Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)LI
Posts
0
Comments
17
Joined
2 yr. ago

Permanently Deleted

Jump
  • Depends on what the end goal is. Wire fraud? Sure. Typically a Business Email Compromise will try and compromise the account credentials to use it as a location to send other mass phishing attacks to their contacts, gain access to sensitive information the user had, or laterally move between systems and further compromise the organization. In that case, you would want the message to appear as legitimate as possible to gain access to the highest privileged accounts.

  • While there may be many injustices in our history and the modern age, that does not mean we have to accept them or stand idle while they happen.

    The sentiment stands, and is a reality many will choose to die for.

    Just as you said, a war was fought to defend the freedoms of every man.

  • "Give me your tired, your poor, Your huddled masses yearning to breathe free, The wretched refuse of your teeming shore. Send these, the homeless, tempest-tost to me, I lift my lamp beside the golden door!"

    I find it incredibly un-american to reject those searching for safety and to make a better life. Welcome them, shelter them, and grant them citizenship. That is what this country was founded for; to escape persecution, and to ensure every man their freedom in the pursuit of happiness.

  • A coworker of mine said this once:

    "I wasn't a religious man until I joined IT. If something as evil as a printer exists, then the opposite must as well."

    Printer and Microsoft can be interchangeable.

  • This is not the function of HIPAA exactly. HIPAA is primarily used as a way to regulate the sharing of health information, and provides very specific requirements for the sharing of health information, with many caveats.

    HIPAA specifically targets healthcare providers (covered entities) and the third-parties (Business Associates) which they work with. More specifically, it provides requirements for the sharing and storage of data from a covered entity to a business associate, and establishes liability in the event of a data compromise for either party.

    If the data did not originate from a healthcare provider, likely HIPAA does not apply.

    In this instance, the applications identified as sharing the data are not covered entities or even business associates.