The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
Barracuda warns of zero-day, issues patches for products
For those who are not aware, Barracuda has advertised on Twit and offers Email gateway products. In a recent article, they warn of a zero day which affects several versions of their products.
Please feel free to check out the article Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances if you have their products and need to know.
Comments (0)
TIKTOK and an AI chatbot?
Hello folks,
Maybe it isn’t so bad to be behind, as you get to possibly see articles as rediculous as this.
While the reporting is good, TikTok is already in a heap of trouble and now they want to give users the opportunity to test a chat bot to ask it questions on a video?
I could see people asking it questions that I don’t even know if I would want to know the answer to. This could include all of the supposed challenges that have made Kim Komando’s site and our discussions.
The article is titled TikTok is testing an in-app AI chatbot called ‘Tako’ and it comes from Tech Crunch.
This is just going to get interesting. I am not saying not to innovate, I’d be more worried about what’s going to happen to me if I violated serious laws. So far, nothing serious has happened to them because they continue to be in business with no consequences.
Happy reading.
Comments (0)
A New Operation out there taking Lock Bit
Symantech has an article out talking about a new group that took Lock Bit and turned it in to their own.
The article Buhti: New Ransomware Operation Relies on Repurposed Payloads should be read to get the entire details.
There are SHA 256 things you can skip and is at the end of the article.
Thanks for reading!
Comments (0)
Game pulled, racist in all kinds of ways, people who downloaded can keep it
I know that slavery is long gone, but this world may show some forms of it in certain ways in day to day activities.
The article targets Brazil, which has more of a problem and that is what the article says.
Its titled ‘A crime of hatred’: disgust over Brazilian mobile phone slavery game and its worth the read.
I’m going to be careful on what I say, so I’ll let people read the article. I understand this is still an ongoing problem and I’m well aware of it.
There was an incident I observed on a Metro bus and it continued in to the elevator. wWhile I won’t go in to details, I was also targeted by this person who was disabled in their own way. They claimed in so many words that since I’m blind, I don’t know what’s happening in the world. I do, and I agree with the article linked that games that portray something that has been an issue in this country and other countries for that matter should not be allowed to be played.
To read more including the game title, please read the article.
The comment boards will await you.
Comments (0)
This week on the security box
Hello folks,
This week, on the last day of May, we’re going to uncover a very interesting proxy service called Faceless.
The article title is Giving a Face to the Malware Proxy Service ‘Faceless’ and it comes from Brian Krebs.
The program will air first on the independent channel of 986themix.com’s suite of servers and then across the network. It airs on the independent channel Wednesdays at 11 am PT, 1 pm CT.
Other networks and times can be found on the TSB page of email host security.
This is going to be very interesting. See you on Wednesday!
Comments (0)
Who is Super VPN and why are they supposedly leaking over 360 million customer data?
I have never heard of this company before I came across this article from Hack Read which was linked to by one of my followers.
I almost went current last night and stayed there, but sometimes, being behind is a good thing in this case.
This type of thing needs to be talked about and I think we should talk about it.
The article comes from a site called Hack Read. It is titled Free VPN Service SuperVPN Exposes 360 Million User Records.
This article talks about there either being one agency running multiple apps, or multiple agencies running multiple apps, none of which is confirmed to be the case.
Now class, what type of VPN should you be using? According to the article, one that does not log your activity would be best. Two of them are Express VPN and Nord VPN.
I know, I know, you’re going to tell the teacher that both of these applications cost money and you’re absolutely right.
If you read the article, you’re going to learn why it isn’t necessarily a good idea to use a free option, the fact that at least with Super that they claim they don’t log but the research says otherwise, and a multitude of applicatins being in the app store causing some confusion to boot.
If you read nothing else today, please feel free to read this. I know there are new users out there, and if you don’t know what’s going on, you can’t protect yourself from getting hurt.
Again, the article is titled Free VPN Service SuperVPN Exposes 360 Million User Records and I hope you give it a read.
Have a great day class, and we’ll be back with you again very soon.
Comments (0)
A telephone company getting in trouble by 48 states
Hello folks,
Here’s one for you, maybe it could be a potential moron of the podcast? This comes from Slashdot, a very interesting web site I used to look at for tech news.
The article coming from them is titled 48 States Sue Phone Company That Allegedly Catered To Needs of Robocallers and it is going to get interesting.
My question is, “Does this mean that this alleged telephone company been routing these types of calls around the country to people like you and I?” Is that how I’m understanding this article?
Maybe we will finally get a break, at least as this company goes, if I understand this correctly.
I guess we’ll see what this means if we learn more. Good job, guys! Was that worth it?
10:03 5/29/2023 fixed broken link.
Comments (0)
Capita has issue with Amazon bucket, says files don’t have personal data
Capita is not out of the woods yet. Capita’s “standard industry practice” 633gb open cloud storage was originally written on May 5th and was last updated on the 23rd.
Capita still refused to comment on this or any of their other articles where their supposed breach and other issues were discussed.
We covered Capita Here and they denied stuff there too. Is this company trustworthy?
Comments (0)
Rogue employee goes rogue, tries to get company to pay ransom
A U.K. man goes rogue as he was part of the investigation team. 6 years later, he pleads guilty and will await his sentencing. Blackmail holds a 14 year sentence, while the first charge Unauthorized Access to computers holds a 2-year sentence.
The perp also accessed another board member’s private email.
Comments (0)
Genesis market having trouble? They’ll definitely be back, others mentioned too
Hello everyone,
Brian Krebs has covered the Underground for quite awhile now, so when I saw this boost, and yes, I’m still behind, I thought it should be blogged.
The boost goes to an article titled Suspicion stalks Genesis Market’s competitors following FBI takedown and I thought it was a good read.
I remember reading about these places, but I don’t remember if it was all krebsonsecurity or not.
Regardless, I want to share the very interesting news with each and every one of you guys. This is definitely going to be interesting, and we’ll see if these types of market places survive.
What do you think might happen?
Sound off in the comments below.
Comments (0)
Twitter now located in a shithole?
I know, I know, I’m still several days behind, but this one has to be the best one yet for this blog.
Elon Musk now says that San Francisco is a “shithole.” He has ordered employees to violate building codes, lease codes and if necessary, the law.
Apparently Elon Doesn’t Think He Needs To Pay Rent Because SF Is A ‘Shithole’; So Why Should We Pay For Twitter? comes to us from Tech Dirt. Its an interesting article and worth the read.
I’m not paying for Twitter, yet Elon is paying for a bunch of people’s Twitter. So, how is space X and Tesla doing with this attitude?
This augh to get interesting.
Comments (0)
Leaked document says that Spain wants to weaken Encryption?
Inmy book Tracers in the dark I’m on the final part. It talks about CSAM as it comes to the underground market when the book was Written.
I bring this up because there’s a wired article that talks about this same topic and how Spain is wanting to pass something to “minimize encryption” or weaken what is now known as “End to End Encryption.”
This wired article is titled Leaked Government Document Shows Spain Wants to Ban End-to-End Encryption.
This reminds me of Sopa and Pipa. A link to Wikipedia is for stop online piracy act, which was not exactly what I was looking for. But Pipa (not sure if I’m having the right acronym) was one that reminds me of those people wanting us to do the same here in the states.
I’ll have to look up more once I get this out. But it seems like they’re using CSAM as a need to “weaken the encryption” so police and other people can read what’s going on and get at that material and the people spreading it.
I sent this to Steve Gibson over at the Gibson Research Corporation
for his analysis at least. He’ll see it anyhow.
If you can, read this article if you’re in the EU. Make it a great day.
Comments (0)
Throwback Saturday Night: Swatting is becoming a huge problem
With the advant of technology, swatting has become a big problem. Take the Kansas case of 2019 where a Los Angeles man pranked a Kansas home and sent the swat team down there to kill someone. We’ll talk about an article tomorrow that recently passed our desk as well as the landscape.
Here are the notations for tomorow.
Welcome to the podcast. Man charged in 20-plus calls of false threats in US, Canada — including Pa. is the article you’ll want in today’s security hour. Here is the tech blog article on the same story.
Swatting is a big deal and now, technology is a part of the problem. What exactly should we do about this?
Our Listen page on the mix has links for server 2, where the security hour plays as part of Throwback. Program with music starts at 7, and the security hour is at 8.
All times station time which is central.
See you there!
Comments (0)
TSB, podcast 145: Bablock Ransomware
This program may contain some adult language, but it is infrequent. We have the disclaimer in place and we’ll make sure it is there if it is more than one occurrence.
With that said, we put the show on RSS, but it is not up on the blog yet. We’re going to fix that.
Download the 176.6mb file for your enjoyment and thanks for participating and listening!
Below, please find show notes which may include links to things as necessary.
Welcome to the security box, podcast 145. On this podcast, we’re going to talk about anothr Ransomware group that is out there that may be of value because while they may ot be targeting the states yet, they’re attacking and we must be aware of what’s happening.
Besides this, we may have at least one moron, maybe more, we’ll see what others have to say, we’ll talk about the landscape and we’ll also make sure you’re informed the best we can.
Topic
Bablock is a very interesting piece of ransomware out there. The ransomware is based off of Lockbit, but may be different. Trend Micro will help us with this one. An Analysis of the BabLock (aka Rorschach) Ransomware is the article title and we hope you enjoy the program!
Supporting the podcast
If you’d like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can’t do this alone.
Comments (0)
Windows 11 is so broken, Microsoft can’t fix it?
So Microsoft can’t fix Windows it seems. It seems like office products interfeer with 11 somehow, preventing the start menu and other parts of Windows from orking.
This is definitely interesting. I have word installed but nothing else. I prefer docs anyway as of late.
Tech Radar’s article: Windows 11 is so broken that even Microsoft can’t fix it
Comments (0)
Twitter sues Microsoft? Oh boy
Here we go. Why would you sue someone for violating developer rules some years after the fact? If Microsoft had developer access and they were supposedly abusing the privelage, than why wait till now to potentially sue them?
While we don’t have any idea what the supposed letter is, I spotted this on Mastodon and it caught my attention.
I highly doubt that this will go anywhere.
To read the full article, Elon Musk’s lawyer accuses Microsoft of abusing its access to Twitter data/ is the title of the article and you’re welcome to make your own opinion.
This is going to get interesting.
Comments (0)
Uber, Doordash and lawsuits
I found a very interesting article that talks about a lawsuit against Doordash when it comes to pricing from IOS VS Android.
The reason why I’m bringing Uber in to this is because Uber also charges a Priority $2 and change, (maybe more) if your wanting priority delivery.
All my orders come to me, all my orders are either left right at my door or handed to me, and sometimes I just don’t get it even though I see the order as delivered.
In my last case, it was left in a different building altogether and I got a phone call about it.
Regardless, I’m more curious about the priority pricing that both of these services offer.
I’m not an Android user, but would it surprise me if Uber does the same thing and we just don’t know it yet?
This 9to5mac article is titled DoorDash charges iPhone users more than Android users, lawsuit alleges and is quite interesting to read.
Maybe you’ll have the same thoughts that I do, but maybe you won’t. Its OK if you do or don’t, feel free to read the article if you use door dash and make yourself aware of what’s going on.
Make it a great day!
Comments (0)
Windows Central says: Windows 21h2 and earlier, you’re getting h2
Spotting something I should blog here about Windows 10. If you’re running H1, you will probably be upgraded soon to H2 with no going back.
While there are no major changes between H1 and H2, the change is to continue to provide you support for the next two years. The article goes on to indicate that Windows 11 will continue to get features as part of its development cycle.
To read more, read the article from them titled <a href=”https://www.windowscentral.com/software-apps/windows-10/microsoft-will-force-all-windows-10-users-to-upgrade-to-version-22h2-next-Microsoft will force all Windows 10 users to upgrade to ‘version 22H2’ next month.
During last week’s reboot, my teamtalk settings were changed to use line 1 on both mike and speakers. Why, I don’t know. This isn’t the first time Windows has changed this, and I don’t know until its too late.
Anyhow, I hope this update doesn’t break that, although I remember it having issues and saying it lost my pin two updates ago and I had to reset my Microsoft account as well as my pin for the computer.
See you all later.
Comments (0)
There is a real chat gpt app, but look for these 6 fake apps
In a recent newsletter, Kim lets her readers know about 6 fake apps and links to the real one.
One of the fake apps will work, doing 4 free searches a day then $7 a week or $70 a year.
The 6 fake apps are:
- • Chat GBT
- • GAl Assistant
- • Al Chat GBT – Open Chatbot App
- • Al Chat – Chatbot Al Assistant
- • Genie AI Chatbot
- • Al Chatbot – Open Chat Writer
ChatGPT apps: The good, the bad and the scammy is the article, and we should be aware of it.
I’ve not used chatgpt yet, but i’ve played with bing. Its definitely going to get interesting.
Stay well!
Comments (0)
18 year old charged with hacking draft kings
Last year,, I posted a Kim Komando article about Draft Kings. Here is the blog post with the news about their hack.
Today, as I continue to catch up on Mastodon and the landscape, we learn that an 18-year-old was recently charged.
The suspect’s name is Joseph Garrison who says that “hacking shit is fun and I won’t get caught.”
He was interviewed last year, and the IP address used was linked to his parent’s home, says the article.
Joseph used a method known in this industry called Credential Stuffing. In short, I could either buy data, or be given data to do a specific job. That data could be a username/password pair in most cases. I could then as an example, try these pairs on other sites to see what I could get in to.
Joseph even had instructions that were made available on how to extract the funds from Draft Kings. That image, for those who can se, are in the article.
The article comes from PC Magaznie. Its titled 18-Year-Old Charged With Hacking 60,000 DraftKings User Accounts and he may in fact be our moron of the podcast. We’ll see.
At the time the notes were done, we didn’t have one, but there could always be a last minute one. As a side note, credential stuffing is linked on our terms section of email host security along with other articles, books, companies and more. This term is one of many actors use to get at your data. There are lots of terms like this one which might need to be familiarized by the reader, so check out the site and see if something peaks your interest.
Happy reading!
Comments (0)
navigation menu
- Archives
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
Join 8 other subscribers
- The tech blog’s pages
- Blogroll
- Crashmasters blog
- Cyberscoop
- Documentation
- Improve Internet Accessibility for Individuals with Impaired Vision
- International friends network
- Kim Komando
- Krebs On Security
- Plugins
- Register to this site
- Suggest Ideas
- Support Forum
- supporters and partners
- the blind perspective
- The Jared Rimer Network donations page
- The Phishlabs Blog
- The Security Box discussion list
- The Technology blog and podcast and TSB on amazon music podcasts
- Themes
- toptechtidbits
- WordPress Blog
- WordPress Planet
- “Blind VMS and the Tech podcast join forces”