Tumgik
#cybersecurity
scipunk · 16 hours
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Hackers (1995)
166 notes · View notes
icykalisartblog · 9 months
Text
DDoS Attack Against AO3: Correcting Misinformation
Normally I don't make any posts like this, but I have an interest in cybersecurity and sadly I've seen people are being really ignorant about this recent DDoS attack against the site AO3 (Archive of Our Own), so I thought I'd remind people of a few things:
Anonymous Sudan appears to have no actual link to Sudan at all, or to any previous hacktivist groups that once operated there. This masquerade is probably based in anti-immigration and other racist sentiments, and utilizing those sentiments in other people to scare people and set up Muslims and Sudanese people as a target. This should be obvious from the language used in their note, but this was already known prior to this particular attack.
This so-called Anonymous Sudan has actually been very active recently—remember that they claimed to attack Reddit, Flickr, Riot Games, a huge number of Microsoft web portals like OneDrive and Outlook, etc. before AO3, so AO3 was totally a logical target for them since they've gone after smaller entities before. DDoS attacks like this are easy for any script kiddie to set up, so it's not weird that they'd go for a smaller target like this.
Honestly this group of posers probably just wants money, everybody. They sent AO3 a ransom note asking for Bitcoin (and just in case people don't know, do not pay a ransom if at all possible if this ever happens to you).
My advice to people who've noticed this attack is two-fold: calm down since this is part of a larger pattern that has literally resulted in basically no loss for the end-user of any of the sites, and... I don't really know a better way to put this, but don't believe everything you read. A religiously-motivated hate group wouldn't use terms like "LGBTQ+" and "smuts," and it's so blatantly obvious that the timing of every single one of these attacks is being used to smear Muslims and Sudanese people if you think about current events for like. One second. And if you look up Anonymous Sudan, you'll see their string of attacks and how all experts know that they have nothing to do with Sudan at all. Even AO3 itself told everybody that the group is lying about their motivations... though I think I'd go further than that personally because even their name itself is almost certainly a total sham.
To be clear: this post isn't targeted at anyone in particular. I've just seen a lot of people falling for this overall or not realizing this is part of a pattern, and I also wanted to remind everyone that this isn't anything to be concerned about. What is something to be concerned about is not doing research or thinking critically and then unwittingly spreading racist ideas.
25K notes · View notes
catgirlbulge · 5 months
Text
Hey y'all, there's been a zero-day vulnerability found in WinRAR, so you gotta update it if you're on an older version (anything below 6.24/6.23). It doesn't auto update so you need to do it manually. It's been around for a few months and has been fixed, but if you don't update your shit then your computer will still be vulnerable.
please reblog this so that people learn about it or whatever (10/19/23)
10K notes · View notes
batshit-auspol · 8 months
Text
August 2016: Australia’s national census night fails after authorities report the website is receiving a sophisticated DDOS attack that has taken it offline.
It was later revealed that the so called “attack” was actually just the entire population of Australia attempting to complete the census.
8K notes · View notes
nervouskittentiger · 5 months
Text
Hey everyone. Friendly reminder that if you get a pm such as this, DO NOT click ANY suspicious links. Or any links in general. These are bots made to steal your data, and do not have your best interests in mind. Instead, you should click „Mark as spam.“ to remove the message.
Tumblr media
Again; NEVER CLICK THESE LINKS. Just mark as spam and move on with your day.
3K notes · View notes
wordpressvip · 1 year
Text
Tumblr media
You other web hosts can't deny That when a load time's more than an itty bitty wait And a hacker's in your space You get... Well, pretty upset. That's not something to take lightly. That's why you shouldn't settle for those other web hosts. You need WordPress VIP: the world's most popular content management system, built with enterprise-grade security and reliability. 🤝
5K notes · View notes
Text
Spies are supposed to be good at keeping secrets, but soldiers in 8200 like to talk about their service. Technically, David said, he combed through data from a base in central Israel to determine where bombs should fall. But at the end of the day, he assured me, the military was really more of a networking opportunity—a surefire way to land a high-paying gig at Google or Facebook. As his time in the army neared an end, he turned his work surveilling the occupied Palestinian territories into a line on a corporate CV, toured high-tech companies in Central Tel Aviv, and was connected to cybersecurity CEOs over WhatsApp. While some soldiers in 8200 spend their time monitoring Hezbollah cells in Lebanon or waging covert war against Iran, others are tasked with managing Israel’s high-tech military occupation of Palestine. The destructive effects of Israel’s surveillance regime in the West Bank and Gaza are well-documented, but veterans of intelligence units who surveilled Palestinians often describe their work as removed from the reality of occupation. David was just one of many veterans I spoke with who framed his service in the parlance of high-tech careerism: as another kind of DevOps, product management, or data analysis. These days, intelligence units are structured in the image of tech conglomerates, and tech conglomerates are contracted to do the work of intelligence units. From Israeli military bases to Silicon Valley corporate campuses, warfare has simply become a white-collar tech job.
260 notes · View notes
brothertedd · 20 days
Text
Tumblr media
376 notes · View notes
longreads · 16 days
Link
“Despite endless warnings highlighting the dangers of the digital world, there is a growing acceptance that, in return for the speed and convenience of the internet, we must relinquish a little of our privacy. It’s a trade-off, trusting that the institutions we most rely on—banks, insurance companies, government agencies—will keep our personal details safe. Seldom, however, are we without a major hacking story.”
It's been 41 years since the movie "WarGames" introduced many to the concept of hacking. In our latest #longreads reading list, Chris Wheatley rounds up some sobering and fascinating pieces about cyberattacks (and those who undertake them). Read it here.
498 notes · View notes
scipunk · 12 days
Text
Tumblr media Tumblr media Tumblr media Tumblr media
Underground: The Julian Assange Story (2012)
An old analog telephone exchange.
----
In the analog telephone exchange era, phone hacking techniques were often referred to as "phreaking."
Phreaking involved exploiting vulnerabilities in the telephone network to make free long-distance calls, manipulate phone systems, or access restricted information.
Phreakers used various methods, such as tone dialing, blue boxes, and red boxes, to bypass billing systems and gain unauthorized access to phone networks.
278 notes · View notes
jj-wildheart · 4 months
Text
401 notes · View notes
unichrome · 8 months
Text
I remember attending those "girls in technology" programs and they just felt very alienating. You visited several places involving tech and they were all guys talking like you had no idea what anything is. No women in sight except receptionists/cleaners.
The program that intended me to join the tech industry just further hammered home that I don't belong there.
The best "girls in tech" was me working my way in by myself and gaining the self-esteem and confidence to not only not give a shit, but also thinking the men don't know shit more than I did, and are in most cases hired because they're men who feels entitled to a position in IT because they man and man logical.
I don't know how many incompetent men I've met in my career path that think they are a gift from the IT gods.
My tip for the girls/women reading this is gain the self-esteem enough to ignore what men are doing and wants us to be. Find your own path based on your skill. I can guarantee that an incompetent male will take many job positions but as your skill grow and as the men fail (often upwards) sooner or later the employer don't have any choice other than hiring you.
And then it's your time to shine. I almost immediately became the top malware analyst they had as I sharpened my skills every day while the men thought they did a good enough job because they were hired after all.
Then they'll ask you how you're so good at it, and that's worth the struggle you went through.
So don't give up on your dream blah blah basically ignore men, ignore their strategies for getting hired, you know what to do and you know how to get better. Find other women and encourage each other ok? You can do this! 💕
525 notes · View notes
Text
Tumblr media
ㅇㅅㅇ (use firefox)
544 notes · View notes
nyancrimew · 8 months
Text
new blog post:
3K notes · View notes
sayruq · 3 months
Text
Tumblr media Tumblr media
And allegedly the war cabinet went into bomb shelters
209 notes · View notes
w-o-n-s-h-i-kawaii · 3 months
Photo
Tumblr media
173 notes · View notes