literatur.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Der Einstieg ins Fediverse für Autor:innen und Literaturmenschen ... The gateway into the fediverse for authors and all people interested in literature.

Verwaltet von:

Serverstatistik:

309
aktive Profile

#hacker

12 Beiträge11 Beteiligte0 Beiträge heute

Il 19enne membro della cyber-gang d’élite Scattered Spider rischia 60 anni di reclusione

📌 Link all'articolo : redhotcyber.com/post/il-19enne

Un membro del gruppo #hacker di Scattered Spider, è stato accusato di furto di criptovaluta su larga scala e #operazioni di hacking dei #sistemi aziendali. Noah Michael Urban è stato arrestato all’inizio del 2024 , patteggiando le accuse in Florida, dove è stato accusato di #frode e furto di #identità.

il blog della sicurezza informatica · Il 19enne membro della cyber-gang d'élite Scattered Spider rischia 60 anni di reclusioneNoè Michael Urban, membro di Scattered Spider, patteggia per furto e hacking. Rischia 60 anni e perde milioni di cripto. E la corona di King Bob.
#redhotcyber#hacking#cti

youtu.be/c2qW0JPHwxM

Sleepy talks about Surveillance and the Renaissance. What is the landscape of surveillance today. This is a problem that we are neck deep into as a population without real understanding of the potential repercussions of future generations.

Reference:
The Art of Invisibility
By Kevin Mitnick
Permanent Record
By Edward Snowden

#surveillance#privacy#books
Antwortete im Thread

Zwecks Auffindbarkeit ein paar Hastags dazu:
Untersuchte Hersteller: #Huawei #Sungrow #GinlongSolis #Goodwatt #GoodWe #SMA
Allgemein: #PV #WR #Wechselrichter #Solar #Inverter #SunDown #Forescout #China #Hacker #SmartHome #IoT
forescout.com/research-labs/su
@bsi

Recommendations
Manufacturers
Development • Devices: holistic security architecture including secure boot, binary hardening, anti-exploitation features, permission separation etc
• Applications: proper authorization checks on web applications, mobile applications and cloud backends
Testing • Regular penetration testing on applications and devices • Consider bug bounty programs
Monitoring Web Application Firewalls Remember that a WAF does not protect against logical flaws

Users
Residential and commercial users • Change default passwords and credentials • Use role-based access control • Configure the recording of events in a log • Update software regularly • Backup system information • Disable unused features • Protect communication connections
Commercial and utility installations (in addition) •
Include security requirements into procurement considerations
• Conduct a risk assessment when setting up devices • Ensure network visibility into solar power systems • Segment these devices into their own sub-networks • Monitor those network segments

Antwortete im Thread
@ekaitz_zarraga@mastodon.social

The #Guix leaders are indeed the reason I don't even give it a try despite some great people like you working on it.

I will reconsider when I'll read a public apology for this personal attack to a neurodivergent #hacker such as #RMS.

It worth to remember how that "joint stab in the back" was published while RMS was under attack because he dared defend Minsky's memory from the same sort of mob justice that was then redirected (and amplified on #BigTech social media) against RMS himself.

Some of those "leaders" who signed that "joint statement" a couple years later signed an even worse attack built on top of lies.

These sort of personal attacks have clear political goals, "incidentally" aligned with BigTech interests.

Now @zimoun@sciences.re could try to sort me among #Stallman fanboys to reinforce his beliefs, but in fact I'm pretty critical of RMS work: ultimately I think he based free software on a cold-war biased ideology, without a proper balance between communion (aka sharing strongly protected commons) and freedom. This huge error left space to #opensource and to the current use of #FreeSoftware by all sort of large corporations to abuse and subdue people.
Another (related) issue has been the total lack of a cohesive architectural design for #GNU system: RMS was too (inconsciously) fond of free market ideology to lead the movement's technically, and this lack of cohordination was turned by #ESR to the "bazaar" (not so subtle) sublimation of free market, to ease corporate exploitation of the high skilled labour of #hackers.

But in fact, with all of his political errors, he's still the most coherent and commited free software activist out there.

So I will consider Guix again when they will publish a joint apology with the same visibility the back-stab had in 2019.
guix.gnu.orgJoint statement on the GNU Project — 2019 — Blog — GNU GuixBlog-Einträge über GNU Guix.

PI: Stützt sich die Berichterstattung über rechtsextemistische Inhalte eines Chatverlaufs einer namentlich benannten Person auf eine von einem #Hacker erstellte sog. html-Datei, muss die Authentizität der Datei und die Vertrauenswürdigkeit des Hackers besonders sorgfältig geprüft werden.

hessenlink.de/PM20250331

Ordentliche Gerichtsbarkeit HessenHohe Anforderungen an die Prüfung der Zuverlässigkeit einer QuelleDas Oberlandesgericht Frankfurt am Main hat die Beklagten zum Unterlassen verurteilt, da sie nicht nachgewiesen haben, dass die Chat-Inhalte tatsächlich vom Kläger stammten.