BlogHide Resteemsth3l0b3 (25)in technology • 7 years agoFacebook is Working With ISPs to Kill California Privacy Rulesvia DSLReports @ "Last year we noted how Google and Facebook had joined Comcast, AT&T and Verizon in lying to California lawmakers in order to kill new broadband privacy protections in the…th3l0b3 (25)in news • 7 years agoIndia takes down local website of Cambridge Analyticavia BBC | "India has taken down the local website of Cambridge Analytica following allegations the company used personal data of 50 million Facebook members to influence the US presidential…th3l0b3 (25)in bitcoin • 7 years agoUS National Security Agency Develops System to Identify Bitcoin Users, Says Leaked DocsThe US National Security Agency (NSA) is reportedly able to locate senders and receivers of Bitcoin around the world, as classified documents provided by Edward Snowden reveal, The Intercept reports…th3l0b3 (25)in technology • 7 years agoOrbitz Data LeakArticle found here: Orbitz Data Leak By Security Experts March 21, 2018 It has been reported that US travel agent Orbitz may have been hacked, potentially exposing the personal information of…th3l0b3 (25)in technology • 7 years agoMounting Shadow Copy Version as a Drive LetterToday i was having some issues with a employee that did not verify when they were moving files from one drive letter to another. The filenames were too long to restore to any location. Desktop…th3l0b3 (25)in technology • 7 years agothis is some next-level cable managementth3l0b3 (25)in technology • 7 years agoKeybase Bug Might Have Backed up Your Private Encryption Key on Google's ServersKeybase is notifying Android users of a bug in its mobile app that might have unintentionally included the users' private key —used to encrypt conversations and other private data— into the…th3l0b3 (25)in netsec • 7 years agoCr3dOv3r 0.2 - Know The Dangers Of Credential Reuse AttacksYour best friend in credential reuse attacks. Cr3dOv3r simply you give it an email then it does two simple jobs (but useful) : Search for public leaks for the email and if it any, it returns…th3l0b3 (25)in netsec • 7 years agoWP Security Scanner$ git clone wpseku $ cd wpseku $ pip install -r requirements.txt $ python wpseku.py Usage python wpseku.py –target –ragent Original idea and script from WPScan Team ( WPScan…