• 4 Posts
  • 666 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle
    • To exploit this across the internet or LAN, a miscreant needs to reach your CUPS service on UDP port 631. Hopefully none of you have that facing the public internet. The miscreant also has to wait for you to start a print job.
    • If port 631 isn’t directly reachable, an attacker may be able to spoof zeroconf, mDNS, or DNS-SD advertisements to achieve exploitation on a LAN. Details of that path will be disclosed later, we’re promised.

    So don’t expose 631 to the internet (why would you?) and know who’s on your network. Be careful printing things on an untrusted network.

    It’s serious, but seems like a wonky attack vector for most.










  • Telorand@reddthat.comtoLinux@lemmy.mlParental controls?
    link
    fedilink
    arrow-up
    15
    arrow-down
    3
    ·
    5 days ago

    It’s not really random internet strangers’ place to judge someone’s parenting choices. We don’t know their overall parenting style, the personality of the child, what lessons they may be trying to teach, etc. The only thing we know for certain is that they want to use parental controls, perhaps to ensure they stay safe as they learn how to use the internet responsibly while also having a level of autonomy.

    That’s not helicopter parenting, that’s just prudent.






  • The infected apps are at the end.

    The researchers found Necro in two Google Play apps. One was Wuta Camera, an app with 10 million downloads to date. Wuta Camera versions 6.3.2.148 through 6.3.6.148 contained the malicious SDK that infects apps. The app has since been updated to remove the malicious component. A separate app with roughly 1 million downloads—known as Max Browser—was also infected. That app is no longer available in Google Play.

    The researchers also found Necro infecting a variety of Android apps available in alternative marketplaces. Those apps typically billed themselves as modified versions of legitimate apps such as Spotify, Minecraft, WhatsApp, Stumble Guys, Car Parking Multiplayer, and Melon Sandbox.

    People who are concerned they may be infected by Necro should check their devices for the presence of indicators of compromise listed at the end of this writeup.



  • They bargained with the University I used to work for to get us things like:

    • 37.5hr work weeks and still receiving full-time benefits and pay
    • Good vacation accrual rates
    • A guaranteed effort to move union employees into other open positions if theirs is cut
    • Legal help/advice/action when Directors, etc. overstepped our rights (which I personally had to make use of)
    • Paid by the hour. No salary/after-hours bullshit.



  • I’m not sure I fully agree with you, partly because she’s not talking about OSS alone. Let’s look at a recent but important example.

    Yubikeys manufactured before firmware version 5.7 (before May 2024), are vulnerable to a specific type of attack that is not novel, due to a faulty IC via its code. It’s something that should have been caught during QA. Who is to blame?

    Yubikey didn’t make the faulty IC, so obviously the IC maker should bear at least a good chunk of it, but I think it’s Yubikey’s responsibility to verify their work, especially since they’re the ones making the ultimate promise of cryptographic suitability that businesses and governments rely upon.

    I don’t know if it’s right to call companies like this “villains,” but I think “lazy or lax” might be appropriate. Additionally, I like the idea of calling cybercrime groups funny names.