2 Ways Your SIM Card Can Be Hacked (And How to Protect It)

Good info here….

You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe. Continue reading

Your Android Phone Can Get Hacked Just By Playing This Video

Boy the malware creators are gettin good… but this why you don’t just open videos and crap people send you.. EVEN people you know cuz they don’t know shit about tech

Are you using an Android device?
Beware! You should be more careful while playing a video on your smartphone—downloaded anywhere from the Internet or received through email.
That’s because, a specially crafted innocuous-looking video file can compromise your Android smartphone—thanks to a critical remote code execution vulnerability that affects over 1 billion devices running Android OS between version 7.0 and 9.0 (Nougat, Oreo, or Pie). Continue reading

Update Your Logitech Wireless Dongle Right Now

I’m a lil late with this story since it hit while I was OOT

A few years ago, hackers discovered that they could remotely take control of a PC by exploiting a vulnerability in Logitech wireless dongles. According to The Verge, dongles that Logitech is shipping today are still vulnerable to the same remote access hack—dubbed “MouseJack.”—a list that includes the manufacturer’s Unifying Receiver and G900 wireless gaming mouse. Continue reading

Equifax data breach settlement: How to get credit monitoring, a check, or credit freeze

Hilariously, I do such a good job online that I am not even eligible lololololol

See for yourself

Equifax has announced that their massive data breach in 2017 exposed the personal information of 147 million people. Now, the company has agreed to a $700 million settlement. Continue reading

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies – Bloomberg

China is not to be trusted…. but you knew that already….

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Continue reading

Facebook Can’t Reset All Breach Victims’ Access Tokens

Shout to FB and ther ‘security’ smmfh

Warning: Attackers behind the recently revealed Facebook mega-breach may still be able to access victims’ accounts at third-party web services and mobile apps, and Facebook has offered no timeline for when that might change. Continue reading