cs

366 posts

cs banner
cs

cs

@rxcole

Security things • Board advisor • Raising awareness of consumer #privacy and the threat landscape.

Los Angeles, CA Katılım Haziran 2010
54 Takip Edilen9.1K Takipçiler
cs
cs@rxcole·
@RachelTobac sure, they can process audio from a shared video, live photo, voice recording if you grant permissions; selectively or "all." But stating it's a big deal because the mic indicator isn't lit is a bit of a click bait and bit over exaggerated as an issue.
English
0
0
0
83
Zoë Schiffer
Zoë Schiffer@ZoeSchiffer·
NEW: Elon Musk has another alt account, @e, that he had Twitter transfer to him shortly after the takeover. I'm told the person who owned the account did not want to hand it over (the account had been hacked and suspended before due to the high value handle, and the previous owner wanted to keep it).
English
170
790
4.4K
1.6M
cs
cs@rxcole·
@DuckDuckGo They meant creating a new email. Let’s say you want to mail someuser@gmail.com from your duck email (yourduckemail@duck.com) You can do this by entering the recipiebt as: someuser_at_gmail.com_yourduckemail@duck.com
English
0
0
1
168
DuckDuckGo
DuckDuckGo@DuckDuckGo·
Yup! Reply to any email sent to one of your Duck Addresses as you normally would. We route your replies through duck.com so they're delivered from the Duck Address they were sent to.
English
4
18
106
76.2K
cs
cs@rxcole·
@NathanMcNulty PWAs open up their own attack surface and carry their own risk, regardless of the user. Please have a read about service works and manifests.
English
1
0
1
60
Nathan McNulty
Nathan McNulty@NathanMcNulty·
Third, I know some people absolutely love Outlook, but you really should consider running the Outlook PWA for high risk users, even consider MDAG containers It's surprisingly good and reduces attack surface We can pre-deploy these now via policy as well! #webappinstallforcelist" target="_blank" rel="nofollow noopener">learn.microsoft.com/en-us/deployed…
Nathan McNulty tweet media
English
6
12
79
44K
Nathan McNulty
Nathan McNulty@NathanMcNulty·
Super busy week and missed all the fun... I'm seeing a lot of great discussions around discovery, detection, etc., but the only remediation I'm seeing mentioned is "just patch" Except patching doesn't fix the root issue, as is often the case with this type of vuln What do? 🧵
English
1
26
81
29.6K
cs
cs@rxcole·
Reaching out to my #infosec and #privacy advocates, i'm in search of getting some feedback and perspective on CeartasDMCA - DM or reply.
English
3
0
29
3.1K
cs
cs@rxcole·
@JohnnyAkzam Oh, cause we know rules shouldn’t apply to him.
English
0
0
0
0
cs
cs@rxcole·
@Valkyrae How? No 2FA? Reusing passwords?
English
0
0
0
0
RAE
RAE@Valkyrae·
currently being hacked on YouTube and they changed my username to Tesla and proceeded to play a Tesla video on livestream lol.. @elonmusk if you're the one hacking me plz stop
English
1K
1.9K
118.6K
0
meg west
meg west@cybersecmeg·
here are some of my favorite photos from my hike within the saxon switzerland national park (which ironically isn’t within switzerland, rather within germany and the czech republic) this weekend!
meg west tweet mediameg west tweet mediameg west tweet mediameg west tweet media
English
7
1
175
0
cs
cs@rxcole·
Tiktok's parent company ByteDance plans to "monitor the personal location of some American's." Restricting what data is shared with these apps is becoming more and more important for your #privacy! #infosec gizmodo.com/tiktok-bytedan…
English
3
13
44
0
Rachel Tobac
Rachel Tobac@RachelTobac·
*New live hack demo video* CNN’s @donie asked me to hack him again at @defcon — hacked him last time thru service provider call center attacks, but this time I intruded using the easiest method: reused passwords found in data breaches. Here’s the breakdown.
English
31
499
1.7K
0