📃 Europe’s largest known illegal IPTV operation dismantled by police
By Waqas
Massive crackdown on illegal IPTV services across Europe: Europol assists Dutch authorities in taking down a major network.
This is a post from HackRead.com Read the original post: Europe’s largest known illegal IPTV operation dismantled by police
𝐓𝐨𝐩 𝐂𝐡𝐚𝐧𝐧𝐞𝐥𝐬 𝐎𝐧 𝐓𝐞𝐥𝐞𝐠𝐫𝐚𝐦
▬▬▬▬▬▬▬▬▬▬▬▬▬
👨💻 HACKING & TECH 👨💻
▬▬▬▬▬▬▬▬▬▬▬▬▬
🧑💻 @INSTAGRAM_FOLLOWERS_LOW_PRICE
🧑💻 @Smartesthackers
👨💻 @silentspyder
👨💻 @Deepwebcarding
👨💻 @Blackhat_001
🧑💻 @leakers_Squad
🧑💻 @BIackHat_King
👨💻 @Udemyallcourse
👨💻 @wedream11official
🧑💻 @cyberhaxx
🧑💻 @hacker_zone_61
🧑💻 @JOINPLSRECOVER
👨💻 @black_hat_hacker9
👨💻 @envato_elementsforfree
🧑💻 @technofreakworld
🧑💻 @hack_room_channel
🧑💻 @maltech112
🧑💻 @phoneixCS
🧑💻 @botshubnew2
🧑💻 @Unknown_Giveway
🧑💻 @ninjacourse0
👨💻 @learntechnologywithfun
▬▬▬▬▬▬▬▬▬▬▬▬▬
♨ APPS, Givwa.. & Course 📲
▬▬▬▬▬▬▬▬▬▬▬▬▬
📲 @udemy_in_free
📲 @apkdore
📲 @udacity_skillshare_coursera_edx
📲 @freshercooker_official
📲 @Mod_apk_store
📲 @WaveAPK
📲 @Aexdroid
📲 @mod_apksdownload
📲 @Universal_gamers
📲 @Androidpaidmarket
📲 @crackedmodapp
📲 @hackedapkfilesi
📲 @software_cracked
📲 @freePremiumAppStore0
📲 @TenminuteSchoolFree
📲 @Wordpress_Free_For_You
📲 @moded_android_pc_apps
📲 @free_courses_drive_links
📲 @Premiumapponly
📲 @moddedapkmarket
📲 @udemymega
📲 @Courses_Unlimted_Free
📲 @Unlimted_Free_Courses
📲 @tenminuteschoolfreecourse
📲 @free_certification_courses
📲 @free_moneymaking_courses
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎥 MOVIE & VIDEO 🎬
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎬 @XGDrive_Movies
🎬 @movies_dg01
🎬 @movieshindi6
🎬 @Hindi_Movie_HD_5
🎬 @netflix_2020_latest
🎬 @MoviesAnimeUnlimited
🎬 @GameOfThronesEpisode
🎬 @cbgamersubodhcreation
▬▬▬▬▬▬▬▬▬▬▬▬▬
📚 EDUCATIONAL CHANNEL 📚
▬▬▬▬▬▬▬▬▬▬▬▬▬
📚 @BooksStreet
📚 @Education24x7
📚 @NewsPaperBuzz
📚 @fulfillyourbrain
📚 @ComicsMuseum
📚 @rojgarsuchnaa
📚 @ebookerdoseofficial
📚 @ebookerdoseofficial
📚 @RailwayRecruitmentBoardExam
📚 @StaffSelectionCommissionExams
📚 @UnionPublicServiceCommissionI
📚 @realgroupforprogrammer
▬▬▬▬▬▬▬▬▬▬▬▬▬
♥️ SHAYRI, NAT.. & QUOTES 📸
▬▬▬▬▬▬▬▬▬▬▬▬▬
❤️ @gayatri_darshan
❤️ @felings4you
❤️ @RhetoricRealm
❤️ @bestshayarilove
❤️ @love_deep_feeling
♥️ @Unknown_Facts_Op
❤ @Bikhre_Lamhe
❤️ @twolineshayrii
❤️ @op_beautyful_nature
❤️ @Amazinginterestingfacts
❤️ @HindiMotivationalSpeaker
❤️ @shayariHARekDILkiAWAJ
▬▬▬▬▬▬▬▬▬▬▬▬▬
🤣 MEMES & JOKES 😜
▬▬▬▬▬▬▬▬▬▬▬▬▬
😅 @jokes_hi_jokes
😅 @majedar_jokes
😅 @Baba_g_ka_thulu
😅 @Raseele_Chutkale
😅 @MemesFrenzy
😅 @Dagniworld
😅 @handsome_haramii
😅 @classic1comedy
😅 Funny memes and Videos
😅 @Haso_Or_Hasao26
😅 @Fun_Alive_andlively
😅 @funny_indian_videos_memes_jokes
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎧 MY MUSICS 🎵
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎧 @AllYourMusic
🎧 @allhitsongs
🎧 @trending_mobie_ringtones_01
▬▬▬▬▬▬▬▬▬▬▬▬▬
〽 EXTRA CHANNELS 👌
▬▬▬▬▬▬▬▬▬▬▬▬▬
👉 @fl3xtools
👉 @CLICKK_ITT
👉 @indiadailyloot
👉 @Hot_Actress_Img
👉 @secrets_des_plantes
👉 @makemoneyonline001
👉 @CHANNELOFPAYMENT
👉 @youtubevediogaming
👉 @women_shopping_deals
👉 @breathtakingwallpapers
👉 @onlinebestdealsam
👉 @youtube_channel_promotion
▬▬▬▬▬▬▬▬▬▬▬▬▬
⟱⟱⟱ 𝗦𝗽𝗼𝗻𝘀𝗼𝗿𝗲𝗱 𝗕𝘆 ⟱⟱⟱
📹 Google Drive Movies 🎬
▬▬▬▬▬▬▬▬▬▬▬▬▬
➕ Add Your Channels ➕
▬▬▬▬▬▬▬▬▬▬▬▬▬
⏰1 hr 🔝 Top 12 hrs🔛 in Channel's
📃 The Pros and Cons of Smart Homes
By Owais Sultan
The world is more connected than ever before, and the rise of the smart home is just one…
This is a post from HackRead.com Read the original post: The Pros and Cons of Smart Homes
📃 5 Ways Smart Contracts Are Making A Real-World Difference
By Waqas
One of the most promising innovations in the blockchain industry is the smart contract. They provide a superior…
This is a post from HackRead.com Read the original post: 5 Ways Smart Contracts Are Making A Real-World Difference
epresents an additional attack surface, and the Web PKI is only as safe as its weakest link. For example, in 2011 a compromised CA led to a large-scale attack on web users in Iran. Incident ManagementNo CA is perfect. When a CA owner violates the Chrome Root Program policy – or experiences any other situation that affects the CA’s integrity, trustworthiness, or compatibility – we call it an incident. Incidents can happen. They are an expected part of building a secure Web PKI. All the same, incidents represent opportunities to improve practices, systems, and understanding. Our program is committed to continuous improvement and participates in a public Web PKI incident management process.
When incidents occur, we expect CA owners to identify the root cause and remediate it to help prevent similar incidents from happening again. CA owners record the incident in a report that the Chrome Root Program and the public can review, which encourages an understanding of all contributing factors to reduce the probability of its reoccurrence in the Web PKI.
The Chrome Root Program prioritizes the security and privacy of its users and is unwilling to compromise on these values. In rare cases, incidents may result in the Chrome Root Program losing confidence in the CA owner’s ability to operate securely and reliably. This may happen when there is evidence of a CA owner:
* knowingly violating requirements or obfuscating incidents,
* demonstrating sustained patterns of failure, untimely and opaque communications, or an unwillingness to improve elements that are critical to security, or
* performing other actions that negatively impact or otherwise degrade the security of the Web.
In these cases, Chrome may distrust a CA – that is, remove the CA from the Chrome Root Store. Depending on the circumstance, Chrome may also block the certificate with a non-bypassable error page.
The above cases are only illustrative, and considerations for CA distrust are not limited to these examples. The Chrome Root Program may remove certificates from the Chrome Root Store, as it deems appropriate and at its sole discretion, to enhance security and promote interoperability in Chrome. Positive Ecosystem Change The Chrome Root Program collaborates with members of the Web PKI ecosystem in various forums (e.g., the CA/Browser Forum) and committees (e.g., the CCADB Steering Committee). We share best practices, advocate for and develop new standards to promote user security, and seek ecosystem participant feedback on proposed initiatives. Collectively, ecosystem participants contributing to these working groups are protecting the Web.
In June 2022, we announced the “Moving Forward, Together” initiative that shared our vision of the future Web PKI that includes modern, reliable, agile, and purpose-driven architectures with a focus on automation, simplicity, and security. The initiative represents the goals and priorities of the Chrome Root Program and reinforces our commitment to working alongside CA owners to make the Web a safer place.
Some of our current priorities include:
* reducing misissuance of certificates that do not comply with the Baseline Requirements, a CA’s own policies, or the Chrome Root Program policy,
* increasing accountability and ecosystem integrity with high-quality, independent audits,
* automating certificate issuance and strengthening the domain validation process, and
* preparing for a “post-quantum” world.
We believe implementing proposals related to these priorities will help manage risk and make the Web a safer place for everyone.
However, as the name suggests, we can only realize these opportunities to improve with the collective contributions of the community. We understand CAs to be an essential element of the Web PKI, and we are encouraged by continued feedback and participation from existing and future CA owners in our program.
The Chrome Root Program is committed to openness and transparency, and we are optimistic we[...]
Naked Security
PyPI open-source code repository deals with manic malware maelstrom
Controlled outage used to keep malware marauders from gumming up the works. Learn what you can do to help in future...
➖ @Blackhat_001 ➖
📃 PyPI open-source code repository deals with manic malware maelstrom
Controlled outage used to keep malware marauders from gumming up the works. Learn what you can do to help in future...
emselves to unrealistic or edited images of celebrities, influencers, or friends. Social comparison can also lead to the fixation on getting more likes, followers, or comments on their posts. Suggestion: Create a safe space for your teen to discuss this topic with you. Help them understand the differences between Instagram life and real life. Help them be aware of how they feel while using Instagram. Encourage them to follow accounts that inspire and uplift them and unfollow accounts that spark feelings of comparison, jealousy, or inferiority. 4. Talk about cyberbullying.Hurtful events that impact teens, such as gossip, rumor spreading, peer pressure, criticism, and conflict, can increase in online communities. If your child posts online, they can receive mean or sexual comments from people they know and strangers (trolls). Cyberbullying can surface in many ways online, making kids feel anxious, fearful, isolated, and worthless. Suggestions: Keep up on how kids bully one another onlineand check in with your child daily about what’s happening in their life. Encourage them not to respond to bullies and to block and report the person instead. Also, if they are getting bullied, remind them to take and store screenshots. Such evidence can be helpful if they need to confide with a parent, teacher, or law enforcement. 5. Emphasize digital literacy. Understanding how to discern true and false information online is becoming more complicated daily. In the McAfee 2023 Threat Predictions: Evolution and Exploitation, experts predict that AI tools will enable more realistic and efficient manipulation of images and videos, which could increase disinformation and harm the public’s mental health. Understanding online content is a great way to help your kids build their confidence and security on Instagram and other networks. Suggestion: Encourage critical thinking and guide kids to use fact-checking tools before believing or sharing content that could be fake and using ethical AI frameworks. Remind them of their digital footprints and how the things they do online can have long-lasting consequences.It’s important to remember that all social networks come with inherent dangers and that Instagram has taken a number of steps to reduce the potential risks associated with its community by improving its security features and safety rules for kids. Remember, nothing protects your child like a solid parent-child relationship. As a parent or caregiver, you play a critical role in educating your child about their digital well-being and privacy. Working together, as a family, your child will be equipped to enjoy the good stuff and avoid the sketchy side of the digital world.
The post Instagram Safety for Kids: Protecting Privacy and Avoiding Risks appeared first on McAfee Blog.
➖ @Blackhat_001 ➖
spond to requests for comment.
Quotpw denied being Sergey, and said Sergey was a friend who registered the domain as a birthday present and favor last year.
“Initially, I bought it for 300 rubles,” Quotpw explained. “The extension cost 1300 rubles (expensive). I waited until it expired and forgot to buy it. After that, a friend (Sergey) bought [the] domain and transferred access rights to me.”
“He’s not even an information security specialist,” Quotpw said of Sergey. “My friends do not belong to this field. None of my friends are engaged in scams or other black [hat] activities.”
It may seem unlikely that someone would go to all this trouble to spam Mastodon users over several weeks using an impressive number of resources — all for just $2,000 in profit. But it is likely that whoever is actually running the various crypto scam platforms advertised by Quotpw’s spam messages pays handsomely for any investments generated by their spam.
According to the FBI, financial losses from cryptocurrency investment scams dwarfed losses for all other types of cybercrime in 2022, rising from $907 million in 2021 to $2.57 billion last year.
➖ @Blackhat_001 ➖
Krebs on Security
Interview With a Crypto Scam Investment Spammer
Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows is an interview with a Russian hacker responsible for a series of aggressive crypto spam campaigns that recently prompted several large Mastodon communities to temporarily halt new registrations. According to the hacker, their spam software has been in private use until the last few weeks, when it was released as open source code.
https://krebsonsecurity.com/wp-content/uploads/2022/04/cryptopeople.png Renaud Chaput is a freelance programmer working on modernizing and scaling the Mastodon project infrastructure — including joinmastodon.org, mastodon.online, and mastodon.social. Chaput said that on May 4, 2023, someone unleashed a spam torrent targeting users on these Mastodon communities via “private mentions,” a kind of direct messaging on the platform.
The messages said recipients had earned an investment credit at a cryptocurrency trading platform called moonxtrade[.]com. Chaput said the spammers used more than 1,500 Internet addresses across 400 providers to register new accounts, which then followed popular accounts on Mastodon and sent private mentions to the followers of those accounts.
Since then, the same spammers have used this method to advertise more than 100 different crypto investment-themed domains. Chaput said that at one point last week the volume of bot accounts being registered for the crypto spam campaign started overwhelming the servers that handle new signups at Mastodon.social.
“We suddenly went from like three registrations per minute to 900 a minute,” Chaput said. “There was nothing in the Mastodon software to detect that activity, and the protocol is not designed to handle this.”
https://krebsonsecurity.com/wp-content/uploads/2023/05/mastocryptospam.png
One of the crypto investment scam messages promoted in the spam campaigns on Mastodon this month.
Seeking to gain a temporary handle on the spam wave, Chaput said he briefly disabled new account registrations on mastodon.social and mastondon.online. Shortly after that, those same servers came under a sustained distributed denial-of-service (DDoS) attack.
Chaput said whoever was behind the DDoS was definitely not using point-and-click DDoS tools, like a booter or stresser service.
“This was three hours non-stop, 200,000 to 400,000 requests per second,” Chaput said of the DDoS. “At first, they were targeting one path, and when we blocked that they started to randomize things. Over three hours the attack evolved several times.”
Chaput says the spam waves have died down since they retrofitted mastodon.social with a CAPTCHA, those squiggly letter and number combinations designed to stymie automated account creation tools. But he’s worried that other Mastodon instances may not be as well-staffed and might be easy prey for these spammers.
“We don’t know if this is the work of one person, or if this is [related to] software or services being sold to others,” Chaput told KrebsOnSecurity. “We’re really impressed by the scale of it — using hundreds of domains and thousands of Microsoft email addresses.”
Chaput said a review of their logs indicates many of the newly registered Mastodon spam accounts were registered using the same 0auth credentials, and that a domain common to those credentials was quot[.]pw. A DIRECT QUOTThe domain quot[.]pw has been registered and abandoned by several parties since 2014, but the most recent registration data available through DomainTools.com shows it was registered in March 2020 to someone in Krasnodar, Russia with the email address edgard011012@gmail.com.
This email address is also connected to accounts on several Russian cybercrime forums, including “__edman__,” who had a history of selling “logs” — l[...]
📃 CapCut Users Beware: Phishing Sites Distributing Malware
By Deeba Ahmed
If you use TikTok, you must be aware of CapCut. However, did you know that this app is being abused by threat actors to drop malware and carry out phishing scams through not one, but a series of malicious sites?
This is a post from HackRead.com Read the original post: CapCut Users Beware: Phishing Sites Distributing Malware
📃 DarkBERT: Enhancing Cybersecurity Efforts on the Dark Web
By Habiba Rashid
DarkBERT is based on the RoBERTa architecture and leverages the power of AI to navigate the dark web.
This is a post from HackRead.com Read the original post: DarkBERT: Enhancing Cybersecurity Efforts on the Dark Web
📃 Instagram Safety for Kids: Protecting Privacy and Avoiding Risks
If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk...
The post Instagram Safety for Kids: Protecting Privacy and Avoiding Risks appeared first on McAfee Blog.
📃 Mastermind Behind iSpoof Fraud Website Sentenced to 13 Years in the UK
By Waqas
The founder of iSpoof is named Tejay Fletcher and is from the Western Gateway area of London, England.
This is a post from HackRead.com Read the original post: Mastermind Behind iSpoof Fraud Website Sentenced to 13 Years in the UK
McAfee Blogs
5 Minute Parent’s Guide to Social Media
The time has come. Your kids are chafing at the bit to get on social media and you can no longer hold them back. But you’re terrified. ‘What if they say the wrong thing? What if they meet some unsavoury types or worst case, what if they get bullied?’ I hear you – everything you are concerned about is completely normal and totally valid. But this is not the time to put your head in the sand people, tempting as it is.
So, make yourself a cuppa. I’m going to run you through the basics so you can get your offspring (and yourself) through this quite significant moment in the best shape possible. How Old Does My Child Need To Be?Ah, such a tricky question!! While there is no specific Aussie law that dictates the minimum age kids need to be to join social media, most social media platforms require their users to be 13 years old to set up an account. This is a result of a US federal law, the Children’s Online Privacy Protection Act (COPPA) , which affects any social media platform that US citizens can join. So, therefore it affects nearly all social media platforms worldwide.
But let’s keep it real – most kids join before they are 13. Some do with the consent of their parents, but many don’t. So, if your kids are consulting you on their move into social media, then pat yourself on the back. You’ve done a great job in keeping the lines of communication open and staying relevant. But if yours just charged ahead without involving you (like some of mine did) then it’s still not too late to be part of their journey.
In my opinion, there is no simple answer. A one size fits all approach doesn’t work here. Some kids mature faster than their peers, others may have a bigger dose of emotional intelligence and instinctively understand the ramifications of poor online behaviour. Some kids are more resilient and robust while others are more sensitive. There are so many things to consider when advising but ultimately, this is your call as a parent. How Can I Keep Them Safe?This is where many of us can come unstuck because it can feel so overwhelming knowing where to start. But don’t worry – I’ve got you. I’m going to give you 5 things that you can action that will make a huge difference to your kids’ online safety. And these strategies are relevant to all of us parents – regardless of whether your kids are new to social media or old hands! 1. Communication, Communication, CommunicationI can’t stress enough just how important it is to have real conversations with your kids about all aspects of their lives, including the digital part. Asking them what they do online, why they like a certain app and who they play online games with are just some of the ways of starting a conversation. I am also a fan of sharing details of your online life with them too. Whether its sharing new apps with my kids, funny posts, or relevant news articles, I think if I regularly demonstrate that I get social media then I generate a little ‘tech cred’. And when you’ve got ‘tech cred’, they are more likely to come to you when things aren’t going swimmingly. And that’s exactly what we want as parents! 2. Create a Family Digital ContractI love the idea of a clear contract between parents and kids that details your expectations about their online behaviour and technology use. It’s a great way of developing a set of guidelines that will help them navigate some of the risks and challenges associated with being online. Now, this agreement should be a family exercise so ensure your kids are invested in the process too. If you want a starting point, check out this one from The Modern Parent here. 3. PasswordsWithout a doubt, one of the most powerful ways to stay safe online is to ensure you have super duper passwords for each of your online accounts. So, take some time to ensure your kid[...]
Schneier on Security
Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws
It’s been a big month for US data privacy. Indiana, Iowa, and Tennessee all passed state privacy laws, bringing the total number of states with a privacy law up to eight. No private right of action in any of those, which means it’s up to the states to enforce the laws.
➖ @Blackhat_001 ➖
🅶🅾🅾🅶🅻🅴 🅿🆁🅾🅼🅾
━━━━━━━━━━━━━━━━━━━━
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🔰 𝗔𝗣𝗣𝗦 & 𝗔𝗖𝗖𝗢𝗨𝗡𝗧𝗦 ♨️
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🔰 @mod_games_store
🔰 @mod_apps_store1
🔰 @M0d_apk
🔰 @fauggamer007
🔰 @gigamodz
🔰 @Mod_Apps_Game
🔰 @hackedsoftware
🔰 @Premium_free_apps
🔰 @Mod_Apk_Store
🔰 @CoLLEt_TIOn
🔰 @hackers_zone_fz
🔰 @ModdedApkStores
🔰 @freepremiuimaccounts
🔰 @UNITEDHACKERTEAM
🔰 @freeprimiumsAcounNtTs
🔰 @crazy_giveaways_OT
🔰 @moddedapplicationss
🔰 @netflixmoodedapp
🔰 @KineMaster_NetFlix_HotStar
🔰 @apks_juegos_premiummods
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
👨💻 𝗛𝗔𝗖𝗞𝗜𝗡𝗚 TACH & 𝗖𝗢𝗨𝗥𝗦𝗘𝗦 📈
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
👨💻 @dehoodday
👨💻 @Blackhat_001
👨💻 @courseseekers
👨💻 @scriptsPentester
👨💻 @AllHackersUnited
👨💻 @TechnologyRam
🧑💻 @technofreakworld
👨💻 @black_hat_hacker9
👨💻 @harsh_hacker_yt
🧑💻 @maltech112
🧑💻 @hackrows
🧑💻 @udemymega
🧑💻 @cyber_hell_1
🧑💻 @demonofpakistan
👨💻 @Wordpress_Free_For_You
👨💻 @black_hat_hacker_master
👨💻 @TenminuteSchoolFree
👨💻 Hacking And Programming
🧑💻 Comeback Channel
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
📹 𝗠𝗢𝗩𝗜𝗘𝗦 & 𝗪𝗘𝗕-𝗦𝗘𝗥𝗜𝗘𝗦 🎥
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🎬 G-drive Movies
🎬 @Hindi_Hits
🎬 @Mediatek_1
🎬 @movieshindi6
🎬 @HollywoodLifemovies
🎬 @SK_Network_Channel
🎬 @movies_club_0
🎬 @tiktokmania_alt
🎬 @telugumovies_33
🎬 @Hindi_Movie_HD_5
🎬 @moviesmodz
🎬 @AGAwhatsapstatuschannel
🎬 Sunny leone Only Fans
🎬 Lust Girls WhatsApp Numbers
🎬 Insta Girls WhatsApp Numbers
🎬 @Netflixmoviesfreechannel
🎬 @ethical_hacking_in_hindi
🎬 @moviesandseriesonlinedownload
🎬 Hot & Cute Girls WhatsApp Numbers
🎬 Desi Albums
🎬 Delhi Girls WhatsApp Numbers
🎬 Club House Girls WhatsApp Numbers
🎬 Girls Chatting Corner
🎬 Dating With Nurses
🎬 CINE_INFANTIL_FAMILIAR
🎬 CINE INFANTIL FAMILIAR
🎬 SERIES CARTOON NETWORK
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
❤️ 𝐐𝐮𝐨𝐭𝐞𝐬 & 𝐖𝐚𝐥𝐥𝐩𝐚𝐩𝐞𝐫𝐬 🎴
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
♥️ @Quotesinspirations
♥️ @shayari_dil_say
❤️ @twolineshayrii
❤️ @bhaktivide
❤️ @beststatusvideoz
♥️ @Whatsappstatus1080p
♥️ @shayariHARekDILkiAWAJ
♥️ अद्भुत रोचक तथ्य
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
😂 𝗙𝘂𝗻𝗻𝘆 𝗝𝗼𝗸𝗲𝘀 & 𝗩𝗶𝗱𝗲𝗼𝘀 😜
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
😜 @B4bgm_lucky
😜 @FunnyJokesHub
😜 @majedar_jokes
😜 @MEMES_LOVER
😜 @funny_loverpoint
😜 @Raseele_Chutkale
😜 @funny_desi_memes
😜 @DesiHindijokes24
😜 @Comedyvideoandjokes
😜 @Lol_funny_videos_fails_wtf
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
📝 𝗘𝗫𝗧𝗥𝗔 𝗖𝗛𝗔𝗡𝗡𝗘𝗟𝗦 💈
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🎧 @alltrendingsongs
🎧 @Hungama_music_lovers
🎧 @allhitsongs
🎧 @Music_World_India
🛍️ @sellerzonez
🛍️ @ROYAALCLUB
🛍️ @crazyamzdeals
🛍️ @onlinebestdealsam
🛍️ @amazoniansonly
🛍️ AppyMart
❓ @tiptopleaks
❓ @gkstudy0
❓ @marlonetech
❓ @factoland13
❓ @earnunlimi
❓ @AZBusinessbooks
❓ @hotnewsupdates
❓ @Paytmcashop
❓ @BusinessNewsOfficial
❓ @secrets_des_plantes
❓ @mundodefrasesvip
❓ @recetas_de_cocinas_y_postres
❓ @googleplayredeemcodefreeplay
❓ MAKE $500 DAILY
❓ DIRECTORIO DE CANALES/GRUPOS
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
📸 𝗣𝗛𝗢𝗧𝗢𝗚𝗥𝗔𝗣𝗛𝗬 🎑
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🖼️ @hotschickpics
🖼️ @ViralWallpapers_mob
🖼️ @desipicsandvideosleaks
┎┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┒
POWERED BY : Mod Apps
┖┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┚
━━━━━━━━━━━━━━━━━━━━
✝ Add Your 100+ Channel ✝
━━━━━━━━━━━━━━━━━━━━
✘ ʟɪsᴛ ᴅᴏɴ'ᴛ ᴅᴇʟᴇᴛᴇ ᴍᴀɴᴜᴀʟʟʏ. ✘
📃 Understand the Evolution of Captive Portal to Cloud Authentication Solutions
By Owais Sultan
In today’s digital age, the use of the internet has become an integral part of our lives. Whether…
This is a post from HackRead.com Read the original post: Understand the Evolution of Captive Portal to Cloud Authentication Solutions
can achieve this shared vision. If you’re interested in seeing what new initiatives are being explored by the Chrome Root Program to keep Chrome users safe - you can learn more here.
➖ @Blackhat_001 ➖
Google Online Security Blog
How the Chrome Root Program Keeps Users Safe
Posted by Chrome Root Program, Chrome Security Team What is the Chrome Root Program?A root program is one of the foundations for securing connections to websites. The Chrome Root Program was announced in September 2022. If you missed it, don’t worry - we’ll give you a quick summary below! Chrome Root Program: TL;DRChrome uses digital certificates (often referred to as “certificates,” “HTTPS certificates,” or “server authentication certificates”) to ensure the connections it makes for its users are secure and private. Certificates are issued by trusted entities called “Certification Authorities” (CAs). The collection of digital certificates, CA systems, and other related online servicews is the foundation of HTTPS and is often referred to as the “Web PKI.”
Before issuing a certificate to a website, the CA must verify that the certificate requestor legitimately controls the domain whose name will be represented in the certificate. This process is often referred to as “domain validation” and there are several methods that can be used. For example, a CA can specify a random value to be placed on a website, and then perform a check to verify the value’s presence. Typically, domain validation practices must conform with a set of security requirements described in both industry-wide and browser-specific policies, like the CA/Browser Forum “Baseline Requirements” and the Chrome Root Program policy.
Upon connecting to a website, Chrome verifies that a recognized (i.e., trusted) CA issued its certificate, while also performing additional evaluations of the connection’s security properties (e.g., validating data from Certificate Transparency logs). Once Chrome determines that the certificate is valid, Chrome can use it to establish an encrypted connection to the website. Encrypted connections prevent attackers from being able to intercept (i.e., eavesdrop) or modify communication. In security speak, this is known as confidentiality and integrity.
The Chrome Root Program, led by members of the Chrome Security team, provides governance and security review to determine the set of CAs trusted by default in Chrome. This set of so-called "root certificates" is known at the Chrome Root Store. How does the Chrome Root Program keep users safe?The Chrome Root Program keeps users safe by ensuring the CAs Chrome trusts to validate domains are worthy of that trust. We do that by:
* administering policy and governance activities to manage the set of CAs trusted by default in Chrome,
* evaluating impact and corresponding security implications related to public security incident disclosures by participating CAs, and
* leading positive change to make the ecosystem more resilient. Policy and GovernanceThe Chrome Root Program policy defines the minimum requirements a CA owner must meet for inclusion in the Chrome Root Store. It incorporates the industry-wide CA/Browser Forum Baseline Requirements and further adds security controls to improve Chrome user security.
The CA application process includes a public discussion phase, where members of the Web PKI community are free to raise well-founded, fact-based concerns related to an applicant on an open discussion forum.
We consider public discussion valuable because it:
* improves security, transparency, and interoperability, and
* highlights concerning behavior, practices, or ownership background information not readily available through public audits, policy reviews, or other application process inputs.
For a CA owner’s inclusion request to be accepted, it must clearly demonstrate that the value proposition for the security and privacy of Chrome’s end users exceeds the corresponding risk of inclusion.
Once a CA is trusted, it can issue certificates for any website on the internet; thus, each newly added CA r[...]
📃 Popular Android Screen Recorder iRecorder App Revealed as Trojan
By Waqas
According to ESET, iRecorder was infected with a variant of AhMyth, which is an open-source remote administration tool capable of extracting sensitive data from Android devices.
This is a post from HackRead.com Read the original post: Popular Android Screen Recorder iRecorder App Revealed as Trojan
Schneier on Security
Credible Handwriting Machine
In case you don’t have enough to worry about, someone has built a credible handwriting machine:
This is still a work in progress, but the project seeks to solve one of the biggest problems with other homework machines, such as this one that I covered a few months ago after it blew up on social media. The problem with most homework machines is that they’re too perfect. Not only is their content output too well-written for most students, but they also have perfect grammar and punctuation something even we professional writers fail to consistently achieve. Most importantly, the machine’s “handwriting” is too consistent. Humans always include small variations in their writing, no matter how honed their penmanship.
Devadath is on a quest to fix the issue with perfect penmanship by making his machine mimic human handwriting. Even better, it will reflect the handwriting of its specific user so that AI-written submissions match those written by the student themselves.
Like other machines, this starts with asking ChatGPT to write an essay based on the assignment prompt. That generates a chunk of text, which would normally be stylized with a script-style font and then output as g-code for a pen plotter. But instead, Devadeth created custom software that records examples of the user’s own handwriting. The software then uses that as a font, with small random variations, to create a document image that looks like it was actually handwritten.
Watch the video.
My guess is that this is another detection/detection avoidance arms race.
➖ @Blackhat_001 ➖
McAfee Blogs
Instagram Safety for Kids: Protecting Privacy and Avoiding Risks
If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk of their screen time. However, woven into the stream of reels, stories, selfies, and Insta-worthy moments, are potential risks to your child’s privacy and safety.
According to a recent Pew Research Center report, 62 percent of teens use Instagram, making it the third most popular social media platform after YouTube and TikTok. Teens use the photo and video-sharing platform to share their creativity, connect with friends, and get updates on their favorite celebrities and influencers.
Instagram’s format makes it easy for kids (and adults!) to spend hours using filters and stickers, commenting, liking posts, and counting likes. But all this fun can take a turn if kids misuse the platform or fail to take the risks seriously.
Whether your child is new to Instagram or a seasoned IG user, consider pausing to talk about the many aspects of the platform.
Here are a few critical topics to help you kick off those conversations. Instagram Privacy & Safety Tips1. Resist oversharing.Acknowledging the impulsive behavior and maturity gaps unique to the teen years is essential. Do you feel like you are repeating yourself on these topics? That’s okay—it means you are doing it right. Repetition works. Advise them: Sharing too many personal details online can set them up for serious privacy risks, including identity theft, online scams, sextortion, or cyberbullying. Also, oversharing can negatively influence potential schools and employers who may disapprove of the content teens choose to share online. Suggestion: Sit down together and review Instagram’s privacy settings to limit who can see your child’s content. Please encourage them to use strong passwords and two-factor authentication to secure accounts. Also, advise them to think twice before posting something and warn them about the risks of sharing intimate photos online (even with friends), as they can be easily shared or stolen. Now may be the time if you’ve never considered adding security software to protect your family devices. McAfee+ provides all-in-one privacy, identity, and device protection for families. It includes helpful features, including identity monitoring, password manager, unlimited VPN, file shredding, protection score, and parental controls. The software has updated features to include personal data cleanup and credit monitoring and reporting to protect kids from identity theft further. 2. Just say no to FOMO.This acronym stands for Fear of Missing Out. This word came from the subtle undercurrent of emotions that can bubble up when using social media. It’s common for kids to feel anxious or even become depressed because they think they are being excluded from the party. FOMO can lead them to spend too much time and money on social media, neglect their family or school responsibilities, or engage in risky behaviors to fit in with or impress others. Suggestion: Help your child understand that it’s normal to sometimes have FOMO feelings. Please encourage them to focus on their strengths and to develop fulfilling hobbies and interests offline. To reduce FOMO, encourage your child to take breaks from social media. Also, install software to help you manage family screen time.3. Social Comparison.Akin to FOMO, comparing oneself to others is an ever-present reality among teens that is only amplified on Instagram. According to several reports, Instagram’s photo-driven culture and photo filters that enhance facial and body features can make teens feel worse about their bodies and increase the risk of eating disorders, depression, and risky behaviors. Girls, especially, can develop low self-esteem, comparing th[...]
arge amounts of data stolen from many bot-infected computers — as well as giving away access to hacked Internet of Things (IoT) devices.
In September 2018, a user by the name “ципа” (phonetically “Zipper” in Russian) registered on the Russian hacking forum Lolzteam using the edgard0111012@gmail.com address. In May 2020, Zipper told another Lolzteam member that quot[.]pw was their domain. That user advertised a service called “Quot Project” which said they could be hired to write programming scripts in Python and C++.
“I make Telegram bots and other rubbish cheaply,” reads one February 2020 sales thread from Zipper. https://krebsonsecurity.com/wp-content/uploads/2023/05/zelenkaquot.png Quotpw/Ahick/Edgard/ципа advertising his coding services in this Google-translated forum posting.
Clicking the “open chat in Telegram” button on Zipper’s Lolzteam profile page launched a Telegram instant message chat window where the user Quotpw responded almost immediately. Asked if they were aware their domain was being used to manage a spam botnet that was pelting Mastodon instances with crypto scam spam, Quotpw confirmed the spam was powered by their software.
“It was made for a limited circle of people,” Quotpw said, noting that they recently released the bot software as open source on GitHub.
Quotpw went on to say the spam botnet was powered by well more than the hundreds of IP addresses tracked by Chaput, and that these systems were mostly residential proxies. A residential proxy generally refers to a computer or mobile device running some type of software that enables the system to be used as a pass-through for Internet traffic from others.
Very often, this proxy software is installed surreptitiously, such as through a “Free VPN” service or mobile app. Residential proxies also can refer to households protected by compromised home routers running factory-default credentials or outdated firmware.
Quotpw maintains they have earned more than $2,000 sending roughly 100,000 private mentions to users of different Mastodon communities over the past few weeks. Quotpw said their conversion rate for the same bot-powered direct message spam on Twitter is usually much higher and more profitable, although they conceded that recent adjustments to Twitter’s anti-bot CAPTCHA have put a crimp in their Twitter earnings.
“My partners (I’m programmer) lost time and money while ArkoseLabs (funcaptcha) introduced new precautions on Twitter,” Quotpw wrote in a Telegram reply. “On Twitter, more spam and crypto scam.”
Asked whether they felt at all conflicted about spamming people with invitations to cryptocurrency scams, Quotpw said in their hometown “they pay more for such work than in ‘white’ jobs” — referring to legitimate programming jobs that don’t involve malware, botnets, spams and scams.
“Consider salaries in Russia,” Quotpw said. “Any spam is made for profit and brings illegal money to spammers.” THE VIENNA CONNECTIONShortly after edgard011012@gmail.com registered quot[.]pw, the WHOIS registration records for the domain were changed again, to msr-sergey2015@yandex.ru, and to a phone number in Austria: +43.6607003748. Constella Intelligence, a company that tracks breached data, finds that the address msr-sergey2015@yandex.ru has been associated with accounts at the mobile app site aptoide.com (user: CoolappsforAndroid) and vimeworld.ru that were created from different Internet addresses in Vienna, Austria.
A search in Skype on that Austrian phone number shows it belongs to a Sergey Proshutinskiy who lists his location as Vienna, Austria. The very first result that comes up when one searches that unusual name in Google is a LinkedIn profile for a Sergey Proshutinskiy from Vienna, Austria.
Proshutinskiy’s LinkedIn profile says he is a Class of 2024 student at TGM, which is a Christian mission school in Austria. His resume also says he is a data science intern at Mondi Group, an Austrian manufacturer of sustainable packaging and paper.
Mr. Proshutinskiy did not re[...]
📃 Interview With a Crypto Scam Investment Spammer
Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows is an interview with a Russian hacker responsible for a series of aggressive crypto spam campaigns that recently prompted several large Mastodon communities to temporarily halt new registrations. According to the hacker, their spam software has been in private use until the last few weeks, when it was released as open source code.
Naked Security
Phone scamming kingpin gets 13 years for running “iSpoof” service
Site marketing video promised total anonymity, but that was a lie. 170 arrested already. Potentially 1000s more to follow.
➖ @Blackhat_001 ➖
📃 Phone scamming kingpin gets 13 years for running “iSpoof” service
Site marketing video promised total anonymity, but that was a lie. 170 arrested already. Potentially 1000s more to follow.
Schneier on Security
Google Is Not Deleting Old YouTube Videos
Google has backtracked on its plan to delete inactive YouTube videos—at least for now. Of course, it could change its mind anytime it wants.
It would be nice if this would get people to think about the vulnerabilities inherent in letting a for-profit monopoly decide what of human creativity is worth saving.
➖ @Blackhat_001 ➖
s have got this covered. Every online account needs its own individual password that should have no link to your child’s name, school, family, or favourite pet. I’m a big fan of a crazy sentence – I find they are easier to remember. If you include at least one capital letter, a few numbers, and symbols then you’re doing well. Password managers can be a great way of remembering and also generating complex passwords. These can be a godsend when your list of online accounts grows. All you need to do is remember the master password. How good!
And ensure they know to NEVER share passwords. Tell them that passwords are like toothbrushes – never to be shared! That always worked with my boys! 4. Turn Privacy Settings OnUnless you are proactive, privacy settings on social media platforms will remain on the default setting which usually means public. Now, this means that anyone who has access to the internet can view the posts and photos that you share whether you want them to or not. Now, this is not ideal for anyone but particularly not a young tween who is trying to find their feet online.
So, take some time to help your kids turn activate the privacy settings on all their online accounts. Turning their profile to private will give them more control over who can see their content and what people can tag them in. 5. Get Technology Working for YouThere is some amazing technology that can really help you, help your kids stay safe. Installing security software on your kids’ devices is essential. McAfee+, McAfee’s new ‘all in one’ privacy, identity and device protection is a fantastic way to ensure all your family members are protected online. It features identity monitoring and a password manager but also an unlimited VPN, a file shredder, protection score and parental controls. A complete no brainer! What Happens If Something Goes Wrong?My absolute hope is that your kids’ social media career is smooth sailing. However, with four kids of my own, I know that curveballs and challenges are often inevitable. But if you’ve developed an open line of communication with your kids and possibly even generated a little ‘tech cred’, then it is likely they will reach out to you if things go awry.
Depending on the issue they are experiencing, you may just need to talk them through the situation. Perhaps they need help understanding they should have expressed something in a less inflammatory way or that they may be over-reacting to a comment. It may be helpful for you to work with them to develop an action plan or formulate a response to someone who is perhaps being a bit tricky.
But if they have experienced behaviour that you consider to be unacceptable, then you may need to take further action. I always recommend taking screen shots of concerning behaviour online. These may be important if you need to take further action down the track. Once you’ve taken screen shots, then block the person who is causing your child grief. You can also report the behaviour to the social media platform. If the perpetrator goes to the same school as your child, then I would approach the school and ask them to assist. If the situation is super serious, you can always report it to the Office of our ESafety Commissioner in Australia or the Police who can both work with social media platforms.
Congratulations! You have completed the basic course in social media parenting. I know letting them go can feel quite terrifying, but I know that if you cover off the basics and keep talking to them, then you’re setting them up for success online.
Over to you now, mum and dad!
Good luck!
Alex https://s.w.org/images/core/emoji/14.0.0/72x72/1f60a.png
The post 5 Minute Parent’s Guide to Social Media appeared first on McAfee Blog.
➖ @Blackhat_001 ➖
Proofpoint News Feed
Selena Larson on how cybercriminals use threat intelligence
➖ @Blackhat_001 ➖