Remove story how-to-deal-with-online-harassment
article thumbnail

The Hacker Mind Podcast: Hacking Communities

ForAllSecure

As we head to Hacker Summer Camp, how should we rebuild our infosec communities to be more inclusive and diverse? For instance, how do we interact with each other again? Let's take a moment and consider how we can emerge from our quarantine and really do this right. Jack Daniel offers his unique voice. So lots of questions.

Hacking 52
article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects.

Mobile 352
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse. Vamosi: Ever get the feeling that someone is watching you.

article thumbnail

IoT Secure Development Guide

Pen Test Partners

Introduction This guide deals with threat modelling and early stages of development so that security issues and controls are identified before committing to manufacturing. Current attack methods, and the pitfalls we find in embedded designs, have been highlighted so that a finished product is as secure as it can be. Table of contents 1.

IoT 52
article thumbnail

Would real identities make social media safer?

Malwarebytes

“Use real identities to reduce abuse online” is a talking point you’ve almost certainly seen down the years. Already, you can see how the system was torn between notions of “Is this a badge of notability, identity, or something else altogether?” It’s an interesting idea, but the devil is in the details.

Media 98
article thumbnail

Conti Ransomware Group Diaries, Part III: Weaponry

Krebs on Security

Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Conti sought out these tools both for continuous testing (to see how many products detected their malware as bad), but also for their own internal security. Image: Chainalysis.