#cyberterror
Explore tagged Tumblr posts
Text
USB-C cable CT scan reveals: O.MG pen testing cable contains a hidden antenna and another die embedded in the microcontroller | Tom's Hardware
Image: Lumafield https://www.tomshardware.com/tech-industry/cyber-security/o-mg-usb-c-cable-ct-scan-reveals-sinister-active-electronics-contains-a-hidden-antenna-and-another-die-embedded-in-the-microcontroller Wow. Just wow. Major potential security breeches hidden in a regular USB-C charging cable. But see for yourself.
0 notes
Text
#beirut#lebanon#hezbollah#hamas#gaza#palestine#motorola#pagers#bds#zionism#cyberterrorism#cyberattack#israel is a terrorist state
4K notes
·
View notes
Text
I deserve financial compensation for ao3 logging me out mid fic and changing my dark mode site skin to the default, blasting my eyes with the full unadulterated power of my screen light at 3:19am
#ao3#jumpscare#cyberterrorism#ao3 down#its giving that one post about someones girlfriend changing their discord to light mode mid convo#fanfiction
142 notes
·
View notes
Text
article link, posted yesterday (feb 22)
11 notes
·
View notes
Photo
VIRIS - A Quick .//Overview & Trivia//. Sheet!
#introducing my oc#viris#:)#overview sheet#trivia#fun facts#jak and daxter#jak 2 renegade#KG-E#krimzon guard#elite#cyborg#reference sheet#sorta#sparky boi overview#looks intimidating but is really just a tsundere waiting for their sempai (Vin) to notice them#you know#before summarily executing him on behalf of the Praxis Regime for treason and cyberterrorism that is#original character
14 notes
·
View notes
Note
✨🧡🌙SEND THIS TO OTHER BLOGGERS YOU THINK ARE WONDERFUL. KEEP THE GAME GOING ✨🧡
<props self against door> <the doors open to the mrt. i lose my balance and also my long-suffering ezlink card>
hey hello i'm off-anon for once! ,, ask game bait + i do genuinely think you're wonderful + still not over how we met. so insane. on the topic of how you're so very cool i am still constantly in awe of your writing,, (<- read ylsgib almost daily for a week after you released it ngl) (<- every time you drop hcs i go !!!) (<- your thoughts are very interesting i enjoy reading them immensely. thank you for sharing them)
anyways! glad we're mutuals <33 (weird coincidences and all)
NOT THE EZLINK CARD [Insert crying emoji here idk Im on desktop with my gp revision package open in the next tab] thank you thank you omg. you do not know the sound i make when i check my phone and youve dropped like a whole entire essay in my notes like i think the one you left on blue is the longest comment ive ever gotten in my life on any piece of writing ever and . also like genuinely youre such a talented artist and you're so sweet????? its such a privilege to be ur mutual D: also funny story. when i was in the absolute trenches of px11 solitary confinement derangement i like plotted/first drafted a novel [i think ive talked abt it on here before?] that was like partially set in an abandoned forum dedicated to an unfinished obscure webseries [insert more crying emojis] and the main character of the novel is this girl who's like absolutely dead sure she's the last fan of this thing ever to exist [insert self insert sirens, insert even more crying emoji] until she gets jumpscared by a guy who also thought he was the last fan of the thing ever and they immediately start beefing with each other over their favourite characters lol. so this is all to say that when you showed up in my notes for the first time i was like Holy shit. This is my YN moment. This is my blorbo from my novel moment. so this is to say that thank you sm for the ask <3
#idk i always feel a bit embarrassed talking about flood on here#but i think i have to say that it is a blorbo moment sans scifi cyberterrorism
3 notes
·
View notes
Text
Sensitive Data Leaked After Ransomware Hack Targets Telecom Namibia
Namibia's state-owned telecommunications company, Telecom Namibia, has fallen victim to a devastating ransomware attack, resulting in the leak of sensitive customer data, including information reportedly tied to high-ranking government officials.
Hackers Release Data After Ransom Refusal
The attack was carried out by a cybercriminal group known as Hunters International, who released the stolen data after Telecom Namibia refused to negotiate or pay a ransom. The company announced it is conducting a thorough investigation into the breach to determine how its system was compromised.
In a statement, Telecom Namibia’s Chief Executive Stanley Shanapinda revealed that the leaked data includes personal identification details, addresses, and banking information. The breach, which reportedly affects nearly 500,000 records, has raised concerns about the security of personal and financial data across various sectors, including ministries, senior government officials, and corporate clients.
Government Condemns the Cyberattack
Outgoing President Nangolo Mbumba strongly condemned the attack, labeling cybersecurity as a critical national security issue. His spokesperson, Alfredo Hengari, stated that the matter must be addressed with "the urgency it deserves."
Local media reported that the hackers uploaded the stolen data onto the dark web after the company declined their ransom demands. In his response, Shanapinda emphasized that the company would not engage with cybercriminals, calling them “cyber-terrorists.”
“We know the sums they’re asking for are exorbitant and unaffordable, so there’s no reason to even consider discussing it. And even if you pay a ransom, there’s no guarantee the information won��t still be leaked,” Shanapinda stated.
Customer and Public Advisory
Telecom Namibia is working closely with security experts and law enforcement to contain the situation and prevent further exposure. The company has also issued a stern warning against the misuse or sharing of the leaked data.
"We caution that anyone who uses or circulates any personal information that has been leaked will be committing a criminal offence," Shanapinda said.
Customers have been advised to take proactive steps to safeguard their accounts, including changing passwords, avoiding suspicious financial transactions, and remaining vigilant about potential scams.
Growing Threat of Ransomware
Ransomware attacks like this one have become a significant global threat. Such attacks involve malicious software that locks data or devices until a ransom is paid, typically in cryptocurrency to ensure anonymity. Hackers often threaten to leak sensitive data if their demands are not met.
Telecom Namibia’s refusal to pay highlights the risks involved in negotiating with cybercriminals, as paying does not guarantee the protection or recovery of stolen data.
Moving Forward
The incident underscores the importance of robust cybersecurity measures in both the public and private sectors. As Telecom Namibia works to assess the full impact of the breach, it has pledged to strengthen its systems and collaborate with authorities to bring the perpetrators to justice.
For now, the focus remains on minimizing damage, restoring customer trust, and addressing the urgent need for enhanced cybersecurity protocols across the nation.
#Telecom Namibia#Namibia ransomware attack#Cybersecurity breach#Data leak#Sensitive information exposed#Cyberterrorism
1 note
·
View note
Text
Crossing Paths With a Terrorist — When Ignorance Wasn't Bliss
I knew a terrorist once. Well, not a convicted one, but a suspect. Suspect, not of terrorism, but of spreading a hoax. Nevertheless, it was a hoax that brought a city of c.10 million people into chaos for a day. It took months for the police to finally conclude that he had no involvement. I could have told them that on the same day. He was too thick to plot anything. I met him at a French…
0 notes
Text
Tuvimos la oportunidad de charlar de Ciberterrorismo junto al Dr. Abdiel Hernández Mendoza y Adamari Fragoso Torres, Nan.
Agradezco al equipo del Podcast #HorizontesInternacionales de la FES Aragón UNAM por la invitación.
¡No dejen de escucharlo!
https://open.spotify.com/episode/5HKGGOYp2YMOWdmbVvkfdN?si=0oOAHYi4QVutn7zikG_6zw
#podcast#horizontes internacionales#UNAM#FES Aragón#relaciones internacionales#cyber#ciberterrorismo#cyberterrorism
0 notes
Text
0 notes
Text
Hacktivist need to go after Water Asset Management
#Water#Drought#hackers#cyberterrorism#wall street#real estate investing#real estate#investment#weather#climate action
0 notes
Note
Saw your old fan art funny of BEN using a drill to get a cork out of a bottle and that his crimes are cyberterrorism and underage drinking and it made me laugh my ass off because I don't know if you're aware but if BEN had access to the inside of Majora's mask and the in game items in there he would have: Vintage Alcoholic milk in the form of Chateau Romani from the towns milk bar (it's rated E for everyone alcohol back then too)
Wait I forgot about that drawing but that’s actually really funny. I think Ben gets hella pissy cuz he’s eternally 14 but WOULD BE in his 30s if he never died and Jeff’s always poking fun at him for it . Ben likes to pretend everything’s a joke and he never takes shit seriously and is deeply unbothered by his death and seeks no revenge or has no desire to live a normal life but he is fuming. Undeniably so. He just wants to turn 21 and go to a bar and get fucked up but alas
41 notes
·
View notes
Text
Who would win: 6 games' worth of criminal adults specializing in cyberterrorism
Or one teenager and a funky blue boy
426 notes
·
View notes
Text
Almost Human (TV series, 2013-2014) and Detroit: Become Human (video game, 2018) similarities. PART 1
Title similarity.
Both universes are set in the future in the United States. The years are 2048 and 2038.
Humans live in the world of advanced technology that includes androids (synthetics). Androids resemble human beings and are programmed to follow the orders.
Police use militarized androids. Police officers are partnered with them. Police androids assist humans in investigations.
"Flawed" police android model with emotional awareness and free will.
The cop that can't stand androids...
becomes buddies with them.
Detective Valerie Stahl and North. Played by Minka Kelly.
Precinct jerk named Richard P.
Intimate Robot Companions. Sexbot investigation.
A malfunction in the smart home assistance system kills the occupants.
Fictional drugs. Drug use issues.
Cyberterrorism.
Robo fight club.
[PART 2]
#almost human walked so dbh could run#almost human#dbh#detroit become human#bad robot#quantic dream#j.h. wyman#j.j. abrams#david cage#tv shows#games#sci-fi#robots#androids#synthetics#mx-43#john kennex#dorian#valerie stahl#richard paul#dbh connor#dbh hank#dbh markus#dbh north#mijchi
28 notes
·
View notes
Text
First look at Dan Stevens in Netflix's upcoming show 'Zero Day', an urgent drama about misinformation, the presidency, and cyberterrorism
24 notes
·
View notes