Favorable exchange rate on a fake cryptoexchange | Kaspersky official blog

Online scammers use all sorts of ways to separate cryptoinvestors from their prized bitcoin. They create fake news sites and promise helicopter money. They even post screenshots in Lightshot with “cryptowallet login credentials” — this being a trap for folks who have a weakness for other folks’ secrets and a free lunch. We recently uncovered a new scheme in which YouTube users are lured to a fake cryptoexchange through videos about a “bug” that supposedly lets them take advantage of a huge discrepancy in exchange rates.

How to protect corporate IoT devices | Kaspersky official blog

IoT devices have long been an integral part of the technological and production processes of many modern companies. They are used in industrial facilities, in smart buildings, and in everyday office life. However, their safety has always raised concerns. Especially considering that many devices require access to remote systems via the Internet — for firmware updates, monitoring, or management. In fact, the introduction of IoT devices into corporate infrastructure greatly increases the attack surface, and there is no way to equip every device with protective technologies.

7 steps to avoid uncoordinated vulnerability disclosure

Imagine the following situation. You work as a cybersecurity manager for a company that owns the website www.example.com. One day, your sales department receives an email from an unknown individual. The sales department forwards it to you. The email has the following content:

You example.com/login.php page break. Send XSS.

?</script><img/*%00/src="worksinchrome&colon;prompt&#x28;1&#x29;"/%00*/onerror=’eval(src)’><img/&#09;&#10;&#11; src=`~` onerror=prompt(1)><form><iframe &#09;&#10;&#11; src="javascript&#58;alert(1)"&#11;&#10;&#09;;>

Five Eyes Cyber Security Predictions

Introduction

The cybersecurity strategies of the Five Eyes alliance are a relevant source of information to understand the coming trends of cyber warfare and cyberterrorism. The Five Eyes nations – Australia, Canada, New Zealand, the United Kingdom, and the United States – are attractive targets for other nation-states due to the members’ economic, military and technological advantages. As the five countries face similar threats online, each Five Eyes government developed its long-term strategy to address the cybersecurity challenges in the future. Therefore, these forward-thinking cyber strategies are good candidates to demonstrate what the future brings regarding cyber warfare and cyberterrorism.

DS620slim tiny home server

In this blogpost, I describe the Synology DS620slim. Mostly these are notes for myself, so when I need to replace something in the future, I can remember how I built the system. It’s a “NAS” (network attached storage) server that has six hot-swappable bays for 2.5 inch laptop drives.

As TikTok Promises US Servers, FCC Commissioner Remains Critical of Data Privacy

On Tuesday Brendan Carr, a commissioner on America’s Federal Communications Commission,warned on Twitter that TikTok, owned by China-based company ByteDance, “doesn’t just see its users dance videos:
It collects search and browsing histories, keystroke patterns, biometric identifiers, draft messages and metadata, plus it has collected the text, images, and videos that are stored on a device’s clipboard. Tiktok’s pattern of misrepresentations coupled with its ownership by an entity beholden to the Chinese Community Party has resulted in U.S. military branches and national security agencies banning it from government devices…. The CCP has a track record longer than a CVS receipt of conducting business & industrial espionage as well as other actions contrary to U.S. national security, which is what makes it so troubling that personnel in Beijing are accessing this sensitive and personnel data.
Today CNN interviewed Carr, while also bringing viewers an update. TikTok’s China-based employees accessed data on U.S. TikTok users, BuzzFeed had reported — after which TikTok announced it intends to move backup data to servers in the U.S., allowing them to eventually delete U.S. data from their servers. But days later Republican Senator Blackburn was still arguing to Bloomberg that “Americans need to know if they are on TikTok, communist China has their information.”

Notch will sell you insurance in case your Instagram gets hacked

Getting hacked sucks. It’s even worse if you’re a digital creator whose social media accounts literally pay your bills. When creators get hacked, it can mean that they aren’t able to post sponsored content, earn payments from badges or operate their Instagram shops — it’s debilitating, like if a chef broke their arm and had to cook with one hand.

Weekly Update 302

In a complete departure from the norm, this week’s video is the much-requested “cultural differences” one with Charlotte. No tech (other than my occasional plug for the virtues of JavaScript), but lots of experiences from both of us living and working in different parts of the world. Most of it is what Charlotte has learned being thrown into the deep end of Aussieness (without the option of even getting out of the country until very recently), which I thought made for some pretty funny viewing 🤣