Jeremy Kirk

@Jeremy_Kirk

Covering Aussie and global IT security issues. Executive editor, Information Security Media Group. Secure chat/PGP:

Sydney
Vrijeme pridruživanja: siječanj 2009.

Tweetovi

Blokirali ste korisnika/cu @Jeremy_Kirk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Jeremy_Kirk

  1. prije 16 sati

    Looks like package shipper Toll Group has encountered something that sure seems like .

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    So is back for 2020. And what a documentary. Australians denied a fair hearing speak for the first time to about their experiences before one controversial judge.

    Poništi
  3. 31. sij

    On this week's Download This Show, we unpack the alleged hack of Jeff Bezos's iPhone, why social media may not as bad as we thought for teenagers and how peoples' baby photos ended up on the internet. W/ and

    Poništi
  4. 31. sij

    UK Police Will Soon be able to Search Through US Data Without Asking a Judge:

    Poništi
  5. 31. sij

    In addition to browsing history, Jumpshot’s privacy policy says it collects a *whole* bunch of other stuff, including driver’s license, SSN, passport numbers, etc.

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Reuters said "Avast denied the allegations" No they did not. Avast did not deny anything in our reporting when approached for comment. Instead in response, they just closed a company worth tens of millions of dollars.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. sij

    So remember the classmate that said females can't understand security? I found a logic bug that crashes his TCP/IP server he handed in for his class assignment✊

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    This FTI forensics report is not very strong. Lots of odd circumstantial evidence, for sure, but no smoking gun. The funny thing is that it looks like FTI potentially has the murder weapon sitting right there, they just haven't figured out how to test it.

    Prikaži ovu nit
    Poništi
  9. 22. sij

    In the spirit of 's GIF series, here's what happens when gets in the way of your DNS investigation.

    Poništi
  10. 20. sij

    This is really interesting: Mitsubishi Electric says hackers took advantage of a vulnerability in antivirus software before a patch was issued. The AV software isn’t named.

    Poništi
  11. 20. sij

    When Google translate misses: Used it to translate Mitsubishi Electric’s breach notice. Remember to restrict access to the external crab. Crabs are bad. Crabs + external access =

    Poništi
  12. 17. sij

    Rain! Rain! Rain! Yeah!

    Poništi
  13. proslijedio/la je Tweet
    16. sij

    Anyone know if this is legitimate? Interesting outcome if so.

    Poništi
  14. proslijedio/la je Tweet

    New - The FBI used a GrayKey to get into a locked iPhone 11 Pro Max. That's the latest model. So why is the FBI demanding Apple help unlock much older versions of the device? I've published court docs within from a case in Ohio...

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    "non-sensitive" is not what I would have used to described my breached data from P&N Bank! Received this notice 15mins ago.

    Poništi
  16. 14. sij

    I think what is most appalling about this data breach is that 1) we spent days trying to get a response from this company and 2) it involves people’s baby photos. Let’s do better.

    Poništi
  17. 13. sij

    No thanks, Twitter.

    Poništi
  18. proslijedio/la je Tweet
    13. sij

    Anyone got a security contact at ? Trying to help some folks get in touch with them, their Twitter account seems dormant but the service is certainly still running. So far they’ve been unresponsive on other channels.

    Poništi
  19. proslijedio/la je Tweet

    Check what is at your network border. Eg if you use Shodan Monitor, it will automatically email you if you’re vulnerable, no extra work required.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    Firewalls, multi factor authentication etc do not protect you. The vulnerability is in the product, and exists in a layer before authentication. Your Citrix ADC/Gateway almost certainly has sensitive access (eg AD) even if you locked down access.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·