Cybersecurity News

1332 readers
1 users here now

Welcome to Cybersecurity News!

A community that collect news and other tidbits related to cybersecurity in all its domains.

There are no hard and fast rules regarding what to post here-- we are fine with both pop news articles and more technical pieces regarding cybersecurity.

We use a bot called flynnbot to repost some rss feed content but the majority of posts are human-curated.

New to Cybersecurity?

Here are some resources to get you started:

Related Communities

[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]

founded 1 year ago
MODERATORS
76
77
78
79
80
81
82
83
84
85
86
87
88
89
 
 

cross-posted from: https://midwest.social/post/6303502

The FBI investigated a man who allegedly posed as a police officer in emails and phone calls to trick Verizon to hand over phone data belonging to a specific person

Despite the relatively unconvincing cover story concocted by the suspect ... Verizon handed over the victim’s data to the alleged stalker, including their address and phone logs. The stalker then went on to threaten the victim and ended up driving to where he believed the victim lived while armed with a knife

Version Security Assistance Team–Court Order Compliance Team (or VSAT CCT) received an email from [email protected].“Here is the pdf file for search warrant,” Glauner, allegedly pretending to be a police detective, wrote in the email. “We are in need if the this [sic] cell phone data as soon as possible to locate and apprehend this suspect. We also need the full name of this Verizon subscriber and the new phone number that has been assigned to her. Thank you.”

Verizon is not the only telecom that has failed to properly verify requests like this. In a somewhat similar case, I spoke to a victim who was stalked after someone posing as a U.S. Marshal tricked T-Mobile into handing over her phone’s location data.

90
 
 

Hi everyone! I’ve recently got my first ever Mac, it’s a MacBook Air M1 (16 GB).

My question is about malware, viruses and things like that. So, I’ve managed to create a VM of a MacBook Air M1 (8GB) with the same OS as the main machine on an external SSD, not logged into Apple and no personal information saved, not even accessibility to the keychain. My plan for this was to run suspicious apps, visit suspicious sites, basic stuff. The main machine is connected to the iCloud Private Relay, the VM isn’t.

My question is: if this virtual machine was to be hacked, infected by something or gained remote access or something, could the main machine be effected in any way? Could I be affected by any means?

91
92
93
94
95
96
2
140: Revenge Bytes (darknetdiaries.com)
submitted 11 months ago by [email protected] to c/[email protected]
97
98
99
100
view more: ‹ prev next ›