Posts Tagged ‘security’

Advanced Anti-Detect Browser for Web Scraping and Multiple Accounts Managing

April 6, 2026

How to Be Anonymous on Telegram: 2025 Essential Tips & Tools for Enhanced Privacy
Want to use Telegram anonymously? This guide provides comprehensive tips from registration to daily use, including virtual phone numbers, privacy settings, VPN/proxies, and recommends Nstbrowser to help you

QT{{”
Conclusion: Avoid using your real phone number; opt for reliable virtual number services.

This is the first and most crucial step to achieving Telegram anonymity. Do not use your real phone number to register a Telegram account. You can choose from the following methods to obtain a virtual phone number:

Paid Virtual Number Services: It is recommended to use reputable, stable paid services such as Google Voice, TextNow (available in some regions), Hushed, or Burner. These services typically offer one-time or long-term virtual numbers that can receive SMS verification codes. Paid services are generally more reliable, and the risk of numbers being abused is lower.
“}}

Nstbrowser – Advanced Anti-Detect Browser for Web Scraping and Multiple Accounts Managing
https://www.nstbrowser.io/en/blog/be-anonymous-on-telegram

Ransomware: Extortion Is My Business – Communications of the ACM

June 23, 2025

https://cacm.acm.org/research/ransomware-extortion-is-my-business/

How to use authenticator apps like Google Authenticator to protect yourself online – Vox

February 6, 2022

https://www.vox.com/recode/22419794/authenticator-apps-and-you-authy-google-authenticator

Creator behind viral Tom Cruise deepfakes says they’re a warning

March 29, 2021

https://news.yahoo.com/deepfake-videos-tom-cruise-went-150232443.html Quote: “Think about the implications for national security… about the implications if I create a video of Jeff Bezos saying that $AMZN stock profits are down 20% — how much can I move the markets?”

Secondary_appt NYTimes.com: Thousands of Microsoft Customers May Have Been Victims of Hack Tied to China

March 29, 2021

Thousands of Microsoft Customers May Have Been Victims of Hack Tied to China

The hackers started their attack in January but escalated their efforts in recent weeks, security experts say. Business and government agencies were affected.

https://www.nytimes.com/2021/03/06/technology/microsoft-hack-china.html

The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED

September 12, 2020

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
The code that crashed the world

Instacart Hack? You Need to Change Your Password Now

July 27, 2020

Instacart Hack? You Need to Change Your Password Now
https://gizmodo.com/you-need-to-change-your-instacart-password-right-now-1844486340

Knoxville Ransomware Attack

June 22, 2020

Knoxville Ransomware Attack Leads to IT Network Shutdown

QT:{{”
“In 2019, a total of 113 state or municipal entities were impacted by ransomware. Knoxville is the 51st city to be hit in 2020, Callow said.

Last year, two Florida cities – Lake City and Riviera Beach – were both hit by ransomware attacks and decided to pay off the hackers…. ”

‘ “These smaller government agencies often chug along old legacy infrastructure, and that old legacy infrastructure is easy for bad actors to exploit.” ‘
“}}

https://threatpost.com/knoxville-ransomware-attack-leads-to-it-network-shutdown/156537/

Opinion | 7 Simple Ways to Protect Your Digital Privacy

September 30, 2019

QT:{{”
“How: A browser extension like uBlock Origin blocks ads and the data they collect. The uBlock Origin extension also prevents malware from running in your browser and gives you an easy way to turn the ad blocking off when you want to support sites you know are secure. Combine uBlock with Privacy Badger, which blocks trackers, and ads won’t follow you around as much. To slow down stalker ads even more, disable interest-based ads from Apple, Facebook, Google and Twitter. A lot of websites offer means to opt out of data collection, but you need to do so manually. Simple Opt Out has direct links to opt-out instructions for major sites like Netflix, Reddit and more. Doing this won’t eliminate the problem completely, but it will significantly cut down on the amount of data collected.

You should also install the HTTPS Everywhere extension. HTTPS Everywhere automatically directs you to the secure version of a site when the site supports that, making it difficult for an attacker — especially if you’re on public Wi-Fi at a coffee shop, airport or hotel — to digitally eavesdrop on what you’re doing.

Some people may want to use a virtual private network (VPN), but it’s not necessary for everyone. If you frequently connect to public Wi-Fi, a VPN is useful because it adds a layer of security to your browsing when HTTPS isn’t available. It can also provide some privacy from your internet service provider and help minimize tracking based on your IP address. But all your internet activity still flows through the VPN provider’s servers, so in using a VPN you’re choosing to trust that company over your ISP not to store or sell your data. Make sure you understand the pros and cons first, but if you want a VPN, Wirecutter recommends IVPN.”
“}}
Opinion | 7 Simple Ways to Protect Your Digital Privacy
https://www.nytimes.com/2019/05/06/opinion/7-simple-ways-to-protect-your-digital-privacy.html

SKS Keyserver Network Under Attack

July 5, 2019

a good example of a hypothetical attack that now becomes real

https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f QT:{{”
“The number one use of OpenPGP today is to verify downloaded packages for Linux-based operating systems, usually using a software tool called GnuPG. If someone were to poison a vendor’s public certificate and upload it to the keyserver network, the next time a system administrator refreshed their keyring from the keyserver network the vendor’s now-poisoned certificate would be downloaded. At that point upgrades become impossible because the authenticity of downloaded packages cannot be verified. Even downloading the vendor’s certificate and re-importing it would be of no use, because GnuPG would choke trying to import the new certificate. It is not hard to imagine how motivated adversaries could employ this against a Linux-based computer network.”
“}}