daguti + security-computer   339

What Kanye West can teach us about passcodes – Naked Security
social-media, warnings = Watch out you aren't showing your password when shooting video for social media. Reminds me of when the British Army cyber security HQ was on the news, their passwords were seen on video, pinned to a corkboard. Uhoh... !
celebrities  security-computer  passwords  social-media  warnings 
9 weeks ago by daguti
[PDS WARNING/PSA] NCIX appears to have included customer and unencrypted payment data from their entire business history in their liquidation and is in the hands of multiple unauthorized 3rd parties - call your banks if you didn't for yesterday's Newegg w
*THIS* is why you don't use your real credit card number on any sites besides Amazon.

I never heard of NCIX, but they were evidently a huge computer parts retailer, on the level of a NewEgg or TigerDirect.

In addition to the usual threat of insider attacks, man-in-the-middle attacks, spoofing, etc, etc, etc now we have to worry about what if the company goes out of business and sells all its servers -- with your data still on them -- to any bidder! Unbelievable.
security-computer  credit-cards  warnings 
12 weeks ago by daguti
Credit card skimmers now need to fear the Reaper | Ars Technica
Wow! Only detects 2 of the 4 types of skimmers, but they are by far the two most prevalent.
security-computer  credit-cards  news  2018 
august 2018 by daguti
Google: Security Keys Neutralized Employee Phishing — Krebs on Security
A huge step to recommend to parents, Fiama and everyone else for keeping safe on the internet.

Universal 2nd Factor - U2F are physical keys that replace passwords. They are currently only supported by a handful of sites, but will continue to reach wider adoption with time.
security-computer  techsupport  google  Reference  passwords 
august 2018 by daguti
Law and Disorder Radio » Blog Archive » Law and Disorder June 11, 2018
Heard this on WBAI 2018-06-11.

NYU has a CyberSecurity Masters program. Cost is $15,000 and for people who don't have an IT or engineering degree of some kind, they have a "Bridge" program that gets them caught up in 6 months. Cost for the Bridge Program is $1,500.

I believe you first need some kind of Bachelor's Degree in order to get into the Bridge Program.

NYU CyberSecurity Master's:

Bridge program:
security-computer  education-for-me 
june 2018 by daguti
Amazon Two-Step Verification
Good to know - if you ever:
A) have an account that requires 2FA, *and*
B) are trying to sign in on a device (such as phone app or tablet) that cannot display a second screen asking for the 2FA code,

you must:
1) sign in as usual
2) see the "there was an error with your email/password" error
3) go to Authenticator app and get the 2FA code
4) sign in again, as normal, except append the 2FA code to the end of your password
security-computer  tips-n-tricks  techsupport 
march 2018 by daguti
Is it possible to retrieve locations of tweets even though...
Seems it is possible to trace the location of Tweets even if the Tweet Location is turned off.
twitter  projects-stalking  privacy  security-personal  security-computer 
october 2017 by daguti
House panel looking into Reddit post linked to Clinton’s deleted email – Naked Security
Ok, this is obviously amateur shit. Keep sensitive shit sensitive by never having ANY link back to your personal/public identities. This includes profile pictures (even non-identifying pictures, for example of a torso or a table or a sky or a cartoon character, can be circumstantial evidence if both the "sensitive" account and your personal/public account have the same profile pic. Same goes for usernames, as is the case in the following example.) = "The identity of the “stonetear” user is unconfirmed. Reddit users are pointing to the fact that an account on the online marketplace Etsy for a Paul Combetta has the same username “stonetear”, and the inactive website combetta.com is registered to the email address stonetear@gmail.com."
projects-stalking  privacy  security-computer 
september 2016 by daguti
Ransomware that demands money and gives you back… nothing! – Naked Security
tips-n-tricks = See the end:
To defend against ransomware in general, see our article How to stay protected against ransomware.
To protect against JavaScript attachments, tell Explorer to open .JS files with Notepad.
To protect against misleading filenames, tell Explorer to show file extensions.
To protect against VBA malware, tell Office not to allow macros in documents from the internet.
To learn more about ransomware, listen to our Techknow podcast.
virus-or-malware  warnings  techsupport  security-computer  tips-n-tricks 
july 2016 by daguti
DeRay Mckesson’s Twitter account hacked with just his name and four digits – Naked Security
Goddamit - 2FA is useless now because idiot phone monkeys reset things at any caller's request. "There was social engineering involved: the hacker(s) called Verizon’s billing department and impersonated him. Then, they redirected his phone service to their own phone, so that calls and texts that should have gone to Mckesson’s number went instead to theirs." ............

cellphone = "All four major US carriers have been involved in these cases. But all four of them also offer an important step to protect against identity theft. Namely, you can set up a password or PIN that’s required before any changes are made to your mobile account."
security-computer  privacy  cellphone 
june 2016 by daguti
Obama says passwords aren’t strong enough, urges use of 2FA – Naked Security
bitcoin = See the 3rd to last paragraph about the bitcoin passwords that were cracked using $55 worth of Amazon EC2.
passwords  techsupport  people-barack-obama  security-computer  cryptocurrencies-bitcoin 
february 2016 by daguti
Why you should include password retrieval info in your will
I'm looking at this a few weeks after original attacked it, and I'm wondering where I included the social-engineering tag...
to-do-before-you-die  death-dying  health-aging  passwords  security-computer  social-engineering  techsupport  death-dying-will-and-power-of-attorney 
january 2016 by daguti
Forget BadBIOS, here comes BadBarcode… |
What to do: --- Always validate input before using it. --- Always understand how untrusted input might affect the underlying operating system before you see it. --- Assume that specialised input devices (e.g. barcode scanners) can be made to behave like general-purpose ones (e.g. keyboards). --- Expect the unexpected.
hacking  codes-barcodes  security-computer  warnings 
december 2015 by daguti
Instagram, Facebook location data led panty-snatching burglar to homes |
Be sure to get to the last two or three paragraphs where it links to a guide explaining EXIF data and how to get rid of it.
security-personal  security-computer  privacy  photos-related-to  projects-stalking 
december 2015 by daguti
Li-Fi has just been tested in the real world, and it's 100 times faster than Wi-Fi : Futurology
security-computer = Because this is based on visible light instead of electromagnetic waves, this could solve the problem of insecure WiFi, as anyone outside your home will not have "access" to the visible light inside your home.
wifi  light  wireless  future  future-faith-in-humanity  security-computer 
november 2015 by daguti
Perch lets you turn nearly any device with a camera into a smart home security system
Perch allows you to repurpose old smartphones/tablets, etc to turn them into a home security system.
safety  security-computer  home-stuff  home-improvement  recycling  cellphone 
october 2015 by daguti
Another huge Adobe Flash exploit is out: time to uninstall!
I'm just bookmarking this, but this happens every month or even more often. That's why I've disabled Flash on Firefox and only let it run on a case by case basis, if I trust the site.
adobe-flash  security-computer 
october 2015 by daguti
How is NSA breaking so much crypto?
"On the defensive side, NSA has recommended that implementors should transition to elliptic curve cryptography, which isn’t known to suffer from this loophole, but such recommendations tend to go unheeded absent explicit justifications or demonstrations. This problem is compounded because the security community is hesitant to take NSA recommendations at face value, following apparent efforts to backdoor cryptographic standards." -----> And here is the problem with being the boy who cried wolf. Once you're discovered, no one trusts your recommendations.
encryption  analysis  warnings  big-brother-prism-scandal  nsa  security-computer 
october 2015 by daguti
WinRAR security flaw opens users to silent remote attack
Weird response from the vendor, which seems to indicate they're not going to fix it. ........... IMPORTANT: see comments on this page in which lots of people seem to indicate that this is not necessarily a big deal: http://thehackernews.com/2015/09/winrar-vulnerability.html
security-computer  virus-or-malware 
october 2015 by daguti
Another 5 tips to help keep you safe on Facebook | Naked Security
#3 - One time password sent to you by text if you want to log in from a public computer and don't want to use your real password.
facebook  security-computer  privacy  passwords 
september 2015 by daguti
5 ways to keep your data safe right now | ideas.ted.com
1) user a password manager 2) 2-factor authentication 3) whole disk encryption 4) cover your webcam 5) phone/text encryption
security-computer  privacy  projects-stalking 
september 2015 by daguti
We TOLD you not to use WPS on your Wi-Fi router! | Naked Security
Somehow, I instinctively knew to avoid WPS. Glad to see this scientific analysis proving me right.
security-computer  wifi  techsupport  anti-something 
april 2015 by daguti
Kaspersky Labs has uncovered a malware publisher that is pervasive, persistent, and seems to be the US Government. They infect hard drive firmware, USB thumb drive firmware, and can intercept encryption keys used. : news
"A cancer killing itself." ... This post was removed by the mods of /r/news. Look for the same exact title posted the same day in other subreddits in order to find other relevant comments/discussion, as people were pissed and started posting it on lots of other subreddits. ............ MORE: http://tnw.me/TokcHO7 ...... MORE: http://www.reddit.com/r/technology/comments/2w6tjf/one_of_nsas_most_precious_spying_tools_was_just/
nsa  big-brother  privacy  security-computer  fight-the-g 
february 2015 by daguti
Sucuri SiteCheck - Free Website Malware Scanner
This will scan your Wordpress site and tell you if it finds anything. Also check the plugin "Anti-Malware and Brute Force Security by ELI", which will scan your site and also clean it for free (but be sure to donate)
wordpress  security-computer  virus-anti  plugins 
january 2015 by daguti
Worst passwords of 2014 are just as terrible as you'd think
"Password management firm SplashData released its annual list of the worst passwords of the year and it's just as dreadful as you'd think. The company, which analyzed the 3 million passwords leaked online last year, revealed that the most common leaked password in 2014 was "123456," followed by "password" — both topped the list last year, too."
passwords  techsupport  security-computer 
january 2015 by daguti
« earlier      
per page:    204080120160

related tags

!!to-read  !to-read-agora  adobe  adobe-flash  airplanes  airplanes-drones  amazing  amazon.com  analysis  anonymity  anonymity-tor-project  anonymous(hacking-group)  anti-something  apache  apple  apple-iphone  audio  banks  big-brother  big-brother-prism-scandal  bios  blogging  browsers  browsers-firefox  browsers-google-chrome-browser  bureaucracy  business  business-ideas  business-ideas-niche  business-small  cars  celebrities  cellphone  childrearing  children  cloud-computing  codes-barcodes  comcast  companies-instagram  companies-paypal  companies-reddit  computers  corruption  countries-brazil  countries-china  countries-united-states-america  credit  credit-cards  credit-report  crime  crime-identity-theft  crime-theft  crowdfunding-kickstarter  cryptocurrencies-bitcoin  currency  customer-service  data-wipe  death-dying  death-dying-will-and-power-of-attorney  diaspora  disaster  disaster-man-made  disaster-nuclear  domain-names  dropbox  e-commerce  education-for-me  email  employees-insubordination  encryption  encryption-software-truecrypt  entrepreneurs-young  ethics  explanation-simplification  facebook  fail  fail-penny-wise-pound-foolish  fight-the-g  filmmaking-technique  firewalls  firewire  firmware  foursquare  frameworks  free  freedom  freeware  funny  future  future-dystopian  future-faith-in-humanity  gadgets  getting-started  godaddy  google  google-android  google-apps  google-calendar  google-docs  google-drive  google-gmail  government  government-cia  government-fbi  hacking  hacks  hardware  hardware-printers  health-aging  hiddeninfo  history-computer  history-repeating  home-improvement  home-stuff  howto  hypocricy  i-own-this  interesting  interface-to-tools  internet  internet-internet-of-things  java-related-to  journalism  keepass  keyboard-related  learning-alternative  learning-self-taught  legal-or-law  light  linkedin  location-related  marketing-social-media-campaigns-disasters  marketing-tactics--educating-or-content-marketing  marketing-tactics--tracking-competition  marketing-the-internet-will-expose-your-lies  me-stuff  medicine  meetup-ny-tech-group  meetup-organizer-topics  microsoft  microsoft-excel  microsoft-office  microsoft-word  military  milliondollarhomepage  mistakes  mobile  money  music  myspace  networking-computers  new-features  news  nsa  nuclear  open-source  operating-systems  operating-systems-linux  operating-systems-unix  optimization-website  outsourcing  paradigm-shifts  paradigm-shifts-new-or-emerging-things  passwords  pdf  pdf-related-to  people-barack-obama  people-bruce-schneier  people-donald-trump  phishing  photos-related-to  photoshop  physics  piracy-intellectual-property  plugins  politics  predictions-related-to  privacy  programming  programming-mysql  programming-ruby-on-rails  projects-cerebrus-sites-to-fix  projects-stalking  projects-w-rob-reactive-marketing-material  projects-w-ted-rocknjoe  proxy  receipt  recycling  reference  research-market  restaurants  retail  rfid  safety  scary  science  search-engine  secrets  security  security-computer  security-national  security-personal  seo  shopping  siliconvalley  skype  social-engineering  social-media  social-networking  social-networks  software  solaris  spelling  spying-or-surveillance  ssl  startups-going-above-and-beyond  statistics  sun  sun-blog  survival-tech  sysadmin  technology  techsupport  techsupport-bulletins  telephone  terrorism  terrorism-as-excuse-for-big-brother  terrorism-dont-erode-freedoms  tips-n-tricks  to-do-before-you-die  tools  top-secret  torrents  toys  tracking-reputation  tracking-stolen-hardware  travel  twitter  uptime-downtime  url-shorteners  usb  user-interface  utilities  video  virus-anti  virus-or-malware  visualization  vpn  war  warfare  warnings  weapons  website-improvement  wifi  windows  wireless  wordpress  work-tools  world-records  yahoo  youtube 

Copy this bookmark: