mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

928
active users

Learn more

#sorgente

0 posts0 participants0 posts today
minioctt<p>Ecco che ieri, like anti-clockwork, non è uscito alcun <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/postocto/" target="_blank">#postocto</a>, perché… stavo cercando di fare una cosa estremamente cursata, che penso da mesi e mesi ma che non avevo mai avuto voglia, e invece ieri mi è salito lo sghiribizzo: installare Windows e <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/linux/" target="_blank">#Linux</a> sulla stessa partizione, e non ho avuto manine per altro… (Nemmeno per………) 😳</p><p>Ed ecco che oggi sono qui a postare, ma… il piano pazzoide per ora è fallito, nessuno dei miei modi ha funzionato, e quindi devo abbassare la priorità del progetto. E quindi, è proprio vero che, ogni qualvolta si fanno due passi avanti, è necessario farne pure uno indietro. Non esistono più le mezze stagioni, e il 2025 sarà l’anno del <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/linux/" target="_blank">#Linux</a> desktop, questa volta è sicuro, non come tutti i 20 anni precedenti. 😤</p><p>Ed è per questo, e infiniti altri luoghi comuni che non c’azzeccano ‘na mazza, che oggi ho pubblicato allora una <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/nota/" target="_blank">#nota</a> su un argomento diverso, che sarebbe comunque finito in coda, <strong>Compilare e installare il kernel Linux da <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/sorgente/" target="_blank">#sorgente</a></strong>: <strong><a href="https://sitoctt.octt.eu.org/it/note/2024-09-01-Compilare-e-installare-il-kernel-Linux-da-sorgente/" rel="nofollow noopener noreferrer" target="_blank">https://sitoctt.octt.eu.org/it/note/2024-09-01-Compilare-e-installare-il-kernel-Linux-da-sorgente/</a></strong>!!! 🌽🍿🧨🎉🤯 (Come tutte le <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/note/" target="_blank">#note</a>, subirà aggiustamenti man mano, accetto anche pull request.)</p><p>Senza approfondire troppo, la mia <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/idea/" target="_blank">#idea</a> era di installare sia Linux che Windows su una singola partizione BTRFS, sfruttando il bootloader Quibble per avere la compatibilità per quest’ultimo, ma <a href="https://github.com/maharmstone/quibble/issues/88" rel="nofollow noopener noreferrer" target="_blank">su build di Windows troppo recenti non vuole andare</a>. Allora, piuttosto, ricordandomi del driver NTFS moderno per Linux, che funziona bene ed è integrato nel kernel in via definitiva da qualche mese (Linux 6.9), quasi quasi voglio provare la configurazione opposta, da lato oscuro… e sull’installazione di Linux su NTFS ci siamo, ma sull’avvio proprio no. Poopie. Comunque, visto che per avere il driver ganzo ho dovuto compilarmi io il kernel (<a href="https://bugs.debian.org/998627" rel="nofollow noopener noreferrer" target="_blank">bug #998627, grazie Debian</a>, ti odio), ho pensato fosse una cosa buona da tenere scritta. 🤢</p><p>Diciamolo onestamente comunque, dai, era tutta una nuova scusa per fare il primo nuovo post sul nuovo sitocto, sfruttando al meglio la novità mentre che è nuova e fresca; avere un post che sa di nuovo sul sito rifatto a nuovo come quando 2 anni fa era nuovo… e in questo senso ho raggiunto l’obiettivo. Certo però, scrivere come <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/compilare/" target="_blank">#compilare</a> il <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/kernel/" target="_blank">#kernel</a> Linux, seppur comunque con il mio stile magico, non è come scrivere come fare qualcosa che nessuno al mondo che sia mentalmente in salute fa con gran nonchalance… il kernel è compilato da fin troppa gente. 😩</p><p><a href="https://octospacc.altervista.org/2024/09/01/linuxocto-per-il-sitocto/" class="" rel="nofollow noopener noreferrer" target="_blank">https://octospacc.altervista.org/2024/09/01/linuxocto-per-il-sitocto/</a></p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/998627/" target="_blank">#998627</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/compilare/" target="_blank">#compilare</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/idea/" target="_blank">#idea</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/kernel/" target="_blank">#kernel</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/linux/" target="_blank">#Linux</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/nota/" target="_blank">#nota</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/note/" target="_blank">#note</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/postocto/" target="_blank">#postocto</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://octospacc.altervista.org/tag/sorgente/" target="_blank">#sorgente</a></p>
Redhotcyber<p>IntelBroker Colpisce Ancora! Mette in vendita il codice di Apple nell’underground criminale</p><p>Un attore di <a href="https://mastodon.bida.im/tags/minacce" class="mention hashtag" rel="tag">#<span>minacce</span></a>, noto come <a href="https://mastodon.bida.im/tags/IntelBroker" class="mention hashtag" rel="tag">#<span>IntelBroker</span></a>, ha affermato di aver ottenuto e messo in vendita <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> rubati da <a href="https://mastodon.bida.im/tags/Apple" class="mention hashtag" rel="tag">#<span>Apple</span></a>. Questi <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> includono il <a href="https://mastodon.bida.im/tags/codice" class="mention hashtag" rel="tag">#<span>codice</span></a> <a href="https://mastodon.bida.im/tags/sorgente" class="mention hashtag" rel="tag">#<span>sorgente</span></a> di tre strumenti utilizzati all’interno del sito <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> di <a href="https://mastodon.bida.im/tags/Apple" class="mention hashtag" rel="tag">#<span>Apple</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="tag">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="tag">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="tag">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/intelbroker-colpisce-ancora-mette-in-vendita-i-dati-di-apple-nellunderground-criminale/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/intelbrok</span><span class="invisible">er-colpisce-ancora-mette-in-vendita-i-dati-di-apple-nellunderground-criminale/</span></a></p>
Redhotcyber<p>Come realizzare un Command &amp; Control utilizzando Gmail in 16 steps per bypassare qualsiasi sistema di sicurezza</p><p>Come avevamo riportato qualche giorno fa, riportiamo la ricerca integrale svolta dal <a href="https://mastodon.bida.im/tags/team" class="mention hashtag" rel="tag">#<span>team</span></a> di <a href="https://mastodon.bida.im/tags/HackerHood" class="mention hashtag" rel="tag">#<span>HackerHood</span></a> di Red Hot Cyber – comprensiva di <a href="https://mastodon.bida.im/tags/codice" class="mention hashtag" rel="tag">#<span>codice</span></a> <a href="https://mastodon.bida.im/tags/sorgente" class="mention hashtag" rel="tag">#<span>sorgente</span></a> – per realizzare comunicazioni invisibili ai <a href="https://mastodon.bida.im/tags/sistemi" class="mention hashtag" rel="tag">#<span>sistemi</span></a> di sicurezza utilizzando <a href="https://mastodon.bida.im/tags/Gmail" class="mention hashtag" rel="tag">#<span>Gmail</span></a> come vettore di scambio di <a href="https://mastodon.bida.im/tags/informazioni" class="mention hashtag" rel="tag">#<span>informazioni</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/come-realizzare-un-command-control-utilizzando-gmail-in-16-steps-per-bypassare-qualsiasi-sistema-di-sicurezza/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/come-real</span><span class="invisible">izzare-un-command-control-utilizzando-gmail-in-16-steps-per-bypassare-qualsiasi-sistema-di-sicurezza/</span></a></p>
Redhotcyber<p>Le estensioni di Google Chrome possono accedere alle tue Password</p><p>I <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="tag">#<span>ricercatori</span></a> dell’Università del Wisconsin-Madison hanno scoperto una <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="tag">#<span>vulnerabilità</span></a> nello store delle estensioni di <a href="https://mastodon.bida.im/tags/Google" class="mention hashtag" rel="tag">#<span>Google</span></a> <a href="https://mastodon.bida.im/tags/Chrome" class="mention hashtag" rel="tag">#<span>Chrome</span></a>. Un’estensione sperimentale sviluppata dal team è riuscita a rubare le <a href="https://mastodon.bida.im/tags/password" class="mention hashtag" rel="tag">#<span>password</span></a> degli <a href="https://mastodon.bida.im/tags/utenti" class="mention hashtag" rel="tag">#<span>utenti</span></a> direttamente dal <a href="https://mastodon.bida.im/tags/codice" class="mention hashtag" rel="tag">#<span>codice</span></a> <a href="https://mastodon.bida.im/tags/sorgente" class="mention hashtag" rel="tag">#<span>sorgente</span></a> delle pagine <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a>.</p><p>Condividi questo post se hai trovato la news interessante.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/le-estensioni-di-google-chrome-possono-accedere-alle-tue-password/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/le-estens</span><span class="invisible">ioni-di-google-chrome-possono-accedere-alle-tue-password/</span></a></p>
Redhotcyber<p>Il cybercrime ora può falsificare il BIOS e i firmware MSI con le chiavi trapelate online</p><p>I laptop <a href="https://mastodon.bida.im/tags/MSI" class="mention hashtag" rel="tag">#<span>MSI</span></a> potrebbero diventare una facile preda per i <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> dopo che il gruppo <a href="https://mastodon.bida.im/tags/MoneyMessage" class="mention hashtag" rel="tag">#<span>MoneyMessage</span></a> ha pubblicato online le <a href="https://mastodon.bida.im/tags/chiavi" class="mention hashtag" rel="tag">#<span>chiavi</span></a> <a href="https://mastodon.bida.im/tags/private" class="mention hashtag" rel="tag">#<span>private</span></a> di firma del codice per i prodotti dell’azienda.</p><p>La perdita è stata il risultato di un hack alla MSI che Money Message ha annunciato il mese scorso. I criminali informatici affermano di aver fatto irruzione nella <a href="https://mastodon.bida.im/tags/rete" class="mention hashtag" rel="tag">#<span>rete</span></a> di MSI e di aver rubato i file <a href="https://mastodon.bida.im/tags/riservati" class="mention hashtag" rel="tag">#<span>riservati</span></a> dell’azienda, incluso il presunto <a href="https://mastodon.bida.im/tags/codice" class="mention hashtag" rel="tag">#<span>codice</span></a> <a href="https://mastodon.bida.im/tags/sorgente" class="mention hashtag" rel="tag">#<span>sorgente</span></a>. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dGG33XvS" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">lnkd.in/dGG33XvS</span><span class="invisible"></span></a></p>
Redhotcyber<p>Un esercito di bot può zittire qualsiasi profilo Twitter sulla base dell’algoritmo di “negative feedback loops”</p><p>A seguito della recente fuga di parte del <a href="https://mastodon.bida.im/tags/codice" class="mention hashtag" rel="tag">#<span>codice</span></a> <a href="https://mastodon.bida.im/tags/sorgente" class="mention hashtag" rel="tag">#<span>sorgente</span></a> di <a href="https://mastodon.bida.im/tags/Twitter" class="mention hashtag" rel="tag">#<span>Twitter</span></a>, Elon Musk ha deciso di non attendere molto e di pubblicare il codice degli <a href="https://mastodon.bida.im/tags/algoritmi" class="mention hashtag" rel="tag">#<span>algoritmi</span></a> di <a href="https://mastodon.bida.im/tags/raccomandazione" class="mention hashtag" rel="tag">#<span>raccomandazione</span></a> del popolare social network, promesso all’inizio dell’anno. </p><p>Il 31 marzo, il team di sviluppo ha pubblicato un post correlato sul proprio <a href="https://mastodon.bida.im/tags/blog" class="mention hashtag" rel="tag">#<span>blog</span></a>, annunciando “una nuova era di <a href="https://mastodon.bida.im/tags/trasparenza" class="mention hashtag" rel="tag">#<span>trasparenza</span></a> su Twitter”.</p><p>Mentre gli <a href="https://mastodon.bida.im/tags/esperti" class="mention hashtag" rel="tag">#<span>esperti</span></a> di sicurezza di tutto il mondo <a href="https://mastodon.bida.im/tags/esplorano" class="mention hashtag" rel="tag">#<span>esplorano</span></a> questo tesoro digitale, stanno emergendo sempre più fatti nuovi e <a href="https://mastodon.bida.im/tags/interessanti" class="mention hashtag" rel="tag">#<span>interessanti</span></a> sugli <a href="https://mastodon.bida.im/tags/algoritmi" class="mention hashtag" rel="tag">#<span>algoritmi</span></a> di <a href="https://mastodon.bida.im/tags/raccomandazione" class="mention hashtag" rel="tag">#<span>raccomandazione</span></a> di Twitter.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/un-esercito-di-bot-puo-zittire-qualsiasi-profilo-twitter-sulla-base-dellalgoritmo-di-negative-feedback-loops/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/un-eserci</span><span class="invisible">to-di-bot-puo-zittire-qualsiasi-profilo-twitter-sulla-base-dellalgoritmo-di-negative-feedback-loops/</span></a></p>
Redhotcyber<p>CIA e HIVE: nuovo malware trapelato utilizzato per attacchi governativi <br /> <br />Un gruppo o un individuo sconosciuto ha rilasciato una nuova “<a href="https://mastodon.bida.im/tags/backdoor" class="mention hashtag" rel="tag">#<span>backdoor</span></a>” simile a un <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> noto come “<a href="https://mastodon.bida.im/tags/Hive" class="mention hashtag" rel="tag">#<span>Hive</span></a>”, sviluppato dalla <a href="https://mastodon.bida.im/tags/CIA" class="mention hashtag" rel="tag">#<span>CIA</span></a> degli <a href="https://mastodon.bida.im/tags/statiuniti" class="mention hashtag" rel="tag">#<span>statiuniti</span></a>. <br /> <br />Il codice sorgente di Hive è stato reso pubblico dall’organizzazione <a href="https://mastodon.bida.im/tags/WikiLeaks" class="mention hashtag" rel="tag">#<span>WikiLeaks</span></a> nel 2017, il che significa che chiunque abbia conoscenze di <a href="https://mastodon.bida.im/tags/programmazione" class="mention hashtag" rel="tag">#<span>programmazione</span></a> e accesso al <a href="https://mastodon.bida.im/tags/codice" class="mention hashtag" rel="tag">#<span>codice</span></a> <a href="https://mastodon.bida.im/tags/sorgente" class="mention hashtag" rel="tag">#<span>sorgente</span></a> può creare una propria versione del <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a>. </p><p> <br />A cura di Agostino Pellegrino. <br /> <br /><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a> <br /> <br /> <a href="https://www.redhotcyber.com/post/cia-e-hive-nuovo-malware-trapelato-utilizzato-per-attacchi-governativi/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/cia-e-hiv</span><span class="invisible">e-nuovo-malware-trapelato-utilizzato-per-attacchi-governativi/</span></a></p>
gualdo :privacypride: :cc:<p>Art of Code è un’iniziativa del Computer History Museum <a href="https://mastodon.uno/tags/CHM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CHM</span></a> dedicata alla storia di alcune pietre miliari della storia del <a href="https://mastodon.uno/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a></p><p><a href="https://mastodon.uno/tags/adobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adobe</span></a> <a href="https://mastodon.uno/tags/postscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postscript</span></a>, <a href="https://mastodon.uno/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://mastodon.uno/tags/lisa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lisa</span></a>, e il file system dello <a href="https://mastodon.uno/tags/xerox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xerox</span></a> <a href="https://mastodon.uno/tags/parc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parc</span></a> sono i protagonisti.</p><p>Il CHM ne presenta la storia e ne pubblica il <a href="https://mastodon.uno/tags/codice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codice</span></a> <a href="https://mastodon.uno/tags/sorgente" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sorgente</span></a> (benché non <a href="https://mastodon.uno/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a>).</p><p>Le info si trovano qui: <a href="https://computerhistory.org/art-of-code/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">computerhistory.org/art-of-cod</span><span class="invisible">e/</span></a></p><p><a href="https://mastodon.uno/tags/source" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>source</span></a> <a href="https://mastodon.uno/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://mastodon.uno/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a> <a href="https://mastodon.uno/tags/sourcecode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sourcecode</span></a></p>
informapirata ⁂ :privacypride:<p>Dopo la vendita dei ritratti <a href="https://mastodon.uno/tags/CryptoPunks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryptoPunks</span></a> in un'asta di Christie's, un'altra tappa fondamentale di <a href="https://mastodon.uno/tags/NFT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NFT</span></a> sulla strada del collezionismo intangibile: il codice <a href="https://mastodon.uno/tags/sorgente" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sorgente</span></a> del World Wide Web sarà messo in vendita direttamente da Tim <a href="https://mastodon.uno/tags/BernersLee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BernersLee</span></a>, sotto forma di <a href="https://mastodon.uno/tags/NonFungibleToken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonFungibleToken</span></a>.<br>(grazie a Funny Loop per la segnalazione) <a href="https://techcrunch.com/2021/05/11/cryptopunks-nft-bundle-goes-for-17-million-in-christies-auction/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2021/05/11/cryp</span><span class="invisible">topunks-nft-bundle-goes-for-17-million-in-christies-auction/</span></a></p>