shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

254
active users

#cybersecurityawareness

0 posts0 participants0 posts today
Nead<p>"A severe privilege escalation vulnerability has been discovered in <a href="https://social.vivaldi.net/tags/Notepad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Notepad</span></a>++ version 8.8.1, potentially exposing millions of users worldwide to complete system compromise."<br><a href="https://cybersecuritynews.com/notepad-vulnerability/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/notepad-</span><span class="invisible">vulnerability/</span></a><br><a href="https://social.vivaldi.net/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://social.vivaldi.net/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.vivaldi.net/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Redhotcyber<p>🔥 ULTIMI POSTI PER IL CORSO "DARK WEB E CYBER THREAT INTELLIGENCE" IN PARTENZA IL 15 GIUGNO .</p><p>Sei ancora indeciso?<br>Contattaci tramite WhatsApp al 379 163 8765 o scrivici a academy@redhotcyber.com per avere maggiori informazioni.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/formazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formazione</span></a> <a href="https://mastodon.bida.im/tags/formazioneonline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formazioneonline</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreatintelligence</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreat</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Aerofreak | USA WTF?<p><span class="h-card" translate="no"><a href="https://mastodon.social/@guardingpearsoftware" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>guardingpearsoftware</span></a></span></p><p>Switch from Microsoft to Microsoft, sure.</p><p><a href="https://hessen.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://hessen.social/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a></p>
GuardingPearSoftware<p>The Microsoft Authenticator app is now displaying alerts that its password autofill feature will be discontinued in July. </p><p>Microsoft Authenticator is a free mobile app that offers secure sign-in through multi-factor authentication (MFA) and passwordless logins for Microsoft accounts.</p><p>Users are being encouraged to switch to Microsoft Edge for password management instead. </p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a></p>
Maronno Winchester<p>@hackinarticles@bird.makeup 🔗 <a href="https://bird.makeup/users/hackinarticles/statuses/1927627920861774146" rel="nofollow noopener" target="_blank">bird.makeup/users/hackin...</a> - Pic of the Day <a class="hashtag" href="https://bsky.app/search?q=%23infosec" rel="nofollow noopener" target="_blank">#infosec</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecurity" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecuritytips" rel="nofollow noopener" target="_blank">#cybersecuritytips</a> <a class="hashtag" href="https://bsky.app/search?q=%23pentesting" rel="nofollow noopener" target="_blank">#pentesting</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecurityawareness" rel="nofollow noopener" target="_blank">#cybersecurityawareness</a> <a class="hashtag" href="https://bsky.app/search?q=%23informationsecurity" rel="nofollow noopener" target="_blank">#informationsecurity</a></p>
NO NAME<p><a href="https://soapbox.hackdefendr.com/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> Attacks Are Evolving. Here’s How to Resist Them. </p><p>Improvements in technology have made deepfakes — fraudulent audio, video, and images — easier than ever to create. As a result, 2024 has seen a nearly 60% surge in phishing attacks.</p><p>These attacks hijack our perceptions and our ability to distinguish fiction from reality. They work because they manipulate our brains in ways we’re naturally vulnerable to. </p><p>To protect yourself, you need to be able to reroute immediate reactions and thought pathways. </p><p>This includes: </p><p>1. refocusing attention to counter urgency tactics<br>2. regulating emotional triggers aimed at your compassion<br>3. resisting automatic deference to authority</p><p><a href="https://soapbox.hackdefendr.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://soapbox.hackdefendr.com/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a></p>
NO NAME<p>Be Aware of These Eight Underrated <a href="https://soapbox.hackdefendr.com/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> Techniques</p><p>There are a number of lesser-known phishing techniques that are often overlooked or underestimated yet increasingly being employed by attackers.</p><p>1. SEO Poisoning<br>2. Paid Ad Scams<br>3. Social media Phishing<br>4. QR Code Phishing<br>5. Mobile App Phishing<br>6. Call back Phishing<br>7. Cloud-based Phishing Attacks<br>8. Content Injection Attacks</p><p>See the detailed descriptions of each at this link:<br> <br><a href="https://www.securityweek.com/be-aware-of-these-eight-underrated-phishing-techniques/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/be-aware-of-t</span><span class="invisible">hese-eight-underrated-phishing-techniques/</span></a></p><p><a href="https://soapbox.hackdefendr.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://soapbox.hackdefendr.com/tags/Scams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scams</span></a> <a href="https://soapbox.hackdefendr.com/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@sans_isc" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sans_isc</span></a></span> : even if <a href="https://i5c.us" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">i5c.us</span><span class="invisible"></span></a> does *not* appear to be a regular URL-shortening service, nothing in it's domain name convinces me it's not. Perhaps they're offering *you* a free service that *visitors* pay for with a loss of privacy.</p><p>I do not want to, and simply cannot (I apologize for my intelligence not being artificial) remember all possible aliases of <a href="https://isc.sans.edu" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">isc.sans.edu</span><span class="invisible"></span></a> - in order to prevent from being fooled or phished.</p><p>Why is this not as stupid as Microsoft (microsoft.com) asking their customers to log in to:</p><p>&nbsp;&nbsp;&nbsp;login.microsoftonline.com</p><p>instead of somehing like:</p><p>&nbsp;&nbsp;&nbsp;login.customer.microsoft.com</p><p>?&nbsp;&nbsp;<a href="https://infosec.exchange/tags/WhatWereTheySmoking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatWereTheySmoking</span></a></p><p>Mastodon has its own, IMO excellent built-in URL-shortening system for the final link you asked us to visit:</p><p>&nbsp;&nbsp;&nbsp;<a href="https://isc.sans.edu/diary/31136" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">isc.sans.edu/diary/31136</span><span class="invisible"></span></a></p><p>In fact, the full link to that article is automatically shortened by Mastodon fine too:</p><p>&nbsp;&nbsp;&nbsp;<a href="https://isc.sans.edu/diary/Tracking%20Proxy%20Scans%20with%20IPv4.Games/31136" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">isc.sans.edu/diary/Tracking%20</span><span class="invisible">Proxy%20Scans%20with%20IPv4.Games/31136</span></a></p><p>I juste posted additional reasons in a toot to Margarita Estévez-Abe in <a href="https://infosec.exchange/@ErikvanStraten/112887650119094186" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/112887650119094186</span></a>.</p><p>Let's all do our best to make the internet a safer place!</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@JapanProf" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>JapanProf</span></a></span> </p><p><a href="https://infosec.exchange/tags/URLShorteners" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>URLShorteners</span></a> <a href="https://infosec.exchange/tags/LinkShorteners" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinkShorteners</span></a> <a href="https://infosec.exchange/tags/URLShorteningServices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>URLShorteningServices</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/MaliciousLinks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MaliciousLinks</span></a> <a href="https://infosec.exchange/tags/MaliciousWebsites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MaliciousWebsites</span></a> <a href="https://infosec.exchange/tags/MaliciousURLs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MaliciousURLs</span></a> <a href="https://infosec.exchange/tags/Espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Espionage</span></a> <a href="https://infosec.exchange/tags/Spying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spying</span></a> <a href="https://infosec.exchange/tags/Tracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tracking</span></a> <a href="https://infosec.exchange/tags/Advertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Advertising</span></a> <a href="https://infosec.exchange/tags/Marketing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Marketing</span></a> <a href="https://infosec.exchange/tags/PII" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PII</span></a> <a href="https://infosec.exchange/tags/Trust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trust</span></a> <a href="https://infosec.exchange/tags/Hijacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hijacking</span></a> <a href="https://infosec.exchange/tags/Impostors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impostors</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/Authentic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentic</span></a> <a href="https://infosec.exchange/tags/Authenticity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticity</span></a> <a href="https://infosec.exchange/tags/Awareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Awareness</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://infosec.exchange/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://infosec.exchange/tags/InternetCancer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetCancer</span></a></p>
Sooraj Sathyanarayanan<p>📚 Just completed the 'Basics of Personal Threat Modeling' course by <span class="h-card" translate="no"><a href="https://mastodon.neat.computer/@privacyguides" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>privacyguides</span></a></span> 🛡️ </p><p>Threat modeling is crucial because it helps identify and prioritize the most probable security and privacy risks. It enables focused resource allocation, tailored defenses, and heightened awareness.</p><p>Check it out: <a href="https://learn.privacyguides.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">learn.privacyguides.org</span><span class="invisible"></span></a> </p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.social/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.social/tags/opsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opsec</span></a></p>
ICS Advisory Project<p>Happy New Year! Here are the ICS Advisory Project 2023 Annual Summary Slides for CISA ICS Advisories and this week's Other CERT &amp; Vendor vulnerability advisories weekly summary for 25 – 29 December 2023. Attached are 2023's Annual summary slides.<br> <br>Link to ICS Advisory Project Annual Summary Slides: <a href="https://drive.google.com/file/d/1HYDE_rD1dvJb30r7CuoJuXEYSPNs7MxU/view" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">drive.google.com/file/d/1HYDE_</span><span class="invisible">rD1dvJb30r7CuoJuXEYSPNs7MxU/view</span></a></p><p>This past week, CISA did not release any new ICS Advisories. In its place, the ICS[AP] provided a high-level summary of the 380 CISA ICS Advisories released in 2023. Within this summary, you will find a high-level review of the following:</p><p>- Total Number of vendors reported in ICS Advisories ranked by country<br>- Vendors with a high number of critical severity vulnerabilities<br>- Overview of Vendor &amp; products Affected Global Distribution &amp; Updated CISA Advisories in 2023<br>- Overview of 2023 CISA ICS Advisories CVE CVSS Vectors by Severity<br>- Top 10 CWEs identified on MITRE's 2023 CWE Top 25 Most Dangerous Software Weaknesses (MDSW).<br>- Most reported impacted Critical Infrastructure sectors and by Vendor<br>- ICS Asset Type metrics<br>- Total number of CISA ICS Advisories correlated to CISA KEV Catalog<br>- Mitigation statics based on CISA ICS Advisories recommendations<br>- Top Independent Vulnerability Researchers and Research Organizations for 2023</p><p>ICS[AP] identified 12 new other CERT and vendor products security advisories were released this week for vulnerabilities in the following Vendor products: Moxa (LTE Wireless Gateway &amp; Ethernet remote I/O with 2-port Ethernet switch), Buffalo (Router), Weintek (HMI), and Gallagher (Access Control System). See Weekly Summary of Other Vendor &amp; CERT Advisories for potentially impacted CI sectors.<br> <br>View the summary details of other CERT &amp; Vendor product advisories identified last week (25 – 29 December 2023) at: <a href="https://drive.google.com/file/d/1wBofoXVnP9m9wAKxx2VCSFeS9tTlNMmg/view?usp=sharing" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">drive.google.com/file/d/1wBofo</span><span class="invisible">XVnP9m9wAKxx2VCSFeS9tTlNMmg/view?usp=sharing</span></a></p><p>No updates were added to the CISA KEV Catalog this week.</p><p>Visit the ICS[AP] CISA KEV Catalog Dashboards: <a href="https://www.icsadvisoryproject.com/ics-advisory-dashboards/cisa-kev-for-cisa-ics-advisories" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">icsadvisoryproject.com/ics-adv</span><span class="invisible">isory-dashboards/cisa-kev-for-cisa-ics-advisories</span></a><br> <br>View previous ICS Advisory Project annual and weekly summaries: <a href="https://www.icsadvisoryproject.com/ics-advisory-summaries" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">icsadvisoryproject.com/ics-adv</span><span class="invisible">isory-summaries</span></a><br> <br>To view the updated ICS Advisory Project Dashboards, visit: icsadvisoryproject.com<br> <br>We appreciate everyone's comments &amp; support. Have a great week! <br> <br><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/ot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ot</span></a> <a href="https://infosec.exchange/tags/ics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ics</span></a> <a href="https://infosec.exchange/tags/otcybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>otcybersecurity</span></a> <a href="https://infosec.exchange/tags/otsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>otsecurity</span></a> <a href="https://infosec.exchange/tags/icscybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icscybersecurity</span></a> <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cybersecuritythreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritythreats</span></a> <a href="https://infosec.exchange/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a></p>
Sooraj Sathyanarayanan<p>🚀 Excited to share my latest work: The Ultimate <a href="https://mastodon.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> Hardening Guide! Perfect for enhancing your iPhone/iPad security. 🛡️<br>✅ Easy steps for all users<br>✅ Tips for privacy &amp; security<br>✅ Latest iOS features covered</p><p><a href="https://github.com/iAnonymous3000/iOS-Hardening-Guide" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/iAnonymous3000/iOS-</span><span class="invisible">Hardening-Guide</span></a></p><p><a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mastodon.social/tags/opsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opsec</span></a></p>

🔒 TechCrunch's analysis of the 23andMe breach highlights the vulnerability of personal genetic data, raising concerns about data protection and transparency.


What do you think about this new case of a user data breach by a company revealing sensitive user data? And what steps do you take to ensure the security of your sensitive information? Share your thoughts and experiences with us!

#CyberSecurityAwareness #DataSecurity #DigitalPrivacy

techcrunch.com/2023/12/04/23an

TechCrunch · 23andMe confirms hackers stole ancestry data on 6.9 million users | TechCrunchGenetic testing company 23andMe revealed that its data breach was much worse than previously reported, hitting about half of its total customers.

This is your #infosec Public Service Announcement: Today is the first day of Fall (in the upper hemisphere).

All users should now rotate their passwords to:

  • Fall2023
  • Fall2023! (If they're secure.)

If they are fancy, they can rotate their passwords to:

  • Autumn2023
  • Autumn2023! (If they're secure.)

Note, users should change their passwords to their local language, eg:

  • Autunno2023
  • Autunno2023! (Se sono sicuri.)
  • Осень2023
  • Осень2023! (Если они в безопасности.)

Further Note, if users are in the southern hemisphere, please use the corresponding terms for Spring.

#MythAmerica starts July 4, 2023!

Grab your copy of “Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls That Derail Us” and join this online event!

Details posted in images.

Your photo might get you chosen to receive an original print by yours truly, inspired by the book, and signed by all the authors!

Still need a copy of the book? Click here to purchase: bit.ly/CyberMythsBook

You may or may not know this about me but I published a book couple of years ago on how the average layman can stay safe online. Initially it had a pretty narrow distribution, you could get it on Amazon or you could special order it from your favorite bookstore.

I have now broadened that distribution significantly. You should now be able to get it pretty much everywhere. For all the places you can buy my book check out books2read.com/infosechelp. BTW there are three more distributors that are still working on listing my book on their site.

In addition to all those place it is also available from leanpub.com/onlinesafety where you can pay what you feel is fair.

You can also still special order it from your favorite bookstore. Here are ISBN and the editions that are available with old fashion brick and mortar bookstore distributor.

Paperback 9781733306867

Hardback 9781733306850

Ebook 9781733306874

books2read.comAvailable now at your favorite digital store!Your Safety and Privacy Online: The CIA and NSA by Siggi Bjarnason