Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Feb 20, 2023

Users Are Worried: What’s Going On with SolusOS
Video: BSDs and a First Look Of CachyOS

GoDaddy Says Recent Hack Part of Multi-Year Campaign

↺ GoDaddy Says Recent Hack Part of Multi-Year Campaign
GoDaddy recently discovered a hacker attack where a sophisticated threat group infected websites and servers with malware.

Finding forensics breadcrumbs in Android image storage

↺ Finding forensics breadcrumbs in Android image storage
Introduction Our digital forensics work is wide and varied.

Fines as a Security System

↺ Fines as a Security System
Tile has an interesting security solution to make its tracking tags harder to use for stalking:
↺ interesting security solution
↺ interesting security solution

Scam alert: bogus Companies House email threatens legal action

↺ Scam alert: bogus Companies House email threatens legal action
Watch out for the latest impersonation scam

South Korea’s banking security: Intermediate conclusions

↺ South Korea’s banking security: Intermediate conclusions
A while back I wrote my first overview of South Korea’s unusual approach to online security. After that I published two articles on specific applications. While I’m not done yet, this is enough information to draw some intermediate conclusions.
TL;DR: I think that the question above can be answered with a clear “no.” The approaches make little sense given actual attack scenarios, they tend to produce security theater rather than actual security. And while security theater can sometimes be useful, the issues in question have proper solutions.
gemini.tuxmachines.org