Then, a couple of months later, I get spam from a seller trying to get me to buy knockoff designer handbags, or a Nigerian prince trying to secret his fortune away, or something else odious.
But look -- the email was sent to the address "crappytire@example.net"!
Now I know, with absolute certainty, that this spammer got my address, directly or indirectly, from Crappy Tire. Maybe they sold their mailing list far and wide. Maybe their systems were hacked and every customer's email was exfiltrated.
I can now take action. If I think they sold my address, I can write a nastygram referencing their privacy policy or Canada's PIPEDA act, or Europe's GDPR, or whatever. If I think my address was stolen from their systems, I can report the security incident to them, or publicize it so others know it may have happened to them.
And most importantly, I can disable that email address. Just refuse all mail sent to it. It's no longer of use to spammers or crooks. If I ever deal with Crappy Tire again, I give them a new unique address.
Anyway, that's a lot of backstory. I use this technique extensively. I have caught many, many companies selling/renting their mailing lists in violation of their own policies. I have caught many others that have been hacked, and they didn't even know it.
So what's the thing that happens to me occasionally regarding this?
2/x
Favorite thing lately is finding an article I wish were in podcast form, saving the text to a .txt file, then having TTS Util use RH Voice to convert the file into an audio reading, and listen to my own little robotic FOSS nanny read me the stories I want to hear in my headphones as I do yardwork.
Die Babuk Ransomware Gruppe (babuk-bjorka) hat heute auf ihrer Website im Darknet bekanntgegeben, dass sie Rheinmetall Defence (rheinmetall.com) gehackt hat.
G'day
Another week... Another data breach / hack
This one is grand theft retirement savings
It's time to make sure all your financial accounts have multifactor authentication enabled (verification codes
Check your:
Bank accounts
Superannuation (pension) accounts
Insurance accounts
Broker accounts
... Anything associated with your money or finances
This has been a public service announcement
https://www.theguardian.com/australia-news/2025/apr/04/australian-super-funds-compromised-cybersecurity-data-breach-hack
If you don't know how to use the multifactor authentication supplied, then get the organisation to explain it to you
--
Multi-factor authentication (MFA) is an enhanced security method that requires users to provide multiple forms of verification (factors) beyond just a password to access an account or system
#CyberSecurity #Data #Hack
Crypto for Humans: Lessons from the Bybit Hack
https://www.coindesk.com/opinion/2025/03/18/crypto-for-humans-lessons-from-the-bybit-hack
Use a custom domain on GitHub Pages? Verify your domain to prevent takeover of subdomains:
#Oracle renaming breached Cloud services, to then say "Oracle Cloud has not been breached" is the most Oracle thing they could do https://doublepulsar.com/oracle-attempt-to-hide-serious-cybersecurity-incident-from-customers-in-oracle-saas-service-9231c8daff4a
#Hack #Breach
Why don't all wheelbarrows have this (tool clamps on the handles)? I'm still amazed how I thought of this myself.
#gardening #hack #diy #tools
Blatant #sundayvibes hashtag grab, by me @forbes.com: Brilliant find by @witherornot1337 (X) to replace the bypassnro #hack that Microsoft has now kiboshed for Windows 11 users not wanting to use a Microsoft Account. #kudos also to @thepineappl3 (X)
An old abandoned webcam, even a Quickcam of the late ’90 (there is no need of a 4K cam!), could become a FREE twilight switch, if you have some software to compare the brightness between two images.
SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk https://hackread.com/squarex-discloses-browser-native-ransomware-that-puts-millions-at-risk/ #BreachandAttack #PressRelease #Monitoring #Research #Malware #breach #Report #CISO #hack
…oh look, once again (see toot above) Twitter / X was leaked again. Well, this is not surprising.
»Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Job
Massive Twitter (X) data breach exposes details of 2.8 billion users; alleged insider leak surfaces with no official response from the company.«
https://hackread.com/twitter-x-of-2-8-billion-data-leak-an-insider-job/
*Nice one with the retrofitted old phone that becomes a poetry recital device. #deadmedia #RaspberryPi #hack #deviceart #poetry
We hacked Gemini's Python sandbox and leaked its source code (at least some)
https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code/
#ycombinator #gemini #llm #google #source_code #leak #bug_bounty #hack
Un test di #phishing geniale che fa leva sulla curiosità.
Forse non sarebbe male immaginare una campagna di test simili benevoli disegnati apposta per far prendere coscienza alle persone sui rischi della non consapevolezza e della reattività in rete. Immaginate che dopo inquadrato il QR code gli utenti fossero portati a una pagina benevola che prima li accoglie con un "benvenuto coglione" e poi li informa di quello che sarebbe accaduto se quel post (email o quel che volete) invece di essere stato preparato per una iniziativa di prevenzione fosse stato preparato da malintenzionati.
#cybersecurity #hack #prevenzione #phishing
Bonjour !
• #Cyberattaque chez AUTOSUR : 10,7M de datas dans la nature
• La #Chine dévoile un processeur sans silicium, 40 % plus rapide, 10 % moins énergivore
• L’AGI : une chimère à milliards selon des experts
• Le Parlement européen réclame un #ChipsAct 2.0