Remove Your Personal Information from the Internet for Free

Remove your personal information from data brokers and online accounts for free using these two sites.

These two sites have links to most of the places to opt out of data brokers and several online services (banking, retail, credit cards, etc).
Several services will remove your personal information for a fee, which is a time saver, but you can do it yourself for free. Continue reading

2 Ways Your SIM Card Can Be Hacked (And How to Protect It)

Good info here….

You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe. Continue reading

Ransomware Attack Caused Power Outages in the Biggest South African City

Ransomware is no joke… stuff like this shows how nepotism and ish put people in jobs like cybersecurity they ain’t qualified for an everyone suffers…

Yesterday, some residents of Johannesburg, the largest city in South Africa, were left without electricity after the city’s power company got attacked by a ransomware virus.
City Power, the company responsible for powering South Africa’s financial capital Johannesburg, confirmed Thursday on Twitter that it had been hit by a Ransomware virus that had encrypted all of its databases, applications, and network. Continue reading

Malwarebytes releases AdwCleaner 7.4 featuring preinstalled software cleaning

For all the folks that buy pre-built PCs with bundled crap software lol

Malwarebytes, maker of the security solution of the same name, released a new version of the company’s AdwCleaner program this week. AdwCleaner is a standalone free program designed to detect and remove adware and other unwanted software programs from Windows machines. Continue reading

Your Android Phone Can Get Hacked Just By Playing This Video

Boy the malware creators are gettin good… but this why you don’t just open videos and crap people send you.. EVEN people you know cuz they don’t know shit about tech

Are you using an Android device?
Beware! You should be more careful while playing a video on your smartphone—downloaded anywhere from the Internet or received through email.
That’s because, a specially crafted innocuous-looking video file can compromise your Android smartphone—thanks to a critical remote code execution vulnerability that affects over 1 billion devices running Android OS between version 7.0 and 9.0 (Nougat, Oreo, or Pie). Continue reading

Update Your Logitech Wireless Dongle Right Now

I’m a lil late with this story since it hit while I was OOT

A few years ago, hackers discovered that they could remotely take control of a PC by exploiting a vulnerability in Logitech wireless dongles. According to The Verge, dongles that Logitech is shipping today are still vulnerable to the same remote access hack—dubbed “MouseJack.”—a list that includes the manufacturer’s Unifying Receiver and G900 wireless gaming mouse. Continue reading

Equifax data breach settlement: How to get credit monitoring, a check, or credit freeze

Hilariously, I do such a good job online that I am not even eligible lololololol

See for yourself

Equifax has announced that their massive data breach in 2017 exposed the personal information of 147 million people. Now, the company has agreed to a $700 million settlement. Continue reading

Watch Out! Microsoft Spotted Spike in Astaroth Fileless Malware Attacks

Don’t click questionable links…. hell just get a Chromebook lol

Security researchers at Microsoft have released details of a new widespread campaign distributing an infamous piece of fileless malware that was primarily being found targeting European and Brazilian users earlier this year.
Dubbed Astaroth, the malware trojan has been making the rounds since at least 2017 and designed to steal users’ sensitive information like their credentials, keystrokes, and other data, without dropping any executable file on the disk or installing any software on the victim’s machine. Continue reading