security   512497

« earlier    

The GDPR Checklist - Your GDPR compliance checklist
Achieving GDPR Compliance shouldn't feel like a struggle. This is a basic checklist you can use to harden your GDPR compliancy.
saas  security  privacy  compliance  europe  gdpr 
yesterday by ehayes
Social Engineering: Beware of ‘Tech Support’ Scams | The Mac Security Blog
It begins with a simple phone call. A scratchy voice, often sounding distant and foreign, introduces the caller as "John," or "Steven," but the accent suggests otherwise. The caller claims to be calling from Microsoft tech support, and says that there's a problem with your computer. If you say that you have a Mac, they either hang up or say, "Yes, sorry, you have a Mac."
And so begins an attempt at social engineering (social hacking), a way of conning people into allowing an unknown person to access their computer, possibly copy files, and eventually getting them to pay for this "tech support." The scammer strings the user along, leads them to supposed "error" messages and malware files on their computer, and gets them to install software allowing the scammer to access their files.
Even though Microsoft recently stated that only 183,000 had reported this type of scam to the company in 2017, that's probably just a fraction of the number of people who get contacted; it's a very common scam. Most tech-savvy people know that this is a scam and just hang up, but as with phishing scams, it only takes a few people to be tricked to make the scam worthwhile.
support  scam  social_engineering  security  privacy 
yesterday by rgl7194
Simple Off-Site Backups with rsync, ssh, and sudo
Using a combination of rsync, ssh, sudo, and a touch of bash, it's possible to back up your servers quickly and easily.

Using a combination of rsync, ssh, sudo, and a touch of bash, it's possible to back up your servers quickly and easily.

shell  backup  devops  bestpractices  rsync  security  cli  ssh 
yesterday by michaelfox

« earlier    

related tags

2018  2fa  activismmodel  adblock  advocacy  analytics  api  apple  apps  archive  article  articles  assembly  attack  austria  authorization  automation  aws  backup  bash  best-practices  bestpractices  blockchain  books  browser  bugs  business  bypass  camera  capture  changemanagement  checklist  cli  clickjacking  cloud  cloudflare  code  community  comp3911  compliance  computer  comsec  congress  container  containers  cookie  cookies  critical  crypto  cryptography  ctf  cybersecurity  database  datadecisions  debugging  defense  development  devops  disclosure  diversity  diy  dns  docker  domain  efail  eff  email  enclave  encryption  engineering  enigmail  entrepreneurship  ethics  eu  europe  exploits  facebook  fcc  feminism  foss  framework  gdpr  go  google  gov2.0  hack  hackers  hacking  hbr  history  home  ics  ida  identity  ids  information  infosec  infrastructure  internet  ios  iot  it_sicherheit  japan  javascript  jwt  korea  kubernetes  law  leak  legal  library  linux  list  location  mac  macos  malware  management  matthewgreen  memcached  metasploit  microscanner  microservice  mindmap  mitm  mobile  netsec  network  news  newspaper  nginx  nist  node.js  openlocks  openpgp  opensource  oreilly  os  osx  packet  password  passwords  pcap  penetration  pentest  pentesting  performance  permissions  pgp  phishing  phising  policy  privacy  profdev  programming  psychology  publishing  python  rack  rails  raspberrypi  read  reversing  risk  rsync  russia  s3  saas  sandbox  sap  scada  scam  scripting  search  serverless  shell  smime  social  social_engineering  sociology  software  softwareengineering  ssh  stuxnet  support  t-mobile  talk  tech  technology  terminal  terraform  testing  thunderbird  tips  tokens  tool  tools  training  usa  usermanagement  via-diigo  via-ifttt  video  virus  vpn  vulnerabilities  vulnerability  web  windows  wohnen  wordpress  workflow  worm  wp-plugins  zine 

Copy this bookmark: