logo
 
  1. IT-Security >
  2. Cyber Security Nachrichten >
  3. Accidentally found someones 'famous' personal data on the internet, how should I let them know?


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Accidentally found someones 'famous' personal data on the internet, how should I let them know?

IT Security Nachrichten vom | Direktlink: reddit.com Nachrichten Bewertung

I mean, it's someone from the IT industry but this person is quite known and accidentally i found personal email and 2 phone numbers, also personal, and I found it by search engine which links things from LinkedIn, but on LinkedIn i couldnt find this information and why would someone post personal number on LinkedIn. Should I call/write an enail that I found it and this person should check their privacy everywhere? Please help

submitted by /u/aloveraeyoghurtdrink
[link] [comments]...

Externe Webseite mit kompletten Inhalt öffnen

➤ Ähnliche Beiträge

  • 1.

    How to Unseen Someone’s Instagram Story After Viewing it

    vom 230.81 Punkte ic_school_black_18dp
    Let’s consider the case, wherein you want to watch someone’s story but not want to get listed in the story viewer’s list. For this, we have already explained the best ways to watch someone’s Instagram Story without them knowing. In another case
  • 2.

    How to Unseen Someone’s Instagram Story After Viewing it

    vom 230.81 Punkte ic_school_black_18dp
    Let’s consider the case, wherein you want to watch someone’s story but not want to get listed in the story viewer’s list. For this, we have already explained the best ways to watch someone’s Instagram Story without them knowing. In another case
  • 3.

    P4wnP1 A.L.O.A. - Framework Which Turns A Rapsberry Pi Zero W Into A Flexible, Low-Cost Platform For Pentesting, Red Teaming And Physical Engagements

    vom 229.17 Punkte ic_school_black_18dp
    P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".0. How to installThe latest image could be fo
  • 4.

    Deobfuscating/REversing Remcos - AutoIt, Shellcode, and RunPE

    vom 169.98 Punkte ic_school_black_18dp
    Remcos is a robust RAT actively being used in the wild. This multi-staged/evasive RAT provides powerful functionality to an attacker. Each stage is written in a different language: AutoIt -> Shellcode -> C++. I wanted to explore both the evasiven
  • 5.

    MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router

    vom 168.39 Punkte ic_school_black_18dp
    In early 2019, we received a bug submission from a new researcher affecting the TP-Link TL-WR841N Router. While this vulnerability is still in disclosure phase, we would like to share lessons learned when we were vetting this submission. TL-WR841N
  • 6.

    ConstraintLayout 2.0.0 beta 2

    vom 163.81 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 2. It’s available from the google maven repository: dependencies {    implementation 'com.android.support.constraint:constraint-layout:2.0.0-beta2'} or if using the AndroidX packages: dependencies {    implementation 'androidx.con
  • 7.

    Would Facebook and Cambridge Analytica be in Breach of GDPR?

    vom 157.64 Punkte ic_school_black_18dp
    The Cambridge Analytica (CA) and Facebook accusations over the U.S. 2016 presidential election campaign, and to a lesser extent between CA and the UK's Brexit VoteLeave campaign, are -- if proven true -- morally reprehensible. It is not immediately cle
  • 8.

    TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers

    vom 148.56 Punkte ic_school_black_18dp
    Original release date: October 3, 2018Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed serv
  • 9.

    MindShaRE: Hardware Reversing with the Belkin Surf N300 Router

    vom 135.25 Punkte ic_school_black_18dp
    In late 2018, the ZDI received a collection of submissions affecting a version of SuperTask! RTOS that runs on a collection of devices. These bug reports were submitted by two new researchers to the program: Josep Pi Rodriguez and Pedro Guilln Nuez. One o
  • 10.

    DirectX to the Kernel

    vom 134.77 Punkte ic_school_black_18dp
    The operating system kernel is the final goal for every great exploit chain. You can look at the entries in the Zero Day Initiative (ZDI) Pwn2Own contests over the years to see that process at work. The Windows kernel has been subject to many points of
  • 11.

    DxChain — Build A New Data Security Ecosystem

    vom 132.61 Punkte ic_school_black_18dp
    On Nov.30th, China’s influential media Jinse Finance has published an exclusive review about DxChain, talking about data security and how DxChain build a new data security ecosystem. Please refer down below for this interview. ​ At the age of the
  • 12.

    MMD-0031-2015 - What is NetWire (multi platform) RAT?

    vom 124.29 Punkte ic_school_black_18dp
    The backgroundIt has been a talk internally in our group about a RAT (Remote Access Trojans) that is commonly found and used by crooks called "NetWire RAT". The talks is about why this RAT was commonly found during the carding, POS or etc hack cases rel

Kommentiere zu Accidentally found someones 'famous' personal data on the internet, how should I let them know?