🍀 ThePrivacyPost è un account di servizio gestito direttamente dagli amministratori di Poliverso e pubblica notizie provenienti da diversi siti, blog, account del fediverso e alcuni contenuti originali.
🩸 Se apprezzi questo servizio, prendi in considerazione la possibilità di effettuare una donazione a Poliverso. Puoi scegliere due canali:
1) Ko-Fi ☕
2) LiberaPay 💳
like this
reshared this
Mitre Wants the Feds to Play in Its Sandbox
https://poliverso.org/display/0477a01e-3f3198fa-68e5f0dce76e381c
Mitre Wants the Feds to Play in Its Sandbox If you haven’t worked with the US government, you might not know Mitre, a non-profit government research organization. Formed in 1958 by the U.S. Air Force as a company to guide the SAGE computer, they are often research experts who oversee government contracts or evaluate proposals. Now they are building a $20 millon https://www.mitre.org/ne
The Privacy Post reshared this.
Your Pi, From Anywhere
https://poliverso.org/display/0477a01e-2e4441a0-7f77669d2755b258
Your Pi, From Anywhere The Raspberry Pi finds a use in a huge variety of applications, and in almost any location you could imagine. Sadly those who use those machines might not be in the same place as the machines themselves, and thus there’s the question of providing a remote connection between the two. This may not be a huge challenge to those skilled with Linux and firewalls, but to many Pi us
The Privacy Post reshared this.
5 trucchi per proteggere la tua Privacy online. Il video di @morrolinux
Scelta del browser, estensioni per bloccare cookie e tracker, indirizzi email usa e getta, separare gli account con i Container di Firefox, rimozione Data Broker e servizi Privacy Oriented e self-hosting
Come proteggere la tua Privacy online
👉 Incogni: sconto del 60% qui ➔ https://incogni.com/morrolinux✨ NordVPN: Approfitta della promo valida fino al 30 maggio ➔ https://nordvpn.com/morrolinux/🔗...YouTube
like this
reshared this
Z80s From the ’80s Had Futuristic Design
https://poliverso.org/display/0477a01e-30fd8e6a-0fac440c53812272
Z80s From the ’80s Had Futuristic Design Ever heard of a Dutch company called Holborn (literally, born in Holland)? We hadn’t either, but [Bryan Lunduke] showed us these computers from the early 1980s https://lunduke.locals.com/post/5588902/1950s-sci-fi-style-computers-powered-by-a-z80-built-in-holland, and we wondered if they might have appeared in some science fiction movies. They
1950s Sci-Fi Style Computers, Powered by a Z80, Built in Holland
Between 1980 and 1983, a little company in The Netherlands built the “Holborn” series of computers… which can best be described as “1950s sci-fi… powered by a Z80”.Note: The “Holborn” name is to signify that these computers were “Born in Holland”.Bryan Lunduke (Lunduke)
The Privacy Post reshared this.
Bluepad32 Brings All the Controllers To Your MCU
https://poliverso.org/display/0477a01e-20301726-baf86070d5ccca86
Bluepad32 Brings All the Controllers To Your MCU As much as we enjoy spinning up our own solutions, there are times when you’ve got to look at what’s on the market and realize you might be out of your league. For example, take Bluetooth game controllers. Sure, you could make your own with a microcontroller, some buttons, and a couple joysticks. But between the major players like
reshared this
The 2024 Business Card Challenge Starts Now
https://poliverso.org/display/0477a01e-33d3ae15-3319e0df59be9c1d
The 2024 Business Card Challenge Starts Now If you want to make circuits for a living, what better way to impress a future employer than to hand them a piece of your work to take home? But even if you’re just hacking for fun, you can still turn your calling into your calling card.We are inviting you to submit your coolest business card hacks for us all to admire, and the top three
The Privacy Post reshared this.
New note by cybersecurity
https://poliverso.org/display/0477a01e-9366-3a71-e440-8b5451046603
Un nuovo attacco contro praticamente tutte le app VPN neutralizza il loro intero scopo https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/La vulnerabilità TunnelVision esiste dal 2002 e potrebbe essere già nota agli aggressori.TunnelVision, come i ricercatori hanno chiamato il loro attacco, nega in gran parte l'intero scopo e punto di
la | Ars Technica
Serving the Technologist for more than a decade. IT news, reviews, and analysis.arstechnica.com
The Privacy Post reshared this.
https://fpf.org/blog/fpf-responds-to-the-ombs-request-for-information-on-responsible-artificial-intelligence-procurement-in-government/
@privacy
On April 29, the Future of Privacy Forum submitted comments to the Office of Management and Budget (OMB) in response to the agency’s Request for Information (RFI) regarding responsible procurement of artificial intelligence (AI)
FPF Responds to the OMB’s Request for Information on Responsible Artificial Intelligence Procurement in Government
On April 29, FPF submitted comments to the Office of Management and Budget (OMB) in response to the agency’s Request for Information (RFI) regarding responsible procurement of artificial intelligence (AI) in government.Future of Privacy Forum
The Privacy Post reshared this.
256-Core RISC-V Megacluster
https://poliverso.org/display/0477a01e-0c67c34e-3597220f4da31055
256-Core RISC-V Megacluster Supercomputers are always an impressive sight to behold, but also completely unobtainable for the ordinary person. But what if that wasn’t the case? [bitluni] shows us how it’s done with his 256-core RISC-V megacluster https://www.youtube.com/watch?v=lh93FayWHqw.While the CH32V family of microcontrollers it’s based on aren’t nearly as powerful as what you’d traditionall
My DIY 256-Core RISC-V
Free Assembly for 1-6 Layer PCBs at JLCPCB, 3D Printing from $0.3, Sign up to Get $60 Coupons here: https://jlcpcb.com/?from=bitluni (Sponsor)This new clust...YouTube
The Privacy Post reshared this.
Usi software pirata? Che RedLine ti colga! Fate attenzione agli Infostealer!
https://poliverso.org/display/0477a01e-8fb8cd62-69bb2324c62d268d
Usi software pirata? Che RedLine ti colga! Fate attenzione agli Infostealer! Gli esperti di Kaspersky Lab riferiscono https://dfi.kaspersky.ru/stealers che lo scorso anno più della metà dei dispositivi attaccati dagli stealer nel mondo (55%) sono stati infettati dal https://www.redhotcyber.com/post/la-storia-del-virus-e-dei-malware/ RedLine. In totale,
Cosa sono i malware. Tra fantascienza, laboratorio e realtà
Spesso parliamo di "Malware". Ma conosciamo precisamente i loro scopi e le loro differenze? Scopriamo il mondo dei malware in questo articolo di Red Hot Cyber.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
General Puropse AI Models can`t ignore copyright in the EU
https://poliverso.org/display/0477a01e-fb71e88f-5807bdd59580dafc
General Puropse AI Models can`t ignore copyright in the EUArtificial intelligence has posed serious challenges to our understanding of copyright. General-purpose models are trained on massive amounts of text and images in order to produce tools that can answer to a vast array of prompts.euractiv.com/section/artificia…
The Privacy Post reshared this.
European Parliament’s recruitment application compromised in data breach
https://poliverso.org/display/0477a01e-7e5c7fde-040c434efab42437
European Parliament’s recruitment application compromised in data breachThe European Parliament sent on Monday (6 May) an internal notification to its staff, seen by Euractiv, about a data breach in the application PEOPLE, used for the recruitment of the institution's non-permanent staff.euractiv.com/section/cybersecu…
The Privacy Post reshared this.
reshared this
reshared this
reshared this
reshared this
reshared this
reshared this
reshared this
https://www.istitutoitalianoprivacy.it/2024/05/07/open-webinar-iip-110ectomia-la-riforma-delle-regole-privacy-per-la-ricerca-medica/
@informatica
Per la rassegna de “I Martedì della Privacy”, nell’ambito delle iniziative dell’Istituto Italiano per la Privacy e la Valorizzazione dei Dati, martedì 14 maggio 2024 dalle 15:00 alle 16:30 discuteremo della riforma
Open Webinar IIP - 110ectomia - La riforma delle regole privacy per la ricerca medica, biomedica ed epidemiologica in Italia
Per la rassegna de “I Martedì della Privacy”, nell’ambito delle iniziative dell’Istituto Italiano per la Privacy e la Valorizzazione dei Dati, martedì 14 maggio 2024 dalle 15:00 alle 16:30 discuteremo della riforma dell'art.Istituto Italiano Privacy
like this
reshared this
Supercon 2023: MakeItHackin Automates the Tindie Workflow
https://poliverso.org/display/0477a01e-cdce2092-0b4143641bb10a5b
Supercon 2023: MakeItHackin Automates the Tindie Workflow Selling your hardware hacks is a great way to multiply your project’s impact, get your creations into others’ hands, and contribute to your hacking-related budget while at it. If you’re good at it, your store begins to grow. From receiving a couple orders a year, to getting one almost every day – if you don’t
The Privacy Post reshared this.
reshared this
reshared this
Europol’s declaration against end-to-end encryption reignites debate, sparks privacy concerns
https://poliverso.org/display/0477a01e-44e1da4f-a485ea1583104e28
Europol’s declaration against end-to-end encryption reignites debate, sparks privacy concernsEuropol's recent joint declaration with European police chiefs urges action against end-to-end encryption, citing concerns of possible justice obstruction, amid an ongoing debate about balancing data privacy with combating
reshared this
Addio alle Password: Microsoft Rivoluziona l’Accesso con Passkey
https://poliverso.org/display/0477a01e-85f2019b-5b7cf0fe5c015b28
Addio alle Password: Microsoft Rivoluziona l’Accesso con Passkey Non molto tempo fa, Microsoft https://www.securitylab.ru/glossary/Microsoft/ha annunciato il lancio di massa della funzionalità Passkey, che consente agli utenti di non utilizzare più le password per accedere agli account aziendali.Nella sua pubblicazione ufficiale, l’azienda riferisce che gli utenti
Microsoft
Microsoft - это американская многопрофильная компания, занимающаяся разработкой программного обеспечения и производством компьютерной техники.www.securitylab.ru
The Privacy Post reshared this.
Mise, Guardia di Finanza e Ministero delle Infrastrutture presi di mira dal gruppo di hacktivisti filorussi di NoName057(16)
https://poliverso.org/display/0477a01e-292b40d1-bbc0a4d00ce50ef5
Mise, Guardia di Finanza e Ministero delle Infrastrutture presi di mira dal gruppo di hacktivisti filorussi di NoName057(16) https://www.redhotcyber.com/post/i-padri-fondatori-della-community-hacker/
I padri fondatori della community Hacker. L'hacking è un percorso, non una destinazione!
In questo articolo scopriremo i padri fondatori della community hacker. Due scienziati che presero parte al TMRC dell'MITMassimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
Exploits and vulnerabilities in Q1 2024
https://poliverso.org/display/0477a01e-f6fc7b29-dbbf5d95ebc4811c
Exploits and vulnerabilities in Q1 2024 We at Kaspersky continuously monitor the evolving cyberthreat landscape to ensure we respond promptly to emerging threats, equipping our products with detection logic and technology. Software vulnerabilities that threat actors can exploit or are already actively exploiting are a critical component of that landscape. In this report, we present a series
The Privacy Post reshared this.
reshared this
Imperva Report Claims That 50% of the World Wide Web is Now Bots
https://poliverso.org/display/0477a01e-3f2ba615-b0541ffe1472df3c
Imperva Report Claims That 50% of the World Wide Web is Now Bots Automation has been a part of the Internet since long before the appearance of the World Wide Web and the first web browsers, but it’s become a significantly larger part of total traffic the past decade. A recent report by cyber https://www.imperva.com/blog/five-key-takeaways-from-the-2024-imperva-ba
The Privacy Post reshared this.
Attacco informatico all’Università di Siena: una giornata di caos e di sfide
https://poliverso.org/display/0477a01e-0409755d-8ba90e62affd97a8
Attacco informatico all’Università di Siena: una giornata di caos e di sfide I dipendenti dell’Università di Siena si sono svegliati la mattina del 6 maggio con una sorpresa sgradevole: un attacco informatico ha messo in tilt la rete dell’ateneo https://www.unisi.it/unisilife/notizie/infrastruttura-di-rete-colpita-da-attacco-hacker, causando disagi e
The Privacy Post reshared this.
New note by cybersecurity
https://poliverso.org/display/0477a01e-1366-3a1e-d916-17d365932691
Infrastruttura di rete dell’Università di Siena colpita da attacco informatico https://www.unisi.it/unisilife/notizie/infrastruttura-di-rete-colpita-da-attacco-hacker@Informatica (Italy e non Italy 😁)Dopo la comunicazione all’Agenzia per la Cybersicurezza Nazionale, sono state avviate le operazioni di verifica e di bonifica dell’integrità del sistemaDurante lo scorso fine settimana, l'Università d
The Privacy Post reshared this.
Influenza digitale: Gli Stati Uniti vegliano sui paesi in via di sviluppo per consentire loro prosperità
https://poliverso.org/display/0477a01e-d6c08892-62ce5fb9506171e4
Influenza digitale: Gli Stati Uniti vegliano sui paesi in via di sviluppo per consentire loro prosperità Il Dipartimento di Stato americano ha annunciato https://edition.cnn.com/2024/05/06/politics/us-state-department-cyber-strategy/index.html una https://www.redhotcyber.com/rubriche/alla-scoperta-della-sicurezza-informatica/
Alla scoperta della Sicurezza Informatica - il blog della sicurezza informatica
In questa rubrica, andremo a scoprire cos'è la Sicurezza informatica (cybersecurity). Questo è il posto per scoprire e conoscere questo mondo.Red Hot Cyber
The Privacy Post reshared this.
RepTrap Keeps Watch Over Our Cold-Blooded Friends
https://poliverso.org/display/0477a01e-59fd2901-e0d58e8cceb8dc28
RepTrap Keeps Watch Over Our Cold-Blooded Friends Wait a second, read that title again. This isn’t a throwback 3D printing project at all. That’s “RepTrap” as in reptile trap https://hackaday.io/project/192032-openthing-2-reptrap, and it’s a pretty clever way to study our cold-blooded friends in their natural habitat.Now, game cameras — or trail cameras, if you’re less interested
Openthing 2 - RepTrap
The Rep Trap idea is a hardware system designed to overcome the limitations and challenges of conventional trapping methods.hackaday.io
The Privacy Post reshared this.
New note by cybersecurity
https://poliverso.org/display/0477a01e-1966-3a11-0393-f49218108497
Cybersecurity, accordo tra Polizia di Stato e Gruppo Engineering per il contrasto al cybercrime https://www.key4biz.it/cybersecurity-accordo-tra-polizia-di-stato-e-gruppo-engineering-per-il-contrasto-al-cybercrime/489325/È stato siglato a Roma l’accordo tra la Polizia di Stato e Gruppo Engineering per la tutela delle reti e dei sistemi informativi di supporto alle funzioni istituzionali della soci
The Privacy Post reshared this.
The 2024 edition brought new faces and great discussions and presentations on current legal and licensing issues related to technological developments such as AI:
https://fsfe.org/news/2024/news-20240506-01.html
LLW 2024: A forum for difficult legal topics of Free Software in Gothenburg - FSFE
For the second year in a row, the Swedish city of Gothenburg hosted an edition of the Free Software Legal & Licensing Workshop (LLW), the annual conference...FSFE - Free Software Foundation Europe
The Privacy Post reshared this.
New note by cybersecurity
https://poliverso.org/display/0477a01e-1866-39e7-45c5-06d025013938
Intelligenza artificiale, quali sono le startup europee https://www.guerredirete.it/intelligenza-artificiale-quali-sono-le-startup-europee/Quella dell’Europa sull’AI è una rincorsa difficile. Chi sono i soggetti principali, i progetti della Commissione EU e gli altri incentivi a disposizione.L'articolo Intelligenza artificiale, quali sono le startup europee proviene da Guerre di Rete.L'articolo pr
The Privacy Post reshared this.
Google aumenta di 10 volte le ricompense per gli exploit su APP Android
https://poliverso.org/display/0477a01e-a53aa094-782374da5e996df6
Google aumenta di 10 volte le ricompense per gli exploit su APP Android Google sta decuplicando https://bughunters.google.com/blog/5792192022577152/one-year-of-mobile-vrp-reward-increases-and-lessons-learned le ricompense per le vulnerabilità https://www.redhotcyber.com/post/vulnerabilita-cve-2024-21893-ivanti-colpito-da-hacker-cinesi-unc5325-e-unc3886/
Vulnerabilità Ivanti CVE-2024-21893: Gli hacker cinesi UNC5325 e UNC3886 colpiscono le reti private
Ivanti sotto attacco: hacker cinesi sfruttano falle CVE-2024-21893 nella VPN per infiltrarsi nelle reti. Scopri cosa c'è dietro il recente attacco informaticoRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Il Malware Cuckoo prende di mira e spia gli utenti Mac di Apple
https://poliverso.org/display/0477a01e-ca0a1293-a8fd8158e4dbe093
Il Malware Cuckoo prende di mira e spia gli utenti Mac di Apple I ricercatori di Kandjii hanno identificato un nuovo malware https://blog.kandji.io/malware-cuckoo-infostealer-spyware chiamato Cuckoo che prende di mira i sistemi Apple macOS. Questo software dannoso non solo garantisce una presenza costante nei sistemi infetti, ma svolge anche una serie di pericolose
Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware
Kandji's threat research team has discovered a piece of malware that combines aspects of an infostealer and spyware. Here's how it works.Adam Kohler & Christopher Lopez (Kandji)
The Privacy Post reshared this.
Storia dei conflitti cibernetici. NITRO ZEUS: il dopo STUXNET che portò ad un livello superiore la Cyber-War
https://poliverso.org/display/0477a01e-2612293d-2e5ac649ae6accaa
Storia dei conflitti cibernetici. NITRO ZEUS: il dopo STUXNET che portò ad un livello superiore la Cyber-War Il mondo militare e quello dell’hacking sono profondamente intrecciati perché condividono la stessa radice: l’analisi, l’anticipazione e il superamento delle strategie avversarie ed in caso di necessità, entrambe le
The Privacy Post reshared this.
Tokyo Atacama Observatory Opens As World’s Highest Altitude Infrared Telescope
https://poliverso.org/display/0477a01e-314932e2-5930003fa8d5b303
Tokyo Atacama Observatory Opens As World’s Highest Altitude Infrared Telescope https://hackaday.com/wp-content/uploads/2024/05/tokyo_atacama_observatory_mountain.jpgCerro Chajnantor, site of TAOAlthough we have a gaggle of space telescopes floating around these days, there is still a lot of value in ground-based telescopes. These generally operate in
The Privacy Post reshared this.
VOLPE ANTONIO
in reply to informapirata :privacypride: • • •informapirata :privacypride:
in reply to VOLPE ANTONIO • • •@volpe_antonio Tor browser è lo strumento più avanzato per gestire la navigazione col massimo livello di privacy, ma pensare di essere invisibile perché si usa Tor è una falsa sicurezza. La privacy on line è un obiettivo che non si raggiunge solo con i software ma con procedure sicure
@morrolinux @privacypride