoTips for help, or just ask.

Some tags to follow:
Infosec discussion at .
Music lovers and musicians: check out and .
If you love good drinks, follow and .
Animal lovers: , , .

We're glad you made it here. Enjoy the awesome, REAL conversation!

Amazon is saying nothing about the DDoS attack that took down AWS, but others are

Looks like some security staff were asleep at the switch

theregister.co.uk/AMP/2019/10/

People. STOP using your phone number for 2FA.

You can also add a secure passphrase to your account that must be given in order to make account changes. That would shut down this scam.

///

From NPR News
'SIM-Swap' Scams Expose Risks Of Using Phones For Secondary I.D. n.pr/2Wd1gma

"People who are using phones as their only source of two-factor identification are inviting identity theft," Bennett warns.

VPN question for people:

Any of you familiar with cryptostorm.is/ ?

I have been loath to go back to one of the big-name, heavily-advertised VPNs, because I really don't trust them.

This one looks very good to me, but I'm curious to hear from those in the know if they walk what they talk.

Feel free to DM if you don't want to discuss publicly.

This is how you kick facial recognition out of your town

Bans on the technology have mostly focused on law enforcement, but there’s a growing movement to get it out of school, parks, and private businesses too.

technologyreview.com/s/614477/

Show more

ᏤⵁŁ₮ƦⵁИł€

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.