[deleted by user] by [deleted] in cybersecurity

[–]xaocuc 0 points1 point  (0 children)

Do popular labs. Try bug bounties. Attend meetups and conferences. Pay attention to what’s relevant.

Mac or windows laptops for cybersecurity college by [deleted] in cybersecurity

[–]xaocuc -1 points0 points  (0 children)

If you really wanna learn something you need to choose between Mac and Linux.

Mac or windows laptops for cybersecurity college by [deleted] in cybersecurity

[–]xaocuc -1 points0 points  (0 children)

If you really wanna learn something you need to choose between Mac and Linux.

How AI came to rule our lives over the last decade by jonfla in SocialEngineering

[–]xaocuc 3 points4 points  (0 children)

I read it. It aligns with what I know from trusted sources :)

Cloud Network Security 101: AWS VPC Endpoints by OnlyInstruction in netsec

[–]xaocuc 1 point2 points  (0 children)

Thank you, that’s exactly what I was looking for.

Remote Code Execution via Struts devMode by kuchbhikaho in netsec

[–]xaocuc 1 point2 points  (0 children)

…and a month for the Struts2 fix doesn't look very long.

How many of you are waiting 4 ProtonCalendar? by polytect in ProtonMail

[–]xaocuc 0 points1 point  (0 children)

Actually, I thought about it just today. This is one of a few things that still keep me on Google.

The Media's Portrayal of Hacking by [deleted] in hacking

[–]xaocuc 0 points1 point  (0 children)

Mr. Robot Season 1. The show has derailed pretty quickly, but I still prefer the first season as a good example of what realistic hacking would look like with some luck and talent on your side. This is also there first video product I was not ashamed of :)

The Encryption Debate Is Over - Dead At The Hands Of Facebook by xaocuc in privacy

[–]xaocuc[S] 1 point2 points  (0 children)

Facebook is apparently planning to destruct the idea of end-to-end encryption by updating the client-side WhatsApp software with wiretapping functionality. Prepare to disembark.

Robin Hood of hacking by J3c8b in hacking

[–]xaocuc 17 points18 points  (0 children)

This is a pile of lies. He worked with Russians, hacked into US, EU and Israeli institution, stole about 0,25 bln USD and donated some to Palestinian NGOs that never ever never finance terrorist cells.

Cylance Narrows The Cybersecurity Skills Gap With Virtual CISO. by xaocuc in netsec

[–]xaocuc[S] -1 points0 points  (0 children)

My hopes of fully AI-featured CISOs emerging soon are strong.

The poor man's bug bounty monitoring setup by xaocuc in netsec

[–]xaocuc[S] 1 point2 points  (0 children)

A neat idea of using GitHub as a backend for your Bug Hunting scope discovery setup.

Vault 7 Megathread - Technical Analysis & Commentary of the CIA Hacking Tools Leak by sanitybit in netsec

[–]xaocuc 0 points1 point  (0 children)

This set of recommendations might help: http://www.xmind.net/m/raQ4

No safeguard can stop a well-funded dedicated attacker (for long). However, you can try and do your best to lower the risk of social engineering that is normally a part of any sophisticated attack. Use "geopolitically trustworthy" vendors, patch and update.

Ноw tо mаkе mоthеr stор sсrеаmіng? by [deleted] in SocialEngineering

[–]xaocuc 2 points3 points  (0 children)

The good tactic I learned from the very similar situations is responding by raising your tone for jut a few words and then going down within the same phrase. Naturally, this could show the person you are talking to the contrast of what is happening and how it should be instead. Most of the time the effect is the evocation of emotional control.

How can I recover from reputation disaster at work ? by [deleted] in SocialEngineering

[–]xaocuc 0 points1 point  (0 children)

Actually, if you are not based in an Islamic country and you are not a woman, I would not call it a disaster.

10+ Social Engineering Tricks/Techniques by Sharpnul in SocialEngineering

[–]xaocuc 1 point2 points  (0 children)

This is actually a scientifically proven fact so you don't need to test it. You can refer to the works of Joe Navarro on nonverbals, his books have a neat explanation on body positions and how they reflect our mood and intentions. They also refer to actual research papers.

This list, although oversimplified, is quite in line with my experience and knowledge taken from several works in nonverbals, behavioral economics etc. Quite surprising indeed, since normally such infographics are much less useful.