Verified Twitter accounts compromised, get busy spamming

Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do. Unfortunately, things can still go wrong…

Categories:

Tags:

(Read more…)

Read more

Scam as a service 2: the B team

Interest in Tor based threats is increasing to the extent that some vendors will scoop up all activity they find on Tor and provide you a nice front end to search through it at your leisure. This might lead the casual observer to assume that the darkness is a one stop shop for cyber threats, but criminals existed on the internet prior to Tor, and still do quite well for themselves without it. In fact, bad guys with good OPSEC tend to be the exception, rather than the rule. So let’s take a quick look at some unpleasant stuff and the nadir of bad OPSEC, Facebook.

Categories:

Tags:

(Read more…)

Read more

Selfie safety: keeping your security picture perfect

Selfies! Everybody likes the odd selfie, but are you keeping good security practices in mind when setting up the shot? There are dangers both online and off. We take a look at the latest possible security issue stemming from a quick snap, along with some of the things you should (and shouldn’t) be doing when lining up your latest photo.

Categories:

Tags:

(Read more…)

Read more