Zoom Appears To Use Actual Malware Techniques Upon Installation

Zoom Appears To Use Actual Malware Techniques Upon Installation https://twitter.com/c1truz_/status/1244737672930824193 Zoom’s package installer installs things prior to the user clicking confirm, that is, during install check. It also appears to spoof a credential check to elevate priviliges to do so. It also doesn’t write anything to /var/db/receipts so you don’t know what it installed or where. And more about nefarious package installation: https://macpkghallofshame.tumblr.com/post/138612887932/indistinguishable-from-malware Zoom has previous form: Zoom installed a persisent web server on your machine which stayed even after you uninstalled. Apple were so concerned they silently removed it…

Read More

🚨Cyber#Security Cheat Sheet Alert 🚨 This glossary covers of all the technical jargon that industry insiders love (and hate) to use. Credits: NCSC

🚨CyberSecurity Cheat Sheet Alert 🚨 This glossary covers of all the technical jargon that industry insiders love (and hate) to use. Credits: NCSC submitted by /u/ATTACKERSA to r/cybersecurity [link] [comments] top scoring links : multi

Read More

Aral Balkan: “Anonymised data” is a multi-billion dollar industry for a reason. And the reason is because there’s nothing anonymous about it.

Aral Balkan: “Anonymised data” is a multi-billion dollar industry for a reason. And the reason is because there’s nothing anonymous about it. Are there exceptions? Some companies have great privacy policies, but use 3rd party processors without great privacy policies. These relationships are sometimes justified by reportedly only sharing “fuzzed” or “anonymized” data. For example, see this diagram fine print for the Startpage search engine. It’s important to be fair to companies, while also being honest with privacy-focused users. Are there exceptions to “there’s nothing anonymous about it?” Should we…

Read More