Tumgik
#infosec breach
soulmatesinc-if · 27 days
Text
Company badge template (but also a character sheet thing)
Tumblr media Tumblr media
editable front and back, for your MC needs: link
77 notes · View notes
nyancrimew · 8 months
Text
OUT NOW: my most in depth investigation yet
in this article we see just HOW little a company handling highly sensitive data can care about security and yes it's even worse than you think
content warning: mentions of abuse/controlling behaviour
support me on ko-fi if you like my work and want to read (non-hacking) articles early!
8K notes · View notes
rednblacksalamander · 1 month
Text
Tumblr media
Subscribe to LifeLock Plus for only $19.99 a month and all of this will be shipped directly to your home address
75 notes · View notes
unopenablebox · 1 year
Text
being the communications person for this team has made me like unto christ on the fucking cross
7 notes · View notes
oldguardleatherdog · 2 years
Text
Cybersecurity is my profession. This WaPo column about the recent LastPass password vault breach is solid and smart. About a 4-minute read. Highly recommended!
https://wapo.st/3IKsWck
[EDIT: This link should take you past the paywall - subscribers get to post free stories for all our fellow humans online]
WaPo has launched a column and email newsletter called "The Tech Friend" that's off to a good start. The tech journalists at the helm write about fairly complex day-to-day issues we all face with this infernal machine in a way that's accessible and engaging without sacrificing depth. They approach the reader as a peer, not as a novice, and their advice is straightforward, useful, and not difficult to put into practice. I dug it!
7 notes · View notes
cyberjulie · 2 years
Text
I guess while we were slacking off during the holiday, some chose to pick up the slack. No pun intended. 😆
5 notes · View notes
technica12 · 1 year
Text
youtube
0 notes
splatoongamefiles · 20 days
Note
The sad thing about these DMCA attacks is that by my interpretation of US law, Nintendo has no legitimate grounds on which to make them.
"The Congress shall have Power to promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." is the United States' stated justification for copyright law. What this means is that they are attempting to "promote" production of the Arts by increasing their profits. Therefore, something in infringement of copyright that in no conceivable way would reduce the profitability of the work is fine under the original purpose of copyright law.
There is no possible way a Splatoon fan ripping models from the game for the purpose of reference and Blender renders is going to affect the game's sales figures. Nobody who was planning to buy the game would choose not to because someone uploaded its character models.
Meanwhile, there are no valid infosec or trade-secret grounds for the takedowns, either.
Since the assets were not leaked from a corporate computer through any data breach or violation of privacy, but instead were datamined from a publically-available game update with a date of publication, they are already released.
Fans talking about these assets is "spoilery", but if the company wants us not to talk about these assets, it shouldn't publically release them into the game that we own. It's how computers work. To put something into a program, you need to release it. If you release it, that means people can see it. To suggest that the public should not be able to see what's inside the live game update that physically exists on their own devices is like suggesting that people should not be able to see the ingredients of their food... oh, wait. The USDA very much does think like that. Regulatory capture.
Regulatory capture, I guess, is also why IP has expanded to be an all-powerful information-control tool. Do read giovanh's articles on it, if you haven't already.
thank you for the info, but no. they hold the copyright, they can take down whatever, unless it falls under fair use, which they can definitely argue that ripping game files and shit isnt. i like this video about it.
youtube
(im gonna still keep doing this blog, even when it's noticed like on Twitter, usually just individual posts are removed but the account is fine)
36 notes · View notes
cyber-sec · 2 months
Text
Infosec in brief: I spy another mSpy breach: Millions more stalkerware buyers exposed
Tumblr media
Source: https://www.theregister.com/2024/07/15/infosec_roundup/
9 notes · View notes
lakesbian · 1 year
Text
ok yes everyone i know alec could do autocannibalism i just didn't mention it in the post because i was too lazy to spoiler it. who do you take me for. and spiritually it's not quite the same as taylor and rachel having people eaten because it's about eating as an efficient murder method they would do if they weren't pulling punches not technical ability. alec would take too long to make someone eat themselves and he would find it gross too. if he wasn't pulling his punches he would just do more kidnapping/infosec breaching and then keep capes as thralls + have them kill themselves when a more useful option pops up
17 notes · View notes
ericvanderburg · 9 months
Text
Infosec experts divided over 23andMe's 'victim-blaming' stance on data breach
http://securitytc.com/T0yfhB
2 notes · View notes
soulmatesinc-if · 2 months
Text
I've been meaning to do this for a while and finally got to it: ROs' stats if they had the player stat screen (excluding powers and assuming the beginning of the game). I think they'd be fun to look at if you like to speculate, but probably ignore if you want to go in blindly 😉
Wyatt:
Tumblr media
Romero:
Tumblr media
Sam:
Tumblr media
90 notes · View notes
sasquapossum · 1 year
Text
"We just had a breach."
Infosec: 😢
Obstetrics: 😢
Whale watcher: 🙂
4 notes · View notes
gisblogs203658 · 5 months
Text
Navigating the Cybersecurity Landscape: Protecting Our Digital World 🛡️
Hey everyone! Today, let's dive into the crucial topic of cybersecurity and explore how we can safeguard our digital assets and privacy in an increasingly connected world. 🔒
Cybersecurity refers to the practice of protecting computers, networks, and data from unauthorized access, cyberattacks, and malicious threats. As we rely more on digital technologies for work, communication, and entertainment, the importance of cybersecurity cannot be overstated. From securing personal devices and online accounts to defending critical infrastructure and businesses, cybersecurity plays a vital role in ensuring trust, safety, and resilience in our digital ecosystem. 🌐
Here are some key aspects and practices of cybersecurity:
Risk Management: Cybersecurity involves identifying, assessing, and mitigating risks to prevent potential security breaches and data compromises.
Multi-Layered Defense: Effective cybersecurity strategies employ multiple layers of protection, including firewalls, antivirus software, encryption, and intrusion detection systems.
User Awareness: Educating users about cybersecurity best practices, such as strong password management and recognizing phishing attempts, is essential for preventing cyber threats.
Incident Response: Rapid response and incident handling protocols are critical for minimizing the impact of cyberattacks and restoring normal operations.
Compliance and Regulations: Cybersecurity standards and regulations ensure organizations adhere to security guidelines and protect sensitive information.
Let's prioritize cybersecurity awareness and resilience in our digital lives! Are you interested in learning more about cybersecurity or have tips to share for staying safe online? Join the conversation below! 🛡️💬
Using hashtags to connect with cybersecurity advocates: #Cybersecurity #InfoSec #DataProtection #Privacy #CyberAware #ITSecurity #OnlineSafety #CyberDefense #DigitalSecurity #StaySafeOnline 🔐
0 notes
vroooom2 · 10 months
Text
The pitfall of being sponsored by Dell
Tumblr media
Ghidra 13.1 includes the addition of new training course materials for the Debugger. More contributions for the community!
Tumblr media Tumblr media
☣️You can be identified by the push tokens that are registered with any operator in your computer, tablet, car, watch, mobile.
Thx Matt for your E2EE daily reminders.
Thx Wendy and Craig to educate on cyber democracy
Tumblr media Tumblr media
That's the reason why I went back to my r00ts: DESIGN. It's much more fun, beautiful, and there's more money to make in UX Research and Product Design, than in infosec...
I feel pity for all the unemployed Defcon attendees, who forgot that to have an impact it's not enough to patch.
You need to be at the core of secure-by-design to make digital/AI/IoT products secure-by-default, in order to provide a safe cyber experience to users.
That's how we can keep the Hacker curiosity alive to keep building knowledge and improve practice: to go beyond the cybersecurity industry walls, to fix things :)
Tumblr media
DARPA Alumni for the win
Tumblr media Tumblr media Tumblr media Tumblr media
youtube
0 notes
pressez · 11 months
Text
Zerosecurity Rises: Back in the Game with Cutting-Edge InfoSec News
Tumblr media
In a resounding return to the forefront of the information security news landscape, Zerosecurity proudly announces its relaunch, reaffirming its commitment to deliver the most up-to-date and cutting-edge insights in the field of information security.
After a brief hiatus, Zerosecurity is back, stronger and more dedicated than ever to provide readers with the crucial knowledge they need to navigate the rapidly evolving digital security landscape. With a legacy of trust and reliability, Zerosecurity is ready to once again take its place as a go-to destination for those seeking the latest and most insightful information security news.
The site boasts a storied history as a trusted source of information security news. Its legacy as a reputable and reliable authority in the field is definitely one that stands out.
Founded in 2012, Zerosecurity was conceived with a singular mission in mind - to equip individuals, professionals, and organizations with the insights they needed to protect their digital world. As the internet grew and technology advanced, so did the importance of understanding and mitigating the ever-present risks of cyber threats. The news site stepped up to fill that void.
Over the years, ZeroSec became known for its unwavering dedication to delivering timely and accurate information security news. It earned the trust of its readers and the respect of experts in the cybersecurity community. The website evolved to become a hub for real-time updates on data breaches, cyberattacks, vulnerabilities, and practical tips for staying secure in the digital realm.
The Comeback Story
Zerosecurity's comeback is fueled by many things, but here are a few that stand out:
1. Evolving Threat Landscape: The digital world has witnessed a rapid escalation in cyber threats and attacks. As these threats continue to grow in complexity and scale, the need for an information security news source that provides up-to-the-minute updates and expert analysis has never been more critical. Their resurgence is a response to this escalating demand.
2. Enhanced User Experience: The relaunch of ZeroSec comes with significant improvements aimed at enhancing the overall user experience. The website now features a more intuitive design, optimized for ease of navigation, and a responsive layout that ensures access from various devices. This commitment to user-centric design ensures that readers can quickly access the latest information security news and resources.
3. Expanded Coverage: The site is broadening its scope to cover emerging cybersecurity trends. In addition to offering news updates and expert analysis, the website now provides insights into topics such as the impact of artificial intelligence in security and the challenges posed by the Internet of Things (IoT). The site has also added a Blockchain and Cryptocurrency section which will cover the latest crypto breaches and scam.
4. User Engagement: The relaunched site is dedicated to fostering a vibrant and interactive community. The revitalized forums provide a platform for like-minded individuals to connect, share experiences, and collaborate on addressing common security challenges. By enhancing user engagement, ZeroSec aims to create a robust and informed community.
5. Expert Contributors: Zerosecurity has further bolstered its team of expert contributors, including seasoned cybersecurity professionals and writers with deep expertise in the field. This infusion of fresh talent ensures that readers continue to receive top-tier analysis and insights.
The Future of ZeroSec
The future of Zerosecurity is as exciting as it is promising. As they make this triumphant comeback, they're setting their sights on several key goals and plans:
Enhanced User Experience: ZeroSec is dedicated to continually improving the user experience. They plan to implement additional features and a user-friendly design to make it even easier for our readers to access the latest information security news and resources.
Global Reach: They're working on expanding our reach to a broader global audience. Our goal is to provide information security insights that are relevant and valuable to individuals and organizations worldwide.
Comprehensive Coverage: ZeroSec aims to provide even more in-depth coverage of emerging cybersecurity trends, new technologies, and innovative security strategies. They're committed to delivering comprehensive information that empowers our readers.
Engaged Community: The relaunched ZeroSec will continue to foster an engaged community of individuals passionate about information security. They're looking to grow their social media accounts, encourage discussions, and create a platform for collective learning and knowledge sharing.
Collaboration: ZeroSec plans to collaborate with industry experts, organizations, and educational institutions to further strengthen our credibility and expertise. They want to be at the forefront of knowledge exchange and innovation in the field of information security.
Visit the Relaunched Zerosecurity Website: Head over to Zerosecurity.org and dive into the latest in information security. Explore real-time news updates, expert insights, practical tips, and more to stay informed and secure in the digital world.
Join the Community: Be a part of our vibrant community of information security enthusiasts. Engage in discussions, share your experiences, and collaborate with like-minded individuals on our Facebook page. Together, we can strengthen our collective knowledge.
For media inquiries or additional information, please contact:
Contact: https://zerosecurity.org/contact-us/
Read the full article
0 notes