Optimus Media
9 subscribers
44 photos
8 videos
2 files
290 links
OptimusMedia.com status reports and news of interest.
Download Telegram
to view and join the conversation
Forwarded from TheStormHasArrived17 (TheStormHasArrived17)
Breaking: Rumble just announced that they acquired Locals, which will allow users to monetize their content.

https://story.rumble.com/rumble-acquires-locals-to-help-build-a-bigger-creator-economy/
On this Telegram channel, we teach you how to escape tyranny by 'big tech' companies like Facebook, Google, Twitter, and Microsoft.

Start your journey to Digital Freedom today in our new Technology Forums where you can learn about the exciting world of Free and Open Source Software (FOSS) and the Linux Operating System -> forums.jeff.pro
Wordfence blog has a sickening article about a new scam going around. BEWARE:

The Attack
An attacker will post a job ad on a job board for a position. We have seen “Data Capturing” as one of the roles, but the roles vary. An interview is conducted. In the cases we’ve seen, it has been done via Skype direct message and there were two attackers who had a conversation with the victim. The first attacker posed as a kind of coordinator and went by “Jennifer Udin”. The second posed as a manager named “Antonio Wheeler”.

The victim gets the job. The “employer” (attacker) congratulates them and says that they will provide all required furniture and office supplies. The attacker then sends the victim a check which they are told to cash, and they’re asked to immediately buy furniture from the attacker’s preferred supplier. In the case we investigated, the amount paid was several thousand US dollars.

The victim’s bank will put a hold on cashing the check until it passes fraud checks. The victim spends the money out of pocket, on the furniture, in a non-refundable way. The victim is out of pocket thousands of dollars. And the “furniture company” is actually the attacker who now has the money.

There are several variations of this attack. The goal is to either get personally identifiable information (PII) from a victim or to get money. In all cases, the scam is based around an employment opportunity and a legitimate company is used as a vehicle for the attacker to scam the victim.

More and How To Avoid This Scam are here:
https://www.wordfence.com/blog/2021/10/psa-widespread-remote-working-scam-underway/
Forwarded from Lone Ranger
Zuck looks so much like Data from Star Trek. I had to Gimp the picture.
Forwarded from Disclose.tv
JUST IN - Facebook shuts down its "facial recognition system" and claims to delete the face scan data gathered from over 1 billion users worldwide.

@disclosetv
Forwarded from Breaking911
U.S. Offers $10M Reward To For Info On ‘DarkSide’ Colonial Pipeline Hackers - https://breaking911.com/u-s-offers-10m-reward-to-for-info-on-darkside-colonial-pipeline-hackers/
Channel photo updated
Forwarded from il Donaldo Trumpo (il Donaldo Trumpo)
I wonder whitehouse...🤔
Forwarded from Reclaim The Net
Forwarded from Reclaim The Net
Modern day "fact checks" = "No, you didn't really hear what you just heard."
Forwarded from ITeach
How to protect yourself from e-mail surveillance.

In the previous post, I talked about how to find out that your email has been read. And now I want to share a Gmail extension called PixelBlock that blocks email tracking attempts used to detect when you open and read emails.

The service automatically blocks all surveillance and notifies you about it. Moreover, the plugin takes care of your privacy and does not store your data. Everything happens right in the browser.

To use it, you just need to install the extension.

#security
Forwarded from RT NEWS
Millions of Robinhood customers’ data up for grabs on hacking forum

Approximately 7 million customers’ personal information recently stolen in a data breach is being sold on a popular hacking marketplace.

The data includes: email addresses for 5 million customers, full names for 2 million more, names, date of birth and zip code for 300 and more extensive information for ten people.

Two days after the data breach, a threat actor named ‘pompompurin’ said they were selling the stolen data for at least five figures — that’s $10,000 or higher.

Subscribe to RT t.me/rtintl
From Wordfence:
GoDaddy announced this morning that they have been breached. Our team took a deep dive into the breach and found that GoDaddy appears to have stored passwords in plaintext, or in a format that could be reversed back into plaintext, which is not an industry best practice.

We confirmed this by signing into a GoDaddy Managed WordPress Hosting Account and verifying that we were able to view our own sFTP password. That means the attacker didn't need to crack the passwords and could likely retrieve them directly.

According to GoDaddy's own SEC filing: "For active customers, sFTP and database usernames and passwords were exposed."

The attacker had access to GoDaddy's systems for over two months before they were discovered.

We have published a detailed post explaining how customers are affected, and what to do. Please pay special attention to our comments regarding your own customer notification obligations, if your site(s) are affected by this.

https://www.wordfence.com/blog/2021/11/godaddy-breach-plaintext-passwords
🔴⚠️ If you use GoDaddy for your domain registration or hosting, you should change your passwords immediately. ⚠️🔴