Trending

#Onlinesecurity

Latest posts tagged with #Onlinesecurity on Bluesky

Latest Top
Trending

Posts tagged #Onlinesecurity

How an email address ousted AlphaBay
negativepid.blog/how...

#AlphaBay #darkMarkets #derpWeb #illegalMarkets #email #takedownOps #Potatosecurity #potatoattacks #potatoThreats #onlineSecurity #negativepid

0 0 0 0
Preview
How an email address ousted AlphaBay - Negative PID In July 2017, one of the most ambitious global cyber operations ever executed quietly brought down the largest illegal marketplace on the dark web: AlphaBay.

How an email address ousted AlphaBay
negativepid.blog/how...

#AlphaBay #darkMarkets #darkWeb #illegalMarkets #email #takedownOps #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Capturing traffic with ARP - Negative PID Whenever you walk into a coffee shop or a public place offering a free Wi-Fi connection, someone can capture your unencrypted web traffic through ARP Spoofing.

Capturing traffic with ARP

negativepid.blog/cap...

#ARP #spoofing #ARPspoofing #hacking #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Cybersecurity in France - Negative PID France is among the European countries with the most mature and well-structured cybersecurity ecosystems. Here is how they do it.

Cybersecurity in France

negativepid.blog/cyb...

#France #law #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Open security and OffSec projects - Negative PID Security research is one of the areas where open source has had the deepest and most complex impact. Tools built openly are used to defend critical

Open security and OffSec projects

negativepid.blog/ope...

#OpenSource #OffSec #OffensiveSecurity #Cybersecurity #onlineSecurity #Internet #tech #IT #science #STEM #computing #AI #innovation #negativepid

1 0 0 0
Preview
Cryptography: from paper to silicon - Negative PID For most of its history, cryptography moved at the speed of ink, paper, and human calculation. Even mechanical devices such as rotor machines relied on

Cryptography: from paper to silicon

negativepid.blog/cry...

#cryptography #tech #IT #science #STEM #computing #AI #quantumComputing #inventions #innovation #Cybersecurity #onlineSecurity #negativepid

1 0 0 0
Post image

Fake beards, drugstore makeup, and the end of the illusion: why AI age verification was born brokenprivalogy.com/p/fake-beards-drugstore-... via @marisonsouza.bsky.social #digitalprivacy #onlinesecurity #protectyourdata

0 0 0 0
Preview
Diffie, Hellman, and PKC - Negative PID Before the 1970s, secure communication depended on shared secret keys. Two parties had to agree on a key in advance, and anyone intercepting the key could

Diffie, Hellman, and PKC

negativepid.blog/dif...

#DiffieHellman #cryptography #PKC #publicKeyCryptography #Internet #tech #IT #science #STEM #computing #AI #quantumComputing #inventions #innovation #Cybersecurity #onlineSecurity #negativepid

1 0 0 0
Post image

Digg's rapid shutdown highlights the escalating battle against AI-driven bots in online communities. A stark reminder of the need for robust defenses. #DiggShutdown #OnlineSecurity #BotProblem Link: thedailytechfeed.com/bot-overload...

0 0 0 0
Preview
Kevin Mitnick, the ghost in the wires - Negative PID Kevin Mitnick is one of the most well-known figures in the history of hacking and cybersecurity. His life story reads like a cyber-thriller.

Kevin Mitnick, the ghost in the wires

negativepid.blog/kev...

#kevinMitnick #hackers #hacking #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Sabu, the man who brought down Anonymous - Negative PID He was nothing more than an unemployed systems administrator from the Lower East Side of NY, raising two young nieces on his own. Online, he was known as Sabu.

Sabu, the man who brought down Anonymous

negativepid.blog/how...

#anonymous #sabu #hackers #hackerCollectives #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 1 0 0
Preview
The Target Data Breach - Negative PID Target is an American retail corporation that operates a chain of discount department stores and hypermarkets. It is the seventh-largest retailer in the United

The Target data breach

negativepid.blog/the...

#Target #dataBreaches #hackers #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #dataSecurity #dataPrivacy #compliance #governance #negativepid

0 0 1 0
Avast Data Shredder - (Explained by the Avast Bears!)
Avast Data Shredder - (Explained by the Avast Bears!) YouTube video by Norbert “Bob” Gostischa

Avast Data Shredder - (Explained by the Avast Bears!)
#bob3160 #Avast #Cybersecurity #TeddyTips #FileSecurity #TechSafety #Privacy #AvastBears #OnlineSecurity #DataProtection
youtube.com/shorts/XVS1y...

0 0 0 0
Preview
The relaunch of BreachForums - Negative PID In the years following the decline of large darknet marketplaces, cybercrime did not disappear. It reorganized. Instead of Tor-only drug markets, a new kind of

The relaunch of the BreachForums

negativepid.blog/the...

#breachForums #darkMarkets #darkWeb #illegalMarketplaces #cybercrime #takedownOps #Cybersecurity #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
MOD, Masters of Deception - Negative PID Masters of Deception (also known as MOD) was one of the most infamous and important hacking groups of the late 1980s and early 1990s.

MOD, Masters of Deception

negativepid.blog/mod...

#MOD #MastersOfDeception #hackers #hackerCollectives #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
The danger zones of the dark web - Negative PID The dark web has been a part of public discourse for several decades. Known for its illicit activities and for hosting hackers and criminals of all kinds, it

The danger zones of the dark web

negativepid.blog/the...

#cybersecurity #onlineSecurity #digitalInvestigations #OSINT #SOCMINT #HUMINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
Understanding UNIX OSs - Negative PID The UNIX operating system (OS) is a powerful, multiuser, multitasking system initially developed in the 1970s at Bell Labs. Known for its modular design and

Understanding UNIX OSs

negativepid.blog/und...

#UNIX #operatingSystems #OS #Linux #MacOS #OSarchitecture #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
A beginner’s guide to Blockchain - Negative PID In recent years, Bitcoin and Blockchain have become a common topic in tech, finance, cybersecurity, and even politics.

A beginner's guide to blockchain

negativepid.blog/a-b...

#blockchain #crypto #bitcoin #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
What is cybercrime? - Negative PID Every day, you hear about cybercrime. More and more, it is presented as a problem to society: hacking, fraud, obscene behaviour, hate speech, fake news,

What is cybercrime?

#cybercrime #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid #fraud #digitalfraud #fakedocuments #socialmediafraud #cyberinvestigation #cyberfraud #negativepid

0 0 0 0
Preview
Diffie, Hellman, and PKC - Negative PID Before the 1970s, secure communication depended on shared secret keys. Two parties had to agree on a key in advance, and anyone intercepting the key could

Diffie, Hellman, and PKC
negativepid.blog/dif...

#DiffieHellman #cryptography #PKC #Cybersecurity #onlineSecurity #Internet #tech #IT #science #STEM #computing #inventions #innovation #negativepid

0 0 0 0
background-code-coder

background-code-coder

3 Steps To Choose A Trustworthy VPN | #Guide #Security #ChooseATrustworthyVPN #VPNPrivacy #OnlineSecurity #Cybersecurity #BlueskySocial

0 0 0 0
Preview
Computer-enabled crimes: virtual scams - Negative PID Everybody knows what a scam is. But very few can recognize one when is directed at them. Why is that? The Internet has made it more difficult to understand

Computer-enabled crimes: virtual scams

negativepid.blog/com...

#criminology #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #cyberpsychology #psychology #onlineBehaviour #humanBehaviour #onlineSafety #behaviouralStudies #socialMedia #identity #negativepid

0 0 0 0
Preview
The Sony PlayStation Network Hack - Negative PID On April 17, 2011, the PlayStation Network (PSN) went down, leaving users without access to the platform for twenty-three days. It affected 77M users.

The Sony PlayStation Network hack

negativepid.blog/the...

#PSN #Sony #Playstation #gaming #network #hackers #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 1 0 0
Preview
A secure Email setup guide - Negative PID Email (electronic mail) has been with us since the early 1970s. Yet, many businesses still don’t have a good grasp on configuration.

A secure Email setup guide

negativepid.blog/a-s...

#email #emailSetup #emailGuide #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
How an email address ousted AlphaBay - Negative PID In July 2017, one of the most ambitious global cyber operations ever executed quietly brought down the largest illegal marketplace on the dark web: AlphaBay.

How an email address ousted AlphaBay
negativepid.blog/how...

#AlphaBay #darkMarkets #darkWeb #illegalMarkets #email #takedownOps #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
How Stuxnet changed cyberwarfare - Negative PID Stuxnet demonstrated that malware can cause physical damage to critical infrastructure, not just steal data or crash systems. Here is what it is.

How Stuxnet changed cyberwarfare

negativepid.blog/how...

#Stuxnet #cyberwarfare #hackers #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0

Potato warfare groups: Sandworm
negativepid.blog/cyb...

#potatoWarfare #Sandworm #criticalInfrastructure #Potatosecurity #potatoattacks #potatoThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Cyber warfare groups: Sandworm - Negative PID They moved from espionage to physical disruption. Their operations have affected national power grids, critical infrastructure, and global supply chains. They

Cyber warfare groups: Sandworm
negativepid.blog/cyb...

#cyberWarfare #Sandworm #criticalInfrastructure #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Computer-enabled crimes: virtual theft - Negative PID Can you steal something that is not real? Do virtual objects have a value? Virtual theft is very much a profitable activity for cybercriminals.

Computer-enabled crimes: virtual theft

negativepid.blog/com...

#criminology #virtualTheft #cyberpsychology #onlineBehaviour #humanBehaviour #onlineSafety #behaviouralStudies #onlineForums #identity #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Women breaking the kernel - Negative PID As hacking matured, curiosity gave way to rigour. The underground began to intersect with academia, security research labs, and vendor security teams. Exploits

Women breaking the kernel

negativepid.blog/wom...

#hacking #womenInTech #womenInSTEM #women #hackers #reverseEngineering #engineering #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #tech #IT #science #STEM #computing #innovation #negativepid

2 0 0 0