Erik Terik Ashfolk

@atErikM

Security.Privacy. InfraStructure FairOpportunity4all. Defense​.Protest. Developing​ . MyViews R MyOwn.(Follow/RT/Like)≠Endorse

California, USA
Vrijeme pridruživanja: lipanj 2015.

Tweetovi

Blokirali ste korisnika/cu @atErikM

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @atErikM

  1. proslijedio/la je Tweet
    23. sij
    Poništi
  2. proslijedio/la je Tweet

    "SIM swap" attacks have been in the news for years. They’ve enabled serious financial crimes and even a hack of the Twitter CEO's account. We spent 6 months researching how vulnerable wireless accounts are to these attacks. Our draft study is out today.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    Until the carriers fix these problems, you’re at risk of a SIM swap. But you can protect yourself right now. Take a few minutes to check all your online accounts. Make sure 2-factor authentication is enabled, and it’s a secure option such as an authenticator app, and not SMS.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    10. sij

    Consumers are at the mercy of wireless carriers when it comes to being protected against SIM swaps. It’s time for the FCC to step up and protect consumers by holding carriers accountable when their systems fail to protect against SIM swapping.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    12. sij

    is already facing a number of lawsuits for its negligence in attacks. One employee was a prolific sim swapper and would charge $4,300 for a stint, according to a court case filed in October, to be heard in California ➡️punitive damages as a private remedy

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    13. sij

    Thirty-nine out of 50 SIM swap attempts by US-based researchers proved successful

    Poništi
  7. proslijedio/la je Tweet

    SMS is not 2FA-secure

    Poništi
  8. proslijedio/la je Tweet
    13. svi 2019.

    Open your iPhone. Settings -> Touch ID & Passcode. (The red fingerprint icon) -> scroll all the way down and TURN OFF "USB accessories". You're welcome. Remember the longer your passcode (longer than 15 characters)the better chance of your device surviving brute Force attempts.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    has spent more than $1 million on (the iPhone hacking tool). Their contracts are “the most spent on the superpowered iPhone hacking service by any government department, local or federal.”

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    Security nightmare: Researchers tried 30 times to illegitimately get US-based mobile phone companies to switch users' accounts to new phones. It worked EVERY time. Mobile carriers are indifferent, if not hostile, to their customers' security.

    Poništi
  11. proslijedio/la je Tweet
    3. pro 2019.

    🔥👾 (finally) a macOS implant that support direct in-memory execution of remote payloads! New blog post: "Lazarus Group Goes 'Fileless' H/T

    Poništi
  12. proslijedio/la je Tweet
    6. pro 2019.

    Great analysis by of new fileless macOS techniques...no surprise that they're targeting organizations.

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet

    great blog post by ! 🙌 "Abusing Electron apps to bypass macOS's security controls"

    Poništi
  15. proslijedio/la je Tweet
    30. pro 2019.

    "Apple's latest filing should give all security researchers, app developers, and jailbreakers reason to be concerned." Read the full statement from Corellium CEO on Apple's DMCA filing here:

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. proslijedio/la je Tweet
    30. lip 2019.

    Running iOS in QEMU to an interactive bash shell (Part 1) : cc

    Poništi
  18. proslijedio/la je Tweet
    4. srp 2019.

    pihole-google : Completely block Google and its services :

    Poništi
  19. proslijedio/la je Tweet
    26. srp 2019.

    IPv6teal : Stealthy data exfiltration via IPv6 covert channel : cc

    Poništi
  20. proslijedio/la je Tweet
    18. ruj 2019.

    Real-Time-Voice-Cloning : Clone a voice in 5 seconds to generate arbitrary speech in real-time : Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis : (pdf) Demo :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·