[ZDNet] Calls to ID social media users is just another Morrison government rush job

The government has escalated its war of words against the social media giants, demanding ID for all users. But it’s a strategy that we already know won’t solve the problem.

Source: Read More (Latest topics for ZDNet in Security)

You might be interested in …

[NCSC-FI News] When “secure” isn’t secure at all: High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops

ESET researchers have discovered and analyzed three vulnerabilities affecting various Lenovo consumer laptop models. The first two of these vulnerabilities – CVE-2021-3971, CVE-2021-3972 – affect UEFI firmware drivers originally meant to be used only during the manufacturing process of Lenovo consumer notebooks Unfortunately, they were mistakenly included also in the production BIOS images without being […]

Read More

[HackerNews] Extremely Critical Log4J Vulnerability Leaves Much of the Internet at Risk

All posts, HackerNews

The Apache Software Foundation has released fixes to contain an actively exploited zero-day vulnerability affecting the widely-used Apache Log4j Java-based logging library that could be weaponized to execute malicious code and allow a complete takeover of vulnerable systems. Tracked as CVE-2021-44228 and by the monikers Log4Shell or LogJam, the issue concerns a case of unauthenticated, remote Source: Read More (The […]

Read More

[SANS ISC] BGP Hijacking of Twitter Prefix by RTComm.ru, (Mon, Mar 28th)

All posts, Sans-ISC

Earlier today, RTComm.ru started to advertise, a prefix used by Twitter. RTComm.ru is a sizeable Russian telecom provider. Russian ISPs have started restricting access to Twitter after Russia’s invasion of Ukraine led to many Twitter posts critical of Russia’s war.  Hijacking a BGP prefix is one way to block access, but it can also be […]

Read More