Bluetooth BIAS attack; new way to hack into any laptop, smartphone or IoT device supporting Bluetooth

Due to the current pandemic situation around the globe, the cyberattackers have taken advantage of the lockdown and breaching data of big companies and selling them. Researchers have now discovered a new vulnerability in the Bluetooth wireless protocol which is used to interconnect devices and share data. Hackers have multiple ways to attack your systems and steal the data present but have you ever thought of hackers using Bluetooth attacks to breach into your system and steal data? Continue reading

Short film: Rats and Slaves | Buying Hacked Computers | Subtitled

This shit is so easy now even the script kiddies are selling them to anyone…. stay on ya shit techies! Be sure to turn on subtitles because this is in Dutch….

While you’re reading this, a worldwide and active market is working on remotely gaining access to computers. Most people consider themselves safe from hackers by using antivirus software. However, it turns out to be child’s play to hack into your computer. Someone might be watching you through your webcam in your living room at this very moment. Continue reading

2 Ways Your SIM Card Can Be Hacked (And How to Protect It)

Good info here….

You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe. Continue reading

Your Android Phone Can Get Hacked Just By Playing This Video

Boy the malware creators are gettin good… but this why you don’t just open videos and crap people send you.. EVEN people you know cuz they don’t know shit about tech

Are you using an Android device?
Beware! You should be more careful while playing a video on your smartphone—downloaded anywhere from the Internet or received through email.
That’s because, a specially crafted innocuous-looking video file can compromise your Android smartphone—thanks to a critical remote code execution vulnerability that affects over 1 billion devices running Android OS between version 7.0 and 9.0 (Nougat, Oreo, or Pie). Continue reading

Update Your Logitech Wireless Dongle Right Now

I’m a lil late with this story since it hit while I was OOT

A few years ago, hackers discovered that they could remotely take control of a PC by exploiting a vulnerability in Logitech wireless dongles. According to The Verge, dongles that Logitech is shipping today are still vulnerable to the same remote access hack—dubbed “MouseJack.”—a list that includes the manufacturer’s Unifying Receiver and G900 wireless gaming mouse. Continue reading

Equifax data breach settlement: How to get credit monitoring, a check, or credit freeze

Hilariously, I do such a good job online that I am not even eligible lololololol

See for yourself

Equifax has announced that their massive data breach in 2017 exposed the personal information of 147 million people. Now, the company has agreed to a $700 million settlement. Continue reading

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies – Bloomberg

China is not to be trusted…. but you knew that already….

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Continue reading

Facebook Can’t Reset All Breach Victims’ Access Tokens

Shout to FB and ther ‘security’ smmfh

Warning: Attackers behind the recently revealed Facebook mega-breach may still be able to access victims’ accounts at third-party web services and mobile apps, and Facebook has offered no timeline for when that might change. Continue reading