#cyber security
Explore tagged Tumblr posts
spaceshipsandpurpledrank · 2 days ago
Text
36 notes · View notes
nyancrimew · 11 months ago
Text
BREAKING: #FuckStalkerware pt. 7 - israeli national police found trying to purchase stalkerware
for the first time ever, we can prove governments, intelligence companies and data brokers have tried to strike deals with mSpy, a stalkerware company
6K notes · View notes
scipunk · 9 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Hackers (1995)
3K notes · View notes
shamebats · 5 months ago
Text
Tumblr media
389 notes · View notes
twinterrors29 · 2 months ago
Text
Chancellor Palpatine uses the same passcode for every account, and refuses to set up Space Multifactor Authentication
his official government Space Social Media account is, naturally, hacked by someone planning to use it to make a meme post about how Palpatine did the Invasion of Naboo (a la "Bush did 9/11" memes), and so the hacker immediately tries that passcode on a bunch of other sites, and....well, hits the paydirt of the century, accessing all of the secret Banking Clan accounts and additional comms systems that Sidious has been hiding
they drop an anonymous tip to the Jedi, and then dump the information on the holonet, sending copies to every reputable news platform in the galaxy as they gather up all of their loved ones in order to disappear them all on the most obscure and inaccessible dirtball they can find to hide from the fallout
but not before using Palpatine's Space Social Media account to post "I literally actually did the Invasion of Naboo lol, and I've posted the proof online"
199 notes · View notes
im-radio · 6 months ago
Text
271 notes · View notes
maclanahan--mermaid-comics · 9 months ago
Text
Hey Americans, I know there is a LOT happening, but please contact your house rep on KOSA. This will make it illegal for me to post my art online in order to "protect kids" cause those who sponsor it want to use it try to suppress LGBT content.
On a more cyber security side, I also don't trust website's having to use government issued IDs for age verification cause the chance for Identity theft will skyrocket through the roof. Since I keep my online stuff VERY separated, I will not use any website that requires ID.
446 notes · View notes
destielmemenews · 2 months ago
Text
Tumblr media
"Eric Noonan, CEO of cybersecurity provider CyberSheath, told CNN it’s likely too early to tell if an attack caused the issues.
“One of the things that should always be taken with a grain of salt is any statements made in the short period of time, immediately after, or even in this case during an attack,” Noonan said.
Musk has a history of attributing technical snafus to cyberattacks. When his conversation with Donald Trump on X started 42 minutes late in August 2024, he said there was a “probability” of an attack."
CNN
Sky News
POLITICO
189 notes · View notes
sayruq · 1 year ago
Text
International hackers have launched a dedicated website for releasing information obtained from recent breaches into sensitive Israeli databases, the Israeli newspaper Haaretz reported on Tuesday. The site has already posted thousands of documents reportedly acquired by infiltrating systems associated with the Israeli Ministry of Defense, the National Insurance, the Ministry of Justice, and the Dimona nuclear research facility, according to Haaretz. The leaks were reportedly attributed to a newly emerging hacker group dubbed ‘NetHunt3rs’, which demanded the release of 500 Palestinian prisoners in exchange for withholding the entirety of the disclosed information. While the Israeli Ministry of Defense acknowledged the breaches, labeling the affected websites as “non-sensitive websites,” an investigation by Haaretz reportedly revealed that the leaked materials included sensitive data from administrative portals, such as employee identification information, defense tenders, and details on Israeli military technological systems, including armored vehicles and satellite photography systems. According to the report, another group, named ‘Tafari HaNasser’, claimed responsibility for hacking into Israel’s National Insurance Institute. It said that it possesses personal data of 8 million Israeli citizens, including bank account details and residential addresses. Although the National Insurance denied any breach, the group circulated a video purportedly showcasing access to Israeli citizens’ personal information.
613 notes · View notes
Text
A little explainer on what happened with AO3:
Basically, someone or a group of someones decided to levy a DDoS attack. What this means is that they created a botnet (network of devices controlled by a bot, usually run in the background of an unsecured IoT device or computer being used for other things. Think data mining) to flood the servers with false requests for service.
What this does mean: AO3 might go back down, if the attack is relaunched. These types of attacks are usually used against businesses where traffic = money, thereby costing a company money. This isn't really an issue here since AO3 is entirely donation and volunteer based.
What this doesn't mean: stories, bookmarks, etc will be deleted and your anonymously published works will be linked back to you. No vulnerable points are breached during this process, so unless this group ends up doing something else, no data breaches will happen. You are safe, your content is safe.
2K notes · View notes
lostlibrariangirl · 11 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media
June 19, 2024
171/366 Days of Growth
Keeping with my 3AM-4AM morning study sessions. I must admit it is harder after some years waking up this early, but I can do it.
I am grateful for the colder weather, it was hard to study with that heat, even at dawn.
Wednesday today, and it looks like the whole week has gone 🤨
185 notes · View notes
reality-detective · 9 months ago
Text
The same company Hillary Clinton and the DNC hired to burry the Wikileaks dump and frame Trump to seed the fake Russia Collusion narrative for 10 years, is now global news for the largest cyber blackout across the planet affecting banks, news stations, airports, 911 services, hospitals etc…
Nothing to see here 🤔
209 notes · View notes
lawlznet · 10 months ago
Text
Real talk, feels bad for anyone who had a flight or train ride scheduled, or works in healthcare, banking, apparently the malaysian stock exchange and other mission critical areas which rely on "CrowdStrike."
Supposedly a fix is being pushed but no ETA on deployment.
164 notes · View notes
scipunk · 6 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Hackers (1995)
2K notes · View notes
technologywhis · 11 days ago
Text
Tumblr media
Oh yes — that’s the legendary CIA Triad in cybersecurity. It’s not about spies, but about the three core principles of keeping information secure. Let’s break it down with some flair:
Tumblr media
1. Confidentiality
Goal: Keep data private — away from unauthorized eyes.
Think of it like locking away secrets in a vault. Only the right people should have the keys.
Examples:
• Encryption
• Access controls
• Two-factor authentication (2FA)
• Data classification
Threats to it:
• Data breaches
• Shoulder surfing
• Insider threats
2. Integrity
Goal: Ensure data is accurate and trustworthy.
No tampering, no unauthorized changes — the data you see is exactly how it was meant to be.
Examples:
• Checksums & hashes
• Digital signatures
• Version control
• Audit logs
Threats to it:
• Malware modifying files
• Man-in-the-middle attacks
• Corrupted files from system failures
3. Availability
Goal: Data and systems are accessible when needed.
No point in having perfect data if you can’t get to it, right?
Examples:
• Redundant systems
• Backup power & data
• Load balancing
• DDoS mitigation tools
Threats to it:
• Denial-of-service (DoS/DDoS) attacks
• Natural disasters
• Hardware failure
Why it matters?
Every cybersecurity policy, tool, and defense strategy is (or should be) built to support the CIA Triad. If any one of these pillars breaks, your system’s security is toast.
Want to see how the CIA Triad applies to real-world hacking cases or a breakdown of how you’d protect a small business network using the Triad? I got you — just say the word.
24 notes · View notes