Bluetooth BIAS attack; new way to hack into any laptop, smartphone or IoT device supporting Bluetooth

Due to the current pandemic situation around the globe, the cyberattackers have taken advantage of the lockdown and breaching data of big companies and selling them. Researchers have now discovered a new vulnerability in the Bluetooth wireless protocol which is used to interconnect devices and share data. Hackers have multiple ways to attack your systems and steal the data present but have you ever thought of hackers using Bluetooth attacks to breach into your system and steal data? Continue reading

How to record a phone camera stream in OBS

I’ve been playing with OBS a lot this week on FB, this is a nice addition to it..

Laptops come with a webcam but it’s only very expensive ones that have a good camera. Most will make do with a mediocre device. MacBooks have a better webcam but if you need a good, high quality camera, you will probably have to buy one. The alternative is to use your phone. Phones sell themselves on their camera quality so it’s a good alternative. If you use OBS to record your screen, and need to include the camera feed, consider using your phone for the job. Here’s how you can record your phone’s camera stream in OBS. Continue reading

Short film: Rats and Slaves | Buying Hacked Computers | Subtitled

This shit is so easy now even the script kiddies are selling them to anyone…. stay on ya shit techies! Be sure to turn on subtitles because this is in Dutch….

While you’re reading this, a worldwide and active market is working on remotely gaining access to computers. Most people consider themselves safe from hackers by using antivirus software. However, it turns out to be child’s play to hack into your computer. Someone might be watching you through your webcam in your living room at this very moment. Continue reading

How to share a keyboard and mouse across computers

Synergy is a popular app that lets you share a keyboard and mouse across multiple computers. It’s paid but the price tag is likely worth it for most people considering what the app does. That said, if you want a simple and free way to share a keyboard and mouse across computers, give Barriers a try. Continue reading

Apple’s Mac computers now outpace Windows in malware and virus

This is because they know Mac users are trusting and generally don’t know jack about computers…

Think your Apple product is safe from malware? That only people using Windows machines have to take precautions? According to cybersecurity software company Malwarebytes’ latest State of Malware report, it’s time to think again. The amount of malware on Macs is outpacing PCs for the first time ever, and your complacency could be your worst enemy. Continue reading

Jellyfin is an open source alternative for Plex, and here’s how to setup a server on Windows

I may check this out myself because Emby & Plex were OK but I like options…

When you install a media server program on your computer, it becomes your host server. You can connect to it from your phone and stream the media that’s stored on your computer’s hard drive. Think of it like YouTube or Spotify, but your computer is the server and the content that is available is based on the media files on the computer. Continue reading

How to See if Zoom Is Running a Secret Web Server on Your Mac (and Remove It)

Wow…a Mac app that acts like a virus lol Who’da thunk it… I kid I kid I like teasing the Cult of Apple folks….

Zoom, a popular video-conferencing application, is in hot water today. The Mac version runs a secret web server in the background—even after you uninstall it!—that can be used to reinstall Zoom and even turn on your video camera.

If you’re wondering whether you’re affected—maybe you’re not sure if someone has ever installed Zoom on your Mac and then uninstalled it—here’s how to check. Continue reading

Please, for the Love of God, Make Sure You Delete Things Properly

Good info here….

Your personal data—be it financial spreadsheets or web searches—is not something you want to be leaving behind for other people to find, and totally wiping your activity off devices or the web takes a few more steps than you might have realized. Don’t worry though, as we’re going to walk you through the process. Continue reading