toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

310
active users

#datasec

0 posts0 participants0 posts today
Pia<p>"A systematic review published last month asks the question, how good at people are judging the accuracy of the news?" <a href="https://www.psychologytoday.com/us/blog/evidence-based-living/202503/how-well-can-people-spot-fake-news" rel="nofollow noopener noreferrer" target="_blank">www.psychologytoday.com/us/blog/evid...</a> <a class="hashtag" href="https://bsky.app/search?q=%23fakenews" rel="nofollow noopener noreferrer" target="_blank">#fakenews</a> <a class="hashtag" href="https://bsky.app/search?q=%23media" rel="nofollow noopener noreferrer" target="_blank">#media</a> accuracy <a class="hashtag" href="https://bsky.app/search?q=%23infosec" rel="nofollow noopener noreferrer" target="_blank">#infosec</a> <a class="hashtag" href="https://bsky.app/search?q=%23datasec" rel="nofollow noopener noreferrer" target="_blank">#datasec</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersec" rel="nofollow noopener noreferrer" target="_blank">#cybersec</a><br><br><a href="https://www.psychologytoday.com/us/blog/evidence-based-living/202503/how-well-can-people-spot-fake-news" rel="nofollow noopener noreferrer" target="_blank">How Well Can People Spot Fake ...</a></p>
Niall in Raglan :laserkiwi:<p>Not sure I like the openness of ParkRun's data. Without a login you can get a lot of info about a particular runner. Thieves can figure out when you're likely to be out and grab your stuff. Insurers &amp; bureaucrats can see how fit you really are. Your age is given away to the nearest 5 years. Seems a bit like accidental self doxxing.<br>Do any <a href="https://mastodon.nz/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> people have an opinion?<br>Click on a name to see what I mean:<br><a href="https://www.parkrun.co.nz/universityofwaikato/results/latestresults/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">parkrun.co.nz/universityofwaik</span><span class="invisible">ato/results/latestresults/</span></a><br><a href="https://mastodon.nz/tags/ParkRun" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ParkRun</span></a> <a href="https://mastodon.nz/tags/running" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>running</span></a> <a href="https://mastodon.nz/tags/datasec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datasec</span></a> <a href="https://mastodon.nz/tags/doxxed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>doxxed</span></a></p>
*_jayropeWhat's your preferred method to send sensible documents via unencrypted email, but otherwise protected/encrypted? This is macos-specific, no Microsoft products in use here, not using Apple Mail, have PGP, but receiver doesn't.<br><br>Protecting a document or .zip from it with a good password doesn't seem enough.<br>And sending such docs via Wetransfer or such also seems weird.<br><br>Thanks for any help in advance.<br>#<a class="" href="https://hub.kliklak.net/search?tag=datasec" rel="nofollow noopener noreferrer" target="_blank">datasec</a> #<a class="" href="https://hub.kliklak.net/search?tag=privacy" rel="nofollow noopener noreferrer" target="_blank">privacy</a> • sent from #<a class="" href="https://hub.kliklak.net/search?tag=Hubzilla" rel="nofollow noopener noreferrer" target="_blank">Hubzilla</a> at #<a class="" href="https://hub.kliklak.net/search?tag=Fediverse" rel="nofollow noopener noreferrer" target="_blank">Fediverse</a>. • sent from #Hubzilla at #Fediverse.
Elias Griffin<p>Telephone Confirmation, Outage Severity, Hospital</p><p>I talked to Amy the IT Manager at Kingman Regional Medical Center in Kingman, AZ on the phone just now.</p><p>Dragon Medical Dictation Software used by all Doctors and Nurses is inoperable, having to resort to a impromptu written system.</p><p>Patient backlog is filling up at an undetermined rate, all services affected including Emergency and Surgery. </p><p>Nuance Dragon Medical Dictation Software is a Subscription Service whose parent company is Microsoft.</p><p>Impact: MEDIUM<br>Mitigations: NONE</p><p>Addendum:<br>I've also called all the Fire Stations in the County, and Mohave County Fire Disctrict Command, can't reach anyone.</p><p>Impact: UNKNOWN</p><p><a href="https://infosec.space/tags/crowdstrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crowdstrike</span></a> <a href="https://infosec.space/tags/outage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>outage</span></a> <a href="https://infosec.space/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> <a href="https://infosec.space/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.space/tags/datasec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datasec</span></a> <a href="https://infosec.space/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://infosec.space/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.space/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://infosec.space/tags/globalIToutage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>globalIToutage</span></a> <a href="https://infosec.space/tags/dragon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dragon</span></a> <a href="https://infosec.space/tags/hospitals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hospitals</span></a></p>
Elias Griffin<p>AI Loophole #1; Your GitHub README.md</p><p>It is the analysis of <a href="https://www.quadhelion.engineering" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">quadhelion.engineering</span><span class="invisible"></span></a> that all the big AI, especially <a href="https://infosec.space/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a>, that your GitHub README is not licensable material and is a public document able to be trained on no matter what the software license, copyright, statements, or any technical measures used to dissuade/defeat it.</p><p>Know this and write them appropriately.</p><p>Yes, I'm serious and I hope you know what this means.</p><p><a href="https://infosec.space/tags/AITraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AITraining</span></a> <a href="https://infosec.space/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.space/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.space/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.space/tags/datasec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datasec</span></a> <a href="https://infosec.space/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.space/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberdefense</span></a> <a href="https://infosec.space/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhiteHat</span></a> <a href="https://infosec.space/tags/GreyHat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreyHat</span></a></p>
Lisa Hamilton<p>Eww. Costco is using its 74 million customers' data to build an advertising network</p><p>Just like Walmart and Target <a href="https://vmst.io/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://vmst.io/tags/CustomerData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CustomerData</span></a> <a href="https://vmst.io/tags/DataSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSec</span></a> <a href="https://vmst.io/tags/advertising" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advertising</span></a> <a href="https://vmst.io/tags/greed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>greed</span></a> <a href="https://vmst.io/tags/WhoControlsMyData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhoControlsMyData</span></a></p><p><a href="https://www.marketingbrew.com/stories/2024/06/06/costco-is-building-out-an-ad-business-using-shopper-data" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">marketingbrew.com/stories/2024</span><span class="invisible">/06/06/costco-is-building-out-an-ad-business-using-shopper-data</span></a></p>
Lisa Hamilton<p>Has anyone heard of IDX.us? It's supposed to be an "identity protection service" like Lifelock. I am suspicious that it's not .com</p><p>I just got a letter from a law firm, Berry Dunn McNeil and Parker about a significant Sep 2023 health data breach involving my <a href="https://vmst.io/tags/data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data</span></a> <a href="https://vmst.io/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://vmst.io/tags/ProtectedData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProtectedData</span></a> <a href="https://vmst.io/tags/breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>breach</span></a> <a href="https://vmst.io/tags/IDtheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IDtheft</span></a> <a href="https://vmst.io/tags/DataSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSec</span></a></p><p>The data belonged to Reliable Networks of Maine. I haven't been in Maine since 1979 but maybe they handle national data.</p><p>I don't want to give IDX any data if this whole thing is a <a href="https://vmst.io/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> or elaborate <a href="https://vmst.io/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> ruse <a href="https://vmst.io/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Elias Griffin<p><a href="https://infosec.space/tags/BREAKING" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BREAKING</span></a> News <a href="https://infosec.space/tags/MITRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MITRE</span></a> <a href="https://infosec.space/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> National Security Breach.</p><p>Quadhelion Engineering 2024 New Year's Eve <a href="https://infosec.space/tags/2024Cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2024Cyberattack</span></a> <a href="https://infosec.space/tags/Warning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Warning</span></a> was correct!</p><p><a href="https://infosec.space/tags/MITRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MITRE</span></a> Was under attack from New Year's Eve till roughly two weeks ago and the attackers gained access to the highly sensitive NERVE Network.</p><p><a href="https://www.cysecurity.news/2024/05/chinese-attackers-deployed-backdoor.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cysecurity.news/2024/05/chines</span><span class="invisible">e-attackers-deployed-backdoor.html</span></a></p><p>Were the Chinese trying to take down the Internet completely?</p><p><a href="https://infosec.space/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.space/tags/datasec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datasec</span></a> <a href="https://infosec.space/tags/osint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osint</span></a> <a href="https://infosec.space/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.space/tags/netsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netsec</span></a></p>
Autobrian 🤖<p>It was only a matter of time. <a href="https://universeodon.com/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://universeodon.com/tags/datasec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datasec</span></a> <a href="https://techcrunch.com/2023/12/04/23andme-confirms-hackers-stole-ancestry-data-on-6-9-million-users/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2023/12/04/23an</span><span class="invisible">dme-confirms-hackers-stole-ancestry-data-on-6-9-million-users/</span></a></p>