You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe. Continue reading →
Boy the malware creators are gettin good… but this why you don’t just open videos and crap people send you.. EVEN people you know cuz they don’t know shit about tech
Are you using an Android device?
Beware! You should be more careful while playing a video on your smartphone—downloaded anywhere from the Internet or received through email.
That’s because, a specially crafted innocuous-looking video file can compromise your Android smartphone—thanks to a critical remote code execution vulnerability that affects over 1 billion devices running Android OS between version 7.0 and 9.0 (Nougat, Oreo, or Pie). Continue reading →
I’m a lil late with this story since it hit while I was OOT
A few years ago, hackers discovered that they could remotely take control of a PC by exploiting a vulnerability in Logitech wireless dongles. According to The Verge, dongles that Logitech is shipping today are still vulnerable to the same remote access hack—dubbed “MouseJack.”—a list that includes the manufacturer’s Unifying Receiver and G900 wireless gaming mouse. Continue reading →
The webconference app Zoom secretly installs a web server hackers can use to turn on your camera and start a conference without your knowledge… I posted an earlier article about it Link but those who didn’t peep or want to read, just watch…
China is not to be trusted…. but you knew that already….
In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Continue reading →
Warning: Attackers behind the recently revealed Facebook mega-breach may still be able to access victims’ accounts at third-party web services and mobile apps, and Facebook has offered no timeline for when that might change. Continue reading →
Around 31 terabytes of academic research from 320 universities in the US was stolen by Iranian hackers recently. The data is said to have ended up with IRGC, which has been involved in such activities in the past as well. Continue reading →