shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

244
active users

#sbblogwatch

0 posts0 participants0 posts today
Richi Jennings<p><a href="https://vmst.io/tags/Zuckerberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zuckerberg</span></a>’s privacy pledge revealed as ineffectual</p><p>Millions of websites are leaking your private information to <a href="https://vmst.io/tags/Meta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meta</span></a>, the parent company of <a href="https://vmst.io/tags/Facebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facebook</span></a>, <a href="https://vmst.io/tags/Instagram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Instagram</span></a>, etc. By hacking <a href="https://vmst.io/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> browser features in ways that were never intended, Meta is tracking you all the way around the web—with no disclosure nor oversight.</p><p>Incognito mode doesn’t stop it; neither does blocking 3rd-party cookies. Russian social giant <a href="https://vmst.io/tags/Yandex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yandex</span></a> is doing it too.</p><p>As soon as researchers disclosed the <a href="https://vmst.io/tags/LocalMess" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LocalMess</span></a> problem, Meta stopped it—for now. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we go live in a cave.</p><p><a href="https://securityboulevard.com/2025/06/meta-local-mess-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/06/</span><span class="invisible">meta-local-mess-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p><a href="https://vmst.io/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> fixes and other updates will be “orchestrated” by Redmond’s own <a href="https://vmst.io/tags/update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>update</span></a> tool.</p><p><a href="https://vmst.io/tags/WindowsUpdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsUpdate</span></a> keeps <a href="https://vmst.io/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> updated (well, duh). It can also update some “other <a href="https://vmst.io/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> products,” if you let it. Soon, it’ll be able to do the same for other companies’ apps.</p><p>But WHY must <a href="https://vmst.io/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> misuse the concept of <a href="https://vmst.io/tags/orchestration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>orchestration</span></a> to describe it? Messy musical metaphors aside, this seems like a good idea. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we wave a baton.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/05/windows-update-open-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/05/</span><span class="invisible">windows-update-open-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a> $MSFT</p>
Richi Jennings<p>Researchers find we’ll need 20 times fewer qubits to break conventional encryption than previously believed.</p><p>A new paper puts a fire under DevOps, IT teams and anyone else using modern RSA—or similar public-key cryptosystems. Factoring big primes now seems much, much easier for <a href="https://vmst.io/tags/QuantumComputers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumComputers</span></a> than we thought even a few years ago.</p><p>Of course, the Devil is in the details. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we never shy away from detail.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/05/quantum-rsa-20x-gidney-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/05/</span><span class="invisible">quantum-rsa-20x-gidney-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Privacy-first messenger blocks <a href="https://vmst.io/tags/MicrosoftRecall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftRecall</span></a></p><p><a href="https://vmst.io/tags/Recall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Recall</span></a>, <a href="https://vmst.io/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a>’s “magical” AI tool that watches everything you do, is back. But the team behind private messaging app <a href="https://vmst.io/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> aren’t happy about it—they’ve added a feature to stop Recall taking screenshots of your chats.</p><p>As you might recall, Recall was initially dubbed a “<a href="https://vmst.io/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> disaster,” before being “delayed indefinitely.” But Microsoft tweaked and relaunched it. And in <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, people aren’t entirely happy about that.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/05/signal-recall-drm-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/05/</span><span class="invisible">signal-recall-drm-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>EU Vulnerability Database (<a href="https://vmst.io/tags/EUVD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EUVD</span></a>) launches this week. And not a moment too soon.</p><p>The EU Agency for Cybersecurity (<a href="https://vmst.io/tags/ENISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ENISA</span></a>) has brought EUVD out of beta. Born from a 2022 EU law, EUVD will work alongside MITRE’s Common Vulnerabilities and Exposures database (<a href="https://vmst.io/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>)—the future of which is still hazy after last month’s last-minute funding reprieve.</p><p>ENISA executive director Juhan Lepassaar (pictured) is keen to get on with the job. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we take this kiss throughout the world.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/05/euvd-launch-cve-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/05/</span><span class="invisible">euvd-launch-cve-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>21 million screenshots in one open bucket.</p><p>Workplace surveillance system <a href="https://vmst.io/tags/WorkComposer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WorkComposer</span></a> is under fire this week, for storing sensitive data with ZERO <a href="https://vmst.io/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a>. The hapless firm saved more than 21 million screenshots from 200,000 users’ work PC screens—and popped them in an open <a href="https://vmst.io/tags/AmazonWebServices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AmazonWebServices</span></a> <a href="https://vmst.io/tags/S3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>S3</span></a> bucket.</p><p>Hackers could have easily stolen company secrets—and personal ones, too. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we can’t quite believe it.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/04/21m-screenshots-open-s3-bucket-workcomposer-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/04/</span><span class="invisible">21m-screenshots-open-s3-bucket-workcomposer-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p><a href="https://vmst.io/tags/PigButchering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PigButchering</span></a> and other serious scams still thriving, despite crackdowns in Dubai and Myanmar</p><p>Organized crime groups use hundreds of thousands of slaves to scam tens of billions of dollars from victims. That’s the stark warning from the <a href="https://vmst.io/tags/UnitedNations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedNations</span></a> this week, pointing to massive fraud factories moving into “vulnerable” parts of Asia.</p><p>The UN researchers say we’ve reached a tipping point in the scale of such serious scams. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we wallow in glorious mud.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/04/un-scam-warning-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/04/</span><span class="invisible">un-scam-warning-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>U.S. government funding for the Common Vulnerabilities and Exposures program expires April 16.</p><p>The security industry is panicking over the potential loss of the <a href="https://vmst.io/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> program. Run by the <a href="https://vmst.io/tags/MITRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MITRE</span></a> non-profit, the CVE database is a critical tool for tracking the status of vulnerabilities.</p><p><a href="https://vmst.io/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> just announced a temporary reprieve, but the dangers are obvious. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we look for the opportunities.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/04/mitre-cve-funding-crisis-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/04/</span><span class="invisible">mitre-cve-funding-crisis-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Larry’s PR angels desperately dance on the head of a pin.</p><p><a href="https://vmst.io/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> is now admitting that, yes, an <a href="https://vmst.io/tags/OracleCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OracleCloud</span></a> service was breached—or so we’re told by deep throat sources. This is, of course, despite last week’s vehement denials.</p><p>Yet it’s still not official. And Oracle seems to be justifying its previous denial with a semantic sleight-of-hand worthy of Bill Clinton. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we see men tic.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/04/oracle-cloud-breach-redux-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/04/</span><span class="invisible">oracle-cloud-breach-redux-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Chinese firm banned by U.S. is shady entity behind a clutch of free VPN apps—with over 1M downloads.</p><p>Apple and Google are under fire for failing to vet the ownership of at least 20 <a href="https://vmst.io/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> apps. Researchers have fingered <a href="https://vmst.io/tags/Qihoo360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Qihoo360</span></a> as the entity behind at least five of them—the company is banned from the U.S. for its links to the Chinese military. The other 15 are also China owned, but keep it a secret.</p><p><a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> is getting the worst of the criticism, thanks to its infamous privacy promise. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we don’t think it’s worth the paper it’s printed on. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/04/app-stores-oked-vpns-run-by-china-pla/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/04/</span><span class="invisible">app-stores-oked-vpns-run-by-china-pla/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Larry Ellison’s PR pukes desperately follow the script.</p><p>A hacker claims to have breached <a href="https://vmst.io/tags/OracleCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OracleCloud</span></a> Infrastructure (OCI), stealing 6,000,000 records. But <a href="https://vmst.io/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> Corp. says that’s not true.</p><p>However, many customers confirmed the data is genuine. Several researchers point to a four-year-old critical vulnerability as the hacker’s entry point. But still Oracle keeps up the pretense.</p><p>“There has been no breach,” the PR flaks cry. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we cry too. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/03/oracle-cloud-breach-deny-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">oracle-cloud-breach-deny-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>‘Ban These Chinese Routers NOW,’ Cries House Committee<br>TP-Link in crosshairs, along with other brands.</p><p><a href="https://vmst.io/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> consumer-grade networking gear is a dangerous <a href="https://vmst.io/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> threat, argue these fine gentlemen. Rep. Raja Krishnamoorthi (D-Illinois), Rob Joyce (former NSA director of cybersecurity) and Rep. John Moolenaar (R-Michigan) have hatched a plan to eradicate TP-Link routers and other plastic pigs from our homes.</p><p><a href="https://vmst.io/tags/TPLINK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLINK</span></a> on the other hand, is spitting feathers, arguing it’s not been a “Chinese” company for years. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we get familiar with <a href="https://vmst.io/tags/OpenWRT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenWRT</span></a>. </p><p><a href="https://securityboulevard.com/2025/03/krishnamoorthi-joyce-moolenaar-tp-link-china-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">krishnamoorthi-joyce-moolenaar-tp-link-china-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p><a href="https://vmst.io/tags/Cariad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cariad</span></a>, VW Group’s software arm, made this classic error.</p><p>Personal data from hundreds of thousands of cars sat unsecured for about six months. <a href="https://vmst.io/tags/Volkswagen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Volkswagen</span></a> was keeping it in an Amazon cloud storage instance, but didn’t secure the keys.</p><p>The big German firm ist sehr verlegen. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we hope for a safer 2025. At @TechstrongGroup⁠’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/12/vw-cariad-ccc-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/12/</span><span class="invisible">vw-cariad-ccc-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Beleaguered security firm issues initial post-mortem on Friday’s faux pas.</p><p>As you’ll recall, millions of PCs and servers bluescreened last week. The cause was a corrupt <a href="https://vmst.io/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrowdStrike</span></a> security update that caused the machines to access illegal memory from within the Windows kernel itself.</p><p>Today, we learned two incredible things: That this type of rapid update isn’t tested by people; and that <a href="https://vmst.io/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrowdStrike</span></a> doesn’t dogfood them, nor do staged, “canary” deployment. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we sit slack jawed in horror. At @TechstrongGroup​’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/07/crowdstrike-pir-canary-bsod-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/07/</span><span class="invisible">crowdstrike-pir-canary-bsod-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities.</p><p>Dusty, moldy, prehistoric protocols from the 1980s and ’90s still underpin our phone networks. Full of security holes, <a href="https://vmst.io/tags/SS7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SS7</span></a> and <a href="https://vmst.io/tags/Diameter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Diameter</span></a> allow scrotes to track our locations—whether mobile or wired (ask your parents). The <a href="https://vmst.io/tags/FCC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FCC</span></a> is asking the industry to do something about it.</p><p>We’ve known about the problems since the mid-1990s. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we ask, “Why now?” At @TechstrongGroup’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/04/fcc-ss7-diameter-richixbw-2/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/04/</span><span class="invisible">fcc-ss7-diameter-richixbw-2/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Stop reusing <a href="https://vmst.io/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a>, already. Here’s what else you should do.</p><p>Almost 71 million sets of unique <a href="https://vmst.io/tags/credentials" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>credentials</span></a> have leaked, via an unnamed firm’s bug bounty program. Nicknamed Naz.API, the leak is making waves. After importing them into @HaveIBeenPwned.com, it turns out that 24 million are fresh.</p><p>The site’s majordomo, @TroyHunt (pictured), sounds astounded. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we ran a scan. At @TechstrongGroup’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/01/naz-api-troy-hunt-haveibeenpwned-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/01/</span><span class="invisible">naz-api-troy-hunt-haveibeenpwned-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>