Found 31 bookmarks
Newest
Chrome Users Now Worth 30% Less Money Thanks to Google's Cookie Killing, Ad Firm Says
Chrome Users Now Worth 30% Less Money Thanks to Google's Cookie Killing, Ad Firm Says
A week into phase one of Google’s cookie killing project in Chrome, early tests show how it could hit the web’s bottom line.
·gizmodo.com·
Chrome Users Now Worth 30% Less Money Thanks to Google's Cookie Killing, Ad Firm Says
Mozilla Report Finds That New Cars Give Out Lots of Your Info
Mozilla Report Finds That New Cars Give Out Lots of Your Info
Bad news: your car is a spy. Every major car brand's new internet-connected models flunked privacy and security tests conducted by Mozilla.
·gizmodo.com·
Mozilla Report Finds That New Cars Give Out Lots of Your Info
The Majority of PostgreSQL Servers on the Internet are Insecure
The Majority of PostgreSQL Servers on the Internet are Insecure
At most 15% of the approximately 820,000 PostgreSQL servers listening on the Internet require encryption. In fact, only 36% even support encryption. This puts PostgreSQL servers well behind the rest of the Internet in terms of security. In comparison, according to Google, over 96% of page loads in Chrome on a Mac are encrypted. The top 100 websites support encryption, and 97 of those default to encryption.
·innerjoin.bit.io·
The Majority of PostgreSQL Servers on the Internet are Insecure
The Majority of PostgreSQL Servers on the Internet are Insecure
The Majority of PostgreSQL Servers on the Internet are Insecure
At most 15% of the approximately 820,000 PostgreSQL servers listening on the Internet require encryption. In fact, only 36% even support encryption. This puts PostgreSQL servers well behind the rest of the Internet in terms of security. In comparison, according to Google, over 96% of page loads in Chrome on a Mac are encrypted. The top 100 websites support encryption, and 97 of those default to encryption.
·innerjoin.bit.io·
The Majority of PostgreSQL Servers on the Internet are Insecure
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
La nuova funzione implementata ieri da BlackCat, esporrà le vittime colpite anche su Internet, con una diffusione più massiccia e pubblica dei dati rubati, con nome di dominio autentico intestato alla vittima stessa
·insicurezzadigitale.com·
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
La nuova funzione implementata ieri da BlackCat, esporrà le vittime colpite anche su Internet, con una diffusione più massiccia e pubblica dei dati rubati, con nome di dominio autentico intestato alla vittima stessa
·insicurezzadigitale.com·
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
La nuova funzione implementata ieri da BlackCat, esporrà le vittime colpite anche su Internet, con una diffusione più massiccia e pubblica dei dati rubati, con nome di dominio autentico intestato alla vittima stessa
·insicurezzadigitale.com·
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
We recently began scanning for middlebox devices that are vulnerable to Middlebox TCP reflection, which can be abused for DDoS amplification attacks.  Our results are now shared daily, filtered for your network or constituency in the new Vulnerable DDoS Middlebox report. We uncover over 18,800,000 IPv4 addresses responding to our Middlebox probes. In some cases the amplification rates can exceed 10,000!
·shadowserver.org·
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
We recently began scanning for middlebox devices that are vulnerable to Middlebox TCP reflection, which can be abused for DDoS amplification attacks.  Our results are now shared daily, filtered for your network or constituency in the new Vulnerable DDoS Middlebox report. We uncover over 18,800,000 IPv4 addresses responding to our Middlebox probes. In some cases the amplification rates can exceed 10,000!
·shadowserver.org·
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
We recently began scanning for middlebox devices that are vulnerable to Middlebox TCP reflection, which can be abused for DDoS amplification attacks.  Our results are now shared daily, filtered for your network or constituency in the new Vulnerable DDoS Middlebox report. We uncover over 18,800,000 IPv4 addresses responding to our Middlebox probes. In some cases the amplification rates can exceed 10,000!
·shadowserver.org·
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
We have recently began scanning for  accessible MySQL server instances on port 3306/TCP.  These are instances that respond to our MySQL connection request with a Server Greeting. Surprisingly to us, we found around 2.3M IPv4 addresses responding with such a greeting to our queries. Even more surprisingly, we found over 1.3M IPv6 devices responding as well (though mostly associated with a single AS). IPv4 and IPv6 scans together uncover 3.6M accessible MySQL servers worldwide.
·shadowserver.org·
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
We have recently began scanning for  accessible MySQL server instances on port 3306/TCP.  These are instances that respond to our MySQL connection request with a Server Greeting. Surprisingly to us, we found around 2.3M IPv4 addresses responding with such a greeting to our queries. Even more surprisingly, we found over 1.3M IPv6 devices responding as well (though mostly associated with a single AS). IPv4 and IPv6 scans together uncover 3.6M accessible MySQL servers worldwide.
·shadowserver.org·
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
Over 3.6 million exposed MySQL servers on IPv4 and IPv6
We have recently began scanning for  accessible MySQL server instances on port 3306/TCP.  These are instances that respond to our MySQL connection request with a Server Greeting. Surprisingly to us, we found around 2.3M IPv4 addresses responding with such a greeting to our queries. Even more surprisingly, we found over 1.3M IPv6 devices responding as well (though mostly associated with a single AS). IPv4 and IPv6 scans together uncover 3.6M accessible MySQL servers worldwide.
·shadowserver.org·
Over 3.6 million exposed MySQL servers on IPv4 and IPv6