LinkedIn – Security – Two Factor Authentication – Verification Method – Phone

Background Please continue to follow Best Practices as much as possible with your online Accounts. Online Accounts inclusive of Banking, Email, Social Media. Linked In Security Relative to Facebook there is not a lot of miscreants on LinkedIn. Please use that grace wisely. Two Factor Authentication If you do not have Two Factor Authentication setup, … Continue reading LinkedIn – Security – Two Factor Authentication – Verification Method – Phone

Log4j – Security Vulnerability – Detection Tool – WhiteSource – Windows Binary

Background Let us quickly try out another of the freely available tools for detecting the Log4J security vulnerabilities.   Lineage Log4j – Security Vulnerability – Detection Tools Link Log4j – Security Vulnerability – Detection Tool – CERT ( Community Emergency Response Team ) – PowerShell Script Link WhiteSource Our Story Here is a beautiful story: … Continue reading Log4j – Security Vulnerability – Detection Tool – WhiteSource – Windows Binary

Log4j – Security Vulnerability – Detection Tool – CERT ( Community Emergency Response Team ) – PowerShell Script

Background Library ( Jar ) Files Patched / Apache / v2.17.1 Link Package File Type File Name Link Apache Log4j 2 binary ( tar.gz ) apache-log4j-2.17.1-bin.tar.gz Link Apache Log4j 2 binary ( zip ) apache-log4j-2.17.1-bin.zip Link Extract Jar File Usage Purpose JAR File Name Syntax JAR File Name ( Version Specific ) Log4J API File Provides … Continue reading Log4j – Security Vulnerability – Detection Tool – CERT ( Community Emergency Response Team ) – PowerShell Script

Log4j – Security Vulnerability – Detection Tools

Background Thankfully, just about everyone and their mama have a tool for detecting software stacks that are susceptible to Apache Log4J's Log4Shell Security Vulnerability.   Tools David Strom, InfoWorld Here is a list pulled together by David Strom @ Infoworld Link Company Product Platform Product Link Explanation Qualys Qualys Web Application Scanning Cloud Link Link … Continue reading Log4j – Security Vulnerability – Detection Tools

Apache/Log4j – Log4Shell:- Alibaba Group Holding – Computing Services Unit

Background There are so many angles to the recently disclosed Apache Foundation Log4J's Security Vulnerabilities. As a footnote, this post covers the Log4Shell vulnerability. A month ago, 2021-November-24th, Chen Zhoujun from Alibaba's Cloud Security Team discovered the bug. Via email, Apache Foundation Log4J was quickly notified.   Stories South China Morning Post Apache Log4j bug: … Continue reading Apache/Log4j – Log4Shell:- Alibaba Group Holding – Computing Services Unit

Google:- Project Zero Versus NSO Group

Stories Wired Lily Hay Newman Hackers Can Break Into an iPhone Just by Sending a Text Link When you think about how hackers could break into your smartphone, you probably imagine it would start with clicking a malicious link in a text, downloading a fraudulent app, or some other way you accidentally let them in. … Continue reading Google:- Project Zero Versus NSO Group

Facebook:- Facebook parent company, metaverse, bans private spy firms from Facebook, Instagram

Background It is really sad to the extent that journalists, human rights activists & advocates, political dissidents, and private citizens and their families are the subject of intrusion by governments, corporations, and organizations. Stories Daily Beast 2021-December-16th Reports From Meta, Citizen Lab Reveal Dark World of Facebook Cyber Spies-for-Hire Adam Rawnsley Link Researchers at Facebook … Continue reading Facebook:- Facebook parent company, metaverse, bans private spy firms from Facebook, Instagram

BBC:- Apple Versus NSO Group

  Stories BBC:- Apple sues Israeli spyware firm NSO Group Link Apple is suing Israeli spyware firm NSO Group and its parent company for allegedly targeting iPhone users with a hacking tool. NSO's Pegasus software can infect both iPhones and Android devices, allowing operators to extract messages, photos, and emails, record calls, and secretly activate … Continue reading BBC:- Apple Versus NSO Group