• 36 Posts
  • 327 Comments
Joined 2 years ago
cake
Cake day: March 2nd, 2023

help-circle


    • You have a malicious actor on your trusted network.
    • If so, you have bigger problems.

    This is more likely than you think. There’s more computers than you realise on the average network. Many aren’t updated and have vulnerabilities. If there’s one malware on one machine on your network, that means a malicious actor is on your network.

    Common exemples :

    • Home WiFi network with old unpached router, Android smartphone, network printer, security camera, thermostat, robot vacuum cleaner, smart lightbulb, smart TV, …
    • Unsecure WiFi network at the cafe, train station, hotel, … where you connect a laptops that is sometimes used for printing and which has CUPS


  • China’s Ministry of Commerce said Tuesday that PVH Corp. must provide documentation and evidence within 30 days to show it did not engage in discriminatory practices

    That’s one way of saying they want this US company to provide proof they don’t comply with US sanctions.

    I don’t understand what they’re realistically hoping for. Forcing them to pick between operating in the US or operating in China?

    At least this is putting a spotlight on the genocide of Uyghurs.








  • Hirom@beehaw.orgtoScience Memes@mander.xyzButts
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    18 days ago

    They’re looking for a way to save the live of people in respiratory distress, such as intensive care patient with Covid19 and damaged lungs.

    Doctors and biology researchers need to move passed the ick factor sometimes to make progress. Joking about it is a good way to do that.









  • Knowledge of the account is an obvious caveat. Yubikey-based MFA is an added layer of protection for accounts, so any kind of attack against MFA assumes the attacker already knows which account to target.

    It’s like saying “our door lock is flawed, but the attacker would need to have knowledge of the door”.

    The cost and complexity is what’s noteworthy and is more relevant. Although attack cost and complexity usuallu goes down with advances in tooling and research. So it may be a good idea to plan a progressive retirement of affected keys.