The hottest Online Security Substack posts right now

And their main takeaways
Category
Top Technology Topics
Conspirador Norteño 56 implied HN points 24 Jan 25
  1. There are fake follower selling services popping up on social media platforms like Bluesky. These services exploit the platform's growth by creating fake accounts to sell followers, likes, and shares.
  2. A large number of fake accounts have been created quickly and they often share similar biographies, usually in Portuguese. This suggests they are not real users, but rather automated bots.
  3. Buying followers is not a good idea. Most accounts gained through these services have little to no genuine followers and their involvement can harm your social media presence.
OK Doomer 111 implied HN points 16 Dec 24
  1. Data protection often feels like it's entirely your responsibility. You have to keep track of passwords and pay for security services to avoid getting hacked.
  2. Hackers can clone websites and impersonate real companies, making it hard to tell what's safe online. This has become a serious issue that many people don’t realize.
  3. There's a frustrating trend where the emphasis is on personal responsibility for cybersecurity, instead of holding companies and platforms accountable for our safety.
Conspirador Norteño 128 implied HN points 06 Dec 24
  1. Monitoring the Bluesky firehose can help quickly spot fake accounts. By looking for repeated names and profiles, it's easier to identify spam activity.
  2. A large number of spam accounts often share similar biographies. One group had over a thousand accounts with variations of the same few phrases.
  3. Many spam accounts use stolen images as profile pictures. This makes them look less authentic and easier to identify as spam.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Natto Thoughts 39 implied HN points 14 Dec 23
  1. Understanding concepts and tactics associated with disinformation is crucial in countering its harmful effects.
  2. Detecting disinformation and avoiding manipulation involves learning from organizations and individuals who are actively working against it.
  3. Accessing resources such as handbooks, guides, and reports can provide valuable insights and strategies for countering and combating disinformation.
Conspirador Norteño 44 implied HN points 01 Mar 24
  1. The Facebook account 'Barndominium Gallery' is posting AI-generated images of houses to engage users, many of whom believe the images are real
  2. The AI-generated images of 'barndominiums' contain synthetic artifacts, like unrealistic fire placements and impossible elements, that reveal their inauthenticity
  3. The 'Barndominium Gallery' account operator solicits personal information from users in the comments, risking exposure to potential privacy threats or fraud
Conspirador Norteño 68 implied HN points 22 May 23
  1. A network of spam accounts flooded Twitter with repetitive replies containing login credentials for a suspicious website.
  2. Over 13,000 active accounts in this spam network were created in March or April 2023 and only post replies.
  3. Spam campaign targeted various accounts including Reuters, Elon Musk, and news organizations, with a high percentage of replies in English.
Thái | Hacker | Kỹ sư tin tặc 79 implied HN points 27 Aug 21
  1. Encrypting blog traffic with HTTPS can make it difficult for someone to track or determine a blogger's location.
  2. Be cautious about clicking on links in comments to prevent revealing your IP address.
  3. Taking precautions like using incognito mode, avoiding excessive self-visits to your blog, and using secure DNS settings can help protect your identity and location online.
ciamweekly 1 HN point 11 Mar 24
  1. B2C, B2B, and B2B2E applications require different approaches to customer identity and access management (CIAM) systems.
  2. B2C applications aim at end consumers, requiring smooth registration and authentication processes due to user choice.
  3. B2B and B2B2E applications cater to business and employee users, with focus on organization structures, payment collection, and different authentication needs.
ciamweekly 0 implied HN points 11 Nov 24
  1. Some accounts don't need strong security, so using email or phone for login is enough. It's easy for users who only want to use something once or rarely.
  2. Many people prefer quick login methods, like magic links or one-time codes, instead of complicated passwords. This reduces hassle and makes using apps simpler.
  3. Removing barriers to access can benefit both users and companies. When login is easier, users are more likely to engage with the app.
The SHIPTO.ME Blog 0 implied HN points 21 Feb 23
  1. Data privacy is crucial in the digital age to prevent fraud, data selling, and other harmful activities.
  2. Data breaches can severely damage a company's reputation, lead to fines, and even pose national security risks.
  3. Preventative measures like securing personal information, using strong passwords, and protecting devices can help minimize the risk of cybercrimes.
Rob’s Notes 0 implied HN points 27 Nov 23
  1. Beware of deepfake scams, especially those using 'celeb-bait' to lure victims into clicking or providing personal information.
  2. Platforms like Facebook and Google are working to remove deceptive ads and scams, but collaboration is needed to combat evolving tactics used by scammers.
  3. Avoid giving out personal information to suspicious websites or ads to protect yourself from potential financial scams and harassment.