Show more

🚨 AMAZON DEVICE OWNERS 🚨

:ed209: You have 10 days to opt out!

Amazon devices will soon automatically share your Internet with neighbors | Ars Technica
arstechnica.com/gadgets/2021/0

Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components.

microsoft.com/security/blog/20

Awesome Privacy - A curated list of services and alternatives that respect your privacy because PRIVACY MATTERS.
github.com/pluja/awesome-priva

This looks VERY cool:

WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities thanks to Pi-hole, and DNS caching, additional privacy options, and upstream providers via Unbound.
github.com/IAmStoxe/wirehole

Cross-browser tracking vulnerablity in Tor, Safari, Chrome and Firefox - FingerprintJS

In our research into anti-fraud techniques, we have discovered a vulnerability that allows websites to identify users reliably across different desktop browsers and link their identities together. The desktop versions of Tor Browser, Safari, Chrome, and Firefox are all affected.

fingerprintjs.com/blog/externa

Welp, our IT dept is requiring us to change our passwords again next week. Why are we still using such outdated practices?

This is an extensive site dedicated to understanding the many risks to your personal security and privacy.

Defensive Computing Checklist

This is a list of both things to be aware of and specific defensive steps that we can take in response to the common threats of 2019. No list like this can ever be complete, nor would anyone want it to be complete as that list would never end. I tried to limit this to the most important issues, still its long (25,000 words).

defensivecomputingchecklist.co

Here are more details on the Apple Mail zero-click vulnerability:

Apple Mail Zero-Click Security Vulnerability Allows Email Snooping | Threatpost
threatpost.com/apple-mail-zero

Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack | Threatpost

Some legacy models of QNAP network attached storage devices are vulnerable to remote unauthenticated attacks because of two unpatched vulnerabilities.

threatpost.com/qnap-nas-device

Hacked companies had backup plans. But they didn't print them out before the attack. | ZDNet

New NCSC chief says businesses need to take cybersecurity more seriously.

zdnet.com/article/hacked-compa

Interview With a Hacker: Rachel Tobac Tells You How to Defend Yourself From...Well, Her! - Dashlane Blog
blog.dashlane.com/interview-ha

Show more

ᏤⵁŁ₮ƦⵁИł€

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.