Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
579 videos
510 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Treble GSI's | Privacy + Secure
https://www.fsf.org/appeal

https://www.defectivebydesign.org/
https://emailselfdefense.org/
https://endsoftwarepatents.org/
https://www.fsf.org/campaigns/fight-to-repair


*not advertising (any links), therefore the "Mono"
formatting
Forwarded from Treble GSI's | Privacy + Secure
■■■■■ 📹 Hackers can wirelessly watch your display by HDMI radiation.

Known side-channel attack called TEMPEST (Transient Electromagnetic Pulse Emanation Standard). It involves capturing electromagnetic signals emitted by electronic devices, including HDMI cables, and reconstructing the displayed content.

Key points:

Poorly shielded HDMI cables can emit detectable radiation.

With specialized equipment, attackers can intercept these emissions wirelessly.

Shielded cables and secured environments significantly reduce this risk.
 https://www.pcworld.com/article/2413156/hackers-can-wirelessly-watch-your-screen-via-hdmi-radiation.html
Forwarded from Treble GSI's | Privacy + Secure
Funded by Microsoft, Google, and Amazon, and with a mission to protect society…

https://freebsdfoundation.org/news-and-events/latest-news/freebsd-foundation-releases-bhyve-and-capsicum-security-audit-funded-by-alpha-omega-project/

“Establish an advisory committee
Ongoing support
The FreeBSD Foundation could help the FreeBSD Project with ongoing security-oriented support, operating as an advisory committee. With its ability to allocate resources outside of the typical product development processes of profit-oriented companies or beyond the inherent limitations of many contributions at the hobbyist level, this committee could build on the outcome presented by this report and push the initiative further. With the general FreeBSD community informed and aware of the importance of the security of the FreeBSD Operating System, the FreeBSD Foundation should be able to keep attracting the means necessary to sustain this effort from its own pool of donors and sponsors.
Guidance and resources
Regardless of its provenance, the advisory committee should provide the FreeBSD Project with an experienced group of developers with a security background. Their role could range from monitoring the state-of-the-art and corresponding security level of the FreeBSD Operating System and project infrastructure to disseminating the knowledge acquired to the FreeBSD developers and general community, including assistance in the auditing or development tasks relevant to the project.”

https://freebsdfoundation.org/wp-content/uploads/2024/11/2024_Code_Audit_Capsicum_Bhyve_FreeBSD_Foundation.pdf#page32
Forwarded from The Hacker News
🔒 Decade-old vulnerabilities in Ubuntu Server’s needrestart package allow local attackers to gain root privileges with no user interaction.

If you’re using Ubuntu Server, these vulnerabilities could give attackers complete control over your system.

Learn more about how these flaws work: https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html
Forwarded from The Hacker News
The ANY.RUN sandbox now lets you automatically detonate the latest multi-stage malware and phishing attacks.

Stages may include email attachments, URLs in QRs, rewritten links, redirects, etc.

See how it works and try it yourself ⬇️ https://thn.news/automated-interactivity-stage-tel
Forwarded from The Hacker News
By 2025, Non-human identities (NHIs) will be the prime vector for cyberattacks.

As automation, AI, and IoT grow, so does the attack surface. Attackers exploit NHIs to breach systems before traditional defenses can react.

Discover how NHIDR can proactively detect and stop attacks in their tracks.

Read the full article: https://thehackernews.com/2024/11/nhis-are-future-of-cybersecurity-meet.html
Forwarded from The Hacker News
🚨 WATCH OUT! Cybercriminals have unlocked a terrifying new cash-out method, using NFC technology and exploiting Google Pay and Apple Pay to steal funds from your 💳 digital wallet – no phone required.

A new technique called Ghost Tap relays NFC traffic between devices, allowing criminals to cash out in different countries, undetected.

Learn how this attack works: https://thehackernews.com/2024/11/ghost-tap-hackers-exploiting-nfcgate-to.html