My guess was that he socially engineered his way into some Telstra customer e-mail accounts and used the Instagram password recovery feature
115 posts • joined 28 Jul 2010
Web body mulls halving HTTPS cert lifetimes. That screaming in the distance is HTTPS cert sellers fearing orgs will bail for Let's Encrypt
What's the last piece of software you'd expect to spy on you? Maybe your enterprise security suite? Bad news
Yes, you're right. But one rule you will almost always find is
Any user device to destinationTCP ports 80,443 on any destination IP address.
Often this can, and does, go through a proxy, but that's not always the case. And even if it is, the proxy is normally looking for malicious stuff coming back, rather than strange traffic going out.
Our policy makes it clear that anything we do on IT equipment and services provided by the company is not private. We are allowed reasonable personal use, but it's monitored and certain events (such as file uploads to non-company web server - we trust but verify) generate an alert that is then investigated.
I don't mind because I get the alerts and do the investigating, but I've had to remind a few people that there is monitoring and, while their personal use is perfectly acceptable and I'm not going to gossip about their personal lives, they might not be comfortable with me knowing everthing I've seen.
Police officers are immune from redundancy (and also not allowed to unionise). So any recently former police officers either chose to go somewhere better or were thrown out for being caught at something they shouldn't have done. It might be difficult to get the first group back and can you imagine the Guardian's reaction to re-employing the second?
I am confused
> because a DC in a VM is easier to move over to another host
But don't the hosts have to be members of the domain in order to move a VM between them? Or would you just copy the virtual disk file(s) and create a new VM to use them?
My Hyper-V hosts are members of the domain, but they will start up OK, allow you to login (with cached credentials) and start virtual machines without a DC being available
Re: Individual people can be smart.
> tell 'em that opening and/or responding to such emails is a firing offense.
The trouble with that approach is that at some point someone will make a mistake. When they do, would you like them to report it so that you can respond as quickly as possible, or would you like them to keep quiet and try to conceal it?
Of course you then have to decide whether that will work in your company's culture and with the people you have working there. And that will be affected by whether they see themselves as part of the business or as someone who turns up to complete a task and then go home.
Ah, but Word does do that - and has done for a while.
When you go to open a file, in teh Recent files section there is a button called 'Recover unsaved documents' which takes you to %localappdata%\Microsoft\Office\UnsavedFiles which is where Word autosaves a file until you give it a proper name (they're ASD files, not docx).
It doesn't throw the unsaved file back in your face like Notepad++ does, and I' not sure how long it will keep the files there, but it does at least give you a short opportunity to change your mind about not saving.
It's 2019 and SQL Server can be pwned by an SQL query, DHCP failover server failed by a packet, Edge, IE by webpages...
Chromium based Edge is on preview at the moment. Presumably the EdgeHTML version will still need patches until the last version of Windows (1903/1809 ??) that uses it goes out fo support.
Although it's also conceievable that Chromium will push EdgeHTML out of those versions too - there's a preview of it for Win7 now.
The seven deadly sins of the 2010s: No, not pride, sloth, etc. The seven UI 'dark patterns' that trick you into buying stuff
I had a similar one telling me I should ask my current registrar to register the .uk because otherwise someone else might take it at the start of July. My mail server thought it was a scam and quarantined it
> The automatic assumption that everything unsolicited is a scam unless readily proved otherwise is going to be quite interesting in the medium term...
It's starting to become interesting at work. The accounts address receives invoices (PDF attachments) from companies the accounts administrator has never heard of that later turn out to be the registered name of a company we were expecting an invoice from, but the PO was made out for its trading name. It makes some interesting conversations with the supplier's credit control people.
An alternative scenario is that the purchaser is slow about passing the PO to accounts, so the invoice arrives first - and gets deleted as spam.
We knew it was coming: Bureaucratic cockup triggers '6-month' delay of age verification block on porno in the UK
Please be aliens, please be aliens, please be aliens... Boffins discover mystery mass beneath Moon's biggest crater
DXC Technology seeks volunteers to take redundancy. No grads, apprentices, and 'quota carrying' sales folk
1.5 weeks per year over the age of 41. Only the most recent 20 years' service counts (so if you're 63 with >20 years' service you get 30 weeks' pay). Pay for one week is capped at £525 (I think it's a bit higher in NI). so maximum statutory payment is £15,750 (which is tax free).
Presumably the additional month they are offering is not capped.
I forget the exact details of ROI calculation, but the cap is higher and the number of weeks pay is greater
British Army cyber 'n' psyops unit 77 Brigade can't even brainwash civvies into helping it meet recruitment targets
Recruiting part timers...
... might be affected by this:
'Thank you for your interest in 77th Brigade. Unfortunately the Brigade is not in a position to assess new civilian candidates until September 2019 – however we are accepting CVs from interested candidates which we will process in due course. This is due to a number of factors including a reorganisation within the Brigade, an assessment of the skill sets required and the processing of existing candidates.'
More than one way to go about this, but the essentials are:
A PXE boot server that your DHCP server can point to
The bootable environment on the PXE server
The image file that you want to install (if this is Windows then you MUST run sysprep on the machine you take the image from)
Any post-image scripts to customise individual machines or to complete the Windows Out Of Box Experience.
If you have Windows Server then MS provides the whole thing in Windows Deployment Services (WDS)
And whatever you use to deploy a Windows image, that image will need appropriate licences and istallation media for reimaging (OEM licences and media don't work properly, you need a volume licence key)
Buying a second-hand hard drive on eBay? You've got a 'one in two' chance of finding personal info still on it
Someone who works in a defence establishment (where they make self-contained combined power supplies and propulsion units) told me that the normal procedure at the end of a project is to remove all the computer drives and bathe them in hydroflouric acid.
My normal procedure for disposing of drives is much easier - it just requires a power drill
> A really big workstation machine or an A3 colour laser printer might exceed the 3A limit but that's rare
We have discovered through experimentation that all of our laser printers draw more than 3A on start up. Also, the cleaners have established that vacuum cleaners draw more than 3A.
Although it usually then takes several months for someone else to report their "laptop won't charge from any socket on that strip (that one on the end worked until last week, but now now none of them do)"
This is not, repeat, not an April Fools' Day joke: 5 UK broadband vendors agree to pay YOU daily rate for fscked internet
If you look at how most modern 'democracies' work, you'll see that they are actually designed to make sure that the 'right people'* make the decisions.
* the way the right people are selected differs between systems and over time within a system - the UK used to decide according to who your parents were, then it was how much money you had and now it's either money, who you went to school with or which trade union you joined
I see what you mean, but if you've got maliciaous insiders who can set this up on their own VPS then you've already got malicious insiders who can set up a VPS that accepts file uploads over https. ANd if that's a significant threat for you then you should already be locking down the end points and whitelisting permitted upload sites
I am confused
> It is however a DLP nightmare....
I suppose it depends a bit on how your users need to use information to do their jobs, but I don't see how this is any worse (for DLP) than the other file sharing services already available. You still have to control where people can upload stuff to and it doesn't really matter (when you look at the insider threat risk) whether the file is locally encrypted before it's uploaded if users have mobile devices that can connect from outside your perimeter. And if you can monitor and block access to sites such as files.fm then you can do the same with this.
Re: What's worse than the biased algorithm
I tried that search in DuckDuckGo and I discovered that most doctors wear a lab coat, have a stethoscope hung round their neck and stand with their arms folded.
The main exceptions seem to be Matt Smith, David Tenant, Peter Davidson, Peter Capaldi, ...
Edited to add: obviously this is gender bias because you have to scroll down quite a lot to find Jodie Whittaker
Our domain name incliudes 'lli' in the middle. Scammer registered a domain with 'lll' in it.
The most convincing one I've seen so far was an email that looked like a normal Exchange online synchronisation failure report that when youclicked through took you to a copy of the Office365 login process
Burden of proof
The government said the law still provides for the existing "reasonable excuse defence", which includes circumstances where a person "did not know, and had no reason to believe" the material acccessed contained terrorist propaganda.
"Once a defendant has raised this defence, the burden of proof (to the criminal standard) to disprove this defence will rest with the prosecution," the Home Office's impact assessment said.
I'm not sure how the Home Office arrived at that conclusion. The fact that you possess a chemistry textbook or have watched a video of a chemistry lesson that discusses nitration of toluene makes you guilty under 58(1). Then 58(3) says:
It is a defence for a person charged with an offence under this section to prove that he had a reasonable excuse for his action or possession.
Which looks like it places the burden of proof on the accused to show that the excuse is reasonable.
PS. I am not a lawyer
It's now 2019, and your Windows DHCP server can be pwned by a packet, IE and Edge by a webpage, and so on
When my older daughter started looking at university a few years ago I was astounded that she *wanted* me to go with her to open days. When we got there I was equally surprised to find that nearly everybody else had at least one parent with them.
On the other hand, a few years later, when my (autistic) son started looking I was quite glad that having a parent with him didn't make him stand out so much at open days.
(PS. If anyone is looking for a University that is sensitive to students with additional needs, UCLan seemed very good, although he ended up going somewhere else)