Another day another rootkit. There was an interesting exploit made public couple days ago, that allows attacker to stay hidden from view point of Windows subsystems in charge of security while having quite a bit of an access to that PC and of course company that identified ability to exploit offering their services to protect PC's ... quite suspicious ... thehackernews.com/2021/09/a-ne

If anyone still had an illusion that social media platforms are about purpose, social good, here is article for you. They only care about ways to exploit networking effect for as long as it increases their bottom line, thus people with large audience, politicians and etc are exempts from rules defined by platforms. Rules are for regular people and people are just a product being packaged and sold to advertisers. Ethiork helps you break free of those giants. wsj.com/articles/facebook-file

Microsoft disclosed Zero-Day vulnerability 2 days ago about remote code execution that is exploited through specially crafted MS Office documents. Please be careful and better refrain from opening any docs from untrusted sources. It sounds like actively exploited targeted attack. msrc.microsoft.com/update-guid

I've been a fan of #Mycroft for a while now, but I recently learned some things they're involved with that I was completely unaware of. Maybe that's my fault for not paying attention, or maybe they could use some help in the PR department.

They've scored a contract with #NASA for various "space" related projects which sound interesting.

bizjournals.com/kansascity/new

They've been working with Tree Industries on #Ezra EA to develop voice technologies for classrooms.

tree.industries/products/ezra/

Finally got around reducing resolution of the images on my blog and submitting it to 512kb.club/ doing my part in reducing digital waste on the Internet. Check it out here sergeysh.com/

Security poverty line. Many organizations fell behind it with more sophisticated threat actors out there. However organizations can buy their way out of it with more investments. What about individual consumers? Are the products that suitable for consumers? Are they stuck with big tech companies and their "free" products. That's why we started Ethiork project, to give individuals a hand to raise above security poverty line. ethiork.com/

Holidays are usually sweet spot for threat actors, because it's easy to go undetected over extended holidays. There is no sleep people involved in cybersecurity :( here is advisory from CISA and FBI us-cert.cisa.gov/ncas/alerts/a

Product leaders today often met with a dilemma: what are those values you will never compromise on, even if that would cost you a job. I would say ethics should be one of those values, without ethics you but going to be able to build fruitful product or company.

... accidental typo in nmap scan leads to scanning of majority of network infrastructure, which leads to finding some unexpected ports on several host, which leads to a witch hunt unleashing wide variety of tools on to those hosts ... just to confirm that everything runs as expected ... as a result all tools on offensive security box has gotten most recent updates and skills brushed off ...

Those who still live under impression that data anonymization which tech giants tooting while selling your data left and right works read this article: nypost.com/2021/07/25/reportin
Just pay close attention to "how" they investigate rather than what is reported. There are also articles from NY Times
nytimes.com/2021/02/05/opinion
and
nytimes.com/interactive/2019/1
Your data is valuable, stop giving it away for free.

Doing what's right is always more expensive that just brushing symptoms on the surface.

Show thread

ICYMI: We just had our August 2021 Community Update!

We announced the PineNote: a high-end e-ink device powered by the same SoC as the Quartz64.

We also went into detail on upcoming hardware and software updates for PinePhone, Pinebook Pro, and Pinetime.

Read now: pine64.org/2021/08/15/introduc

Humanity as a whole is really good at finding solutions, but a terrible at root cause analysis, so we often would end-up remediating symptoms rather than solving problem. Private companies are quick to come up with new product and keep progress running at a stunning pace, but they can't solve the problems as their focus will be on symptoms that are on the surface, because those are visible to their shareholders, which put company and directors under high pressure.

Here is a demo of Visual Voicemail working on Mobian!

At the beginning of the century we as a society accepted that internet is our future and now it has become irreplaceable. Today coffee makers, dishwashers and other devices from our home are connected to the Internet, so it's time for Zero Trust. Government already realized importance of this concept hard way, time to take embrace it on a personal level. info.summit7systems.com/blog/t

"The Federal Trade Commission unanimously voted Wednesday to pursue policies that will make it easier for people to repair their own things." vice.com/en/article/k78xbn/ftc

What are the alternatives to the walled garden of big tech? Have your own castle where you and your rights are respected. Read why Purism is built with security, privacy and freedom in mind 🌎 puri.sm/posts/defending-agains

Show older
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!