Bruce Schneier’s blog put me onto this article, which explains in some depth how with careful detective work, and open-source intelligence (OSINT) made anonymous cryptocurrency transactions not so anonymous. It is a long, but very interesting article but please note the content warning from the Wired website, and do not …
Google block’s a North Korean Chrome exploit -UPDATED
This story was first posted on 25 March 2022 This story This attack used classic social engineering tactics – the hackers posed as recruiters for a dream job or set up a bogus websites aimed at financial and crypto-currency industries – to exploit a remote code vulnerability in Google Chrome. …
Continue reading “Google block’s a North Korean Chrome exploit -UPDATED”
Samsung stolen data dumped online
The Lapsus$ cyber crime gang has revealed online, what Samsung has acknowledged to be nearly 200GB of Samsung internal files. Lapsus$ gang dump Samsung data online • The Register Lapsus$ has also stolen internal files from Nvidia in a separate extortion bid. More bad news for Nvidia – and advice …
More on the Red Cross phishing scam
Following on from this story: Red Cross spam phishing emails doing the rounds – Smart Thinking Solutions Johannes Ullrich, form the SANS Internet Storm Diary, has more details about the payment methods offered: No Bitcoin – No Problem: Follow Up to Last Weeks Donation Scam – SANS Internet Storm Centre
Privacy Enhancements
As part of the “weekend read” and because the BBC promoted a version of it’s news via the privacy enhanced Tor network, I have gathered together some links describing further software and configurations designed to keep your information private. “Browse Privately. Explore Freely.” Tor Project | Anonymity Online Privacy when …