blackhat_001 | Неотсортированное

Telegram-канал blackhat_001 - Black Hat ☠

0

Подписаться на канал

Black Hat ☠

Proofpoint News Feed
Identity-focused attacks remain the most vulnerable entry point to an organization



➖ @Blackhat_001

Читать полностью…

Black Hat ☠

Proofpoint News Feed
Pentagon Hacking Fears Fueled by Microsoft's Monopoly on Military IT



➖ @Blackhat_001

Читать полностью…

Black Hat ☠

Proofpoint News Feed
Google pushes .zip and .mov domains onto the Internet, and the Internet pushes back



➖ @Blackhat_001

Читать полностью…

Black Hat ☠

Schneier on Security
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away

A Peruvian oversight law has the opposite effect:

Peru in 2020 began requiring any foreign fishing boat entering its ports to use a vessel monitoring system allowing its activities to be tracked in real time 24 hours a day. The equipment, which tracks a vessel’s geographic position and fishing activity through a proprietary satellite communication system, sought to provide authorities with visibility into several hundred Chinese squid vessels that every year amass off the west coast of South America.

[…]

Instead of increasing oversight, the new Peruvian regulations appear to have driven Chinese ships away from the country’s ports—and kept crews made up of impoverished Filipinos and Indonesians at sea for longer periods, exposing them to abuse, according to new research published by Peruvian fishing consultancy Artisonal.

Two things to note here. One is that the Peruvian law was easy to hack, which China promptly did. The second is that no nation-state has the proper regulatory footprint to manage the world’s oceans. These are global issues, and need global solutions. Of course, our current society is terrible at global solutions—to anything.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

🅳🆁🅴🅰️🅼 🅿️🆁🅾️🅼🅾️🆃🅸🅾️🅽
🔝Top Trending Channels🔝

✤▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬✤
©𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗕𝘆
⭕️ 𝗛𝗮𝗰𝗸𝗶𝗻𝗴 / 𝗖𝗿𝗮𝗰𝗸𝗶𝗻𝗴 / 𝗖𝗮𝗿𝗱𝗶𝗻𝗴 ⭕️
✤▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬✤

◄▬▬💻Technical and Hacking☠️▬▬►
💎Hertz Tech Tricks
💎CracknGStation%0A💎@CrunchTek%0A💎[Premium%20Accounts💯](t.me/freepremiuimaccounts">FREE COURSES WITH CERTIFICATION
💎@blackhat_001
💎📱Free Hacked Apps 📱
💎Smile Hacking
💎Hertz Tech Tricks
💎@jjtechandtrick
💎Premium Hackers Hub🖥
💎Movies palace🎥
💎📖Free Courses 📖
💎@darks_books
💎💻tech/programming📱
💎Unlimited Free Courses
💎ETHICAL HACKING | INFOSEC
📊Premium Paypal Store 🏅
💎😈 DARK WEB AND HACKING 👨‍💻
◄▬▬🎥 Movies and Videos🎞▬▬►
🔺🥳Habi creative & Animation🥳
🔺Broken heart 💔💔
🔺@new_statusloverrrr
🔺✅Telugu Movies Adda🎥
🔺Bluerayrulz🎬
🔺LATEST MOVIES DOWNLOAD 🍿
◄▬▬😅Meme and Jokes😍▬▬►
🔸@jokes_hi_jokes
🔸@Bbraerae
🔸@Shayari_Dil_Say

◄▬▬👍Some Mix Channels✌️▬▬►
♦️Lets Hack Everything
♦️@darknettmarket
♦️@moddedapplicationss

Sponsered By :-
╔════════════════════╗
🔥𝐏𝐀𝐈𝐃 𝐏𝐑𝐎𝐌𝐎𝐓𝐈𝐎𝐍 🔥
⭕️𝗚𝗲𝘁 𝗔𝗹𝗹 𝗕𝗲𝘀𝘁 𝗧𝗲𝗹𝗲𝗴𝗿𝗮𝗺 𝗖𝗵𝗮𝗻𝗻𝗲𝗹 𝗟𝗶𝗻𝗸⭕️
           𝗖𝗵𝗲𝗰𝗸 & 𝗝𝗼𝗶𝗻 𝗡𝗼𝘄
╚════════════════════╝

- - - - - - - - - - - - - - - - - - - - - - - -
▪️Note :Auto delete available Do not delete list manually.
〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️

Читать полностью…

Black Hat ☠

𝐓𝐨𝐩 𝐂𝐡𝐚𝐧𝐧𝐞𝐥𝐬 𝐎𝐧 𝐓𝐞𝐥𝐞𝐠𝐫𝐚𝐦
▬▬▬▬▬▬▬▬▬▬▬▬▬
👨‍💻 HACKING & TECH 👨‍💻
▬▬▬▬▬▬▬▬▬▬▬▬▬
🧑‍💻 @INSTAGRAM_FOLLOWERS_LOW_PRICE
🧑‍💻 @Smartesthackers
👨‍💻 @silentspyder
👨‍💻 @Deepwebcarding
👨‍💻 @Blackhat_001
🧑‍💻 @leakers_Squad
🧑‍💻 @BIackHat_King
👨‍💻 @Udemyallcourse
👨‍💻 @wedream11official
🧑‍💻 @cyberhaxx
🧑‍💻 @JOINPLSRECOVER
👨‍💻 @black_hat_hacker9
👨‍💻 @envato_elementsforfree
🧑‍💻 @technofreakworld
🧑‍💻 @hack_room_channel
🧑‍💻 @maltech112
🧑‍💻 @phoneixCS
🧑‍💻 @botshubnew2
🧑‍💻 @Unknown_Giveway
🧑‍💻 @ninjacourse0
👨‍💻 @learntechnologywithfun
▬▬▬▬▬▬▬▬▬▬▬▬▬
♨ APPS, Givwa.. & Course 📲
▬▬▬▬▬▬▬▬▬▬▬▬▬
📲 @udemy_in_free
📲 @udacity_skillshare_coursera_edx
📲 @freshercooker_official
📲 @Mod_apk_store
📲 @WaveAPK
📲 @Aexdroid
📲 @mod_apksdownload
📲 @Universal_gamers
📲 @Androidpaidmarket
📲 @crackedmodapp
📲 @hackedapkfilesi
📲 @software_cracked
📲 @freePremiumAppStore0
📲 @TenminuteSchoolFree
📲 @Wordpress_Free_For_You
📲 @moded_android_pc_apps
📲 @free_courses_drive_links
📲 @Premiumapponly
📲 @moddedapkmarket
📲 @udemymega
📲 @Courses_Unlimted_Free
📲 @Unlimted_Free_Courses
📲 @tenminuteschoolfreecourse
📲 @free_certification_courses
📲 @free_moneymaking_courses
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎥 MOVIE & VIDEO 🎬
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎬 @XGDrive_Movies
🎬 @movies_dg01
🎬 @movieshindi6
🎬 @Hindi_Movie_HD_5
🎬 @netflix_2020_latest
🎬 @telugumovies_33
🎬 @MoviesAnimeUnlimited
🎬 @GameOfThronesEpisode
🎬 @cbgamersubodhcreation
🎬 @Couplegoalssz
▬▬▬▬▬▬▬▬▬▬▬▬▬
📚 EDUCATIONAL CHANNEL 📚
▬▬▬▬▬▬▬▬▬▬▬▬▬
📚 @BooksStreet
📚 @Education24x7
📚 @NewsPaperBuzz
📚 @fulfillyourbrain
📚 @ComicsMuseum
📚 @rojgarsuchnaa
📚 @ebookerdoseofficial
📚 @ebookerdoseofficial
📚 @RailwayRecruitmentBoardExam
📚 @StaffSelectionCommissionExams
📚 @UnionPublicServiceCommissionI
📚 @realgroupforprogrammer
▬▬▬▬▬▬▬▬▬▬▬▬▬
♥️ SHAYRI, NAT.. & QUOTES 📸
▬▬▬▬▬▬▬▬▬▬▬▬▬
❤️ @gayatri_darshan
❤️ @felings4you
❤️ @bestshayarilove
❤️ @love_deep_feeling
♥️ @Unknown_Facts_Op
❤ @Bikhre_Lamhe
❤️ @twolineshayrii
❤️ @op_beautyful_nature
❤️ @Amazinginterestingfacts
❤️ @HindiMotivationalSpeaker
❤️ @shayariHARekDILkiAWAJ
▬▬▬▬▬▬▬▬▬▬▬▬▬
🤣 MEMES & JOKES 😜
▬▬▬▬▬▬▬▬▬▬▬▬▬
😅 @jokes_hi_jokes
😅 @majedar_jokes
😅 @Baba_g_ka_thulu
😅 @Raseele_Chutkale
😅 @MemesFrenzy
😅 @Dagniworld
😅 @handsome_haramii
😅 @classic1comedy
😅 Funny memes and Videos
😅 @Haso_Or_Hasao26
😅 @Fun_Alive_andlively
😅 @funny_indian_videos_memes_jokes
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎧 MY MUSICS 🎵
▬▬▬▬▬▬▬▬▬▬▬▬▬
🎧 @AllYourMusic
🎧 @allhitsongs
🎧 @trending_mobie_ringtones_01
▬▬▬▬▬▬▬▬▬▬▬▬▬
〽 EXTRA CHANNELS 👌
▬▬▬▬▬▬▬▬▬▬▬▬▬
👉 @fl3xtools
👉 @CLICKK_ITT
👉 @indiadailyloot
👉 @Hot_Actress_Img
👉 @secrets_des_plantes
👉 @makemoneyonline001
👉 @CHANNELOFPAYMENT
👉 @youtubevediogaming
👉 @women_shopping_deals
👉 @breathtakingwallpapers
👉 @onlinebestdealsam
👉 @youtube_channel_promotion
▬▬▬▬▬▬▬▬▬▬▬▬▬
⟱⟱⟱ 𝗦𝗽𝗼𝗻𝘀𝗼𝗿𝗲𝗱 𝗕𝘆 ⟱⟱⟱
📹 Google Drive Movies 🎬
▬▬▬▬▬▬▬▬▬▬▬▬▬
➕ Add Your Channels ➕
▬▬▬▬▬▬▬▬▬▬▬▬▬
⏰1 hr 🔝 Top 12 hrs🔛 in Channel's

Читать полностью…

Black Hat ☠

📃 Teen Charged in DraftKings Data Breach

By Waqas
If convicted, the alleged culprit Joseph Garrison could face a maximum sentence of 57 years.
This is a post from HackRead.com Read the original post: Teen Charged in DraftKings Data Breach

Читать полностью…

Black Hat ☠

Naked Security
Apple’s secret is out: 3 zero-days fixed, so be sure to patch now!

All Apple users have zero-days that need patching, though some have more zero-days than others.

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

📃 Apple’s secret is out: 3 zero-days fixed, so be sure to patch now!

All Apple users have zero-days that need patching, though some have more zero-days than others.

Читать полностью…

Black Hat ☠

a scam.

Of course, it might also indicate a new business that’s entirely legitimate, so a little more digging is called for. That’s where reviews come in. Aside from the resources listed above, a simple web search of “[company name] reviews” or “[company name] scam” can help you find out if the retailer is legit. 3. Look for the lock icon in your browser when you shop.Secure websites begin their addresses with “https,” not just “http.” That extra “s” stands for “secure,” which means that it uses a secure protocol for transmitting sensitive info like passwords, credit card numbers, and the like over the internet. It often appears as a little padlock icon in the address bar of your browser, so double-check for that. If you don’t see that it’s secure, it’s best to avoid making purchases on that website. 4. Pay with a credit card instead of your debit card.Credit cards offer fraud protections that debit cards don’t. Another key difference: when fraud occurs with a debit card, you fight to get your money back—it’s gone straight out of your account. With a credit card, the issuer fights to get their money back. They’re the ones who take the financial hit.

Additionally, in the U.S., the Fair Credit Billing Act offers the public protection against fraudulent charges on credit cards. The act gives citizens the power to dispute charges over $50 for goods and services that were never delivered or otherwise billed incorrectly. Note that many credit card companies have their own policies that improve upon the Fair Credit Billing Act as well. However, debit cards aren’t afforded the same protection under the Act. Avoid using a debit card while shopping online and use your credit card instead. 5. Use two-factor authentication on your accounts.Two-factor authentication is an extra layer of defense on top of your username and password. It adds a one-time-use code to access your login procedure, typically sent to your smartphone by text or call. Together, that makes it tougher for a crook to hack your account. If any of your accounts support two-factor authentication, the few extra seconds it takes to set up is more than worth the big boost in protection you’ll get. 6. Use a VPN if you’re shopping on public Wi-Fi.Public Wi-Fi in coffee shops and other public locations can expose your private surfing to prying eyes because those networks are open to all. A virtual private network (VPN) encrypts your browsing, shopping, and other internet traffic. That makes it secure from bad actors who try to intercept your data on public Wi-Fi, which can include your passwords and credit card numbers. 7. Protect your devices for shopping.A complete suite of online protection software like McAfee+ can offer layers of extra security while you shop. It includes web browser protection that can block malicious and questionable links that might lead you down the road to malware or a phishing scam— along with a password manager that can create and securely store strong, unique passwords. Avoiding shopping rip-offs on social mediaSocial media has made it easier for sellers large and small to reach customers online. It’s made it easier for scammers to reach victims too.

If you’re on social media, you’ve certainly seen your share of ads. Some are from companies and retailers you know and trust. Yet more are from names you’ve likely never heard of. They might be legitimate businesses, yet they might be fronts for a convincing-looking scam.

These ads end up on social media the same way ads from legitimate businesses do, by way of social media ad platforms. Social media companies created these platforms so advertisers can reach millions of individual users based upon their age group, hobbies and interests, past purchases, and so on.

For example, a scammer might target younger shoppers with an interest in retro fashion. From there, the scammer can narrow that down to target people who live in metropolitan areas who like 1980s memorab[...]

Читать полностью…

Black Hat ☠

Data and computer security | The Guardian
Real estate agents push back against Australian privacy law changes designed to protect personal data

Real Estate Institute of Australia president says additional layer of responsibility could force smaller agencies to close down

* Get our morning and afternoon news emails, free app or daily news podcast

Real estate agents are pushing back against proposed privacy law changes, saying small businesses should not face more red tape to keep customer and tenant data safe.

The Real Estate Institute of Australia president, Hayden Groves, said that an “additional layer of responsibility is really not necessary” on top of agents’ existing duties, saying that increased regulatory risks could be “the last straw” for smaller agencies which may shut up shop.

Sign up for Guardian Australia’s free morning and afternoon email newsletters for your daily news roundup
Continue reading...

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

Naked Security
S3 Ep135: Sysadmin by day, extortionist by night

Laugh (sufficiently), learn (efficiently), and then let us know what you think in our comments (anonymously, if you wish)...

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

📃 Guide to Choosing the Best Family Cell Phone Plan

By Owais Sultan
In a world where staying connected is paramount, the need for a reliable and affordable family cell phone…
This is a post from HackRead.com Read the original post: Guide to Choosing the Best Family Cell Phone Plan

Читать полностью…

Black Hat ☠

Google Online Security Blog
New Android & Google Device Vulnerability Reward Program Initiatives

Posted by Sarah Jacobus, Vulnerability Rewards Team
As technology continues to advance, so do efforts by cybercriminals who look to exploit vulnerabilities in software and devices. This is why at Google and Android, security is a top priority, and we are constantly working to make our products more secure. One way we do this is through our Vulnerability Reward Programs (VRP), which incentivize security researchers to find and report vulnerabilities in our operating system and devices.

We are pleased to announce that we are implementing a new quality rating system for security vulnerability reports to encourage more security research in higher impact areas of our products and ensure the security of our users. This system will rate vulnerability reports as High, Medium, or Low quality based on the level of detail provided in the report. We believe that this new system will encourage researchers to provide more detailed reports, which will help us address reported issues more quickly and enable researchers to receive higher bounty rewards.

The highest quality and most critical vulnerabilities are now eligible for larger rewards of up to $15,000!

There are a few key elements we are looking for:

Accurate and detailed description: A report should clearly and accurately describe the vulnerability, including the device name and version. The description should be detailed enough to easily understand the issue and begin working on a fix.
Root cause analysis: A report should include a full root cause analysis that describes why the issue is occurring and what Android source code should be patched to fix it. This analysis should be thorough and provide enough information to understand the underlying cause of the vulnerability.
Proof-of-concept: A report should include a proof-of-concept that effectively demonstrates the vulnerability. This can include video recordings, debugger output, or other relevant information. The proof-of-concept should be of high quality and include the minimum amount of code possible to demonstrate the issue.
Reproducibility: A report should include a step-by-step explanation of how to reproduce the vulnerability on an eligible device running the latest version. This information should be clear and concise and should allow our engineers to easily reproduce the issue and begin working on a fix.
Evidence of reachability: Finally, a report should include evidence or analysis that demonstrates the type of issue and the level of access or execution achieved.

*Note: This criteria may change over time. For the most up to date information, please refer to our public rules page.

Additionally, starting March 15th, 2023, Android will no longer assign Common Vulnerabilities and Exposures (CVEs) to most moderate severity issues. CVEs will continue to be assigned to critical and high severity vulnerabilities.

We believe that incentivizing researchers to provide high-quality reports will benefit both the broader security community and our ability to take action. We look forward to continuing to work with researchers to make the Android ecosystem more secure.

If you would like more information on the Android & Google Device Vulnerability Reward Program, please visit our public rules page to learn more!

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

wrong hands or gone for good. Apple provides iOS users with a step-by-step guide, and Google offers up a guide for Android users as well.

Apple’s Find My app takes things a step further. Beyond locating a lost phone or wiping it, Find My can also mark the item as lost, notify you if you’ve left it behind, or trigger a sound to help you locate it. (A huge boon in that couch cushion scenario!) Drop by Apple’s page dedicated to the Find My app for more details on what you can do on what devices, along with instructions how. Take these steps as well if your phone gets lost or stolen.1. Contact your mobile provider. They can suspend service to your phone if needed.
2. File a police report. Theft is theft. Report it. I could help get your phone back if it’s found. Also, insurance companies may require a police report number if you file a claim.
3. Change your passwords. Mail, social media, payment, and other apps may be accessible to anyone who can open your phone. Change the passwords to any important accounts or apps you have on your phone right away. All is not lost.With preparation and prevention, you can give yourself reassurance if your phone gets lost or stolen. You have plenty of recovery options, in addition to plenty of ways to prevent bad actors from getting their hands on the sensitive info you keep on it.

The post Where Did I Leave My Phone?” Protecting Your Phone from Loss and Theft. appeared first on McAfee Blog.
➖ Sent by @TheFeedReaderBot

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

Proofpoint News Feed
Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify



➖ @Blackhat_001

Читать полностью…

Black Hat ☠

Proofpoint News Feed
Microsoft Teams is being hacked to crack Office 365 accounts - here's how to stay safe



➖ @Blackhat_001

Читать полностью…

Black Hat ☠

📃 5 Minute Parent’s Guide to Social Media

The time has come. Your kids are chafing at the bit to get on social media and you can no...
The post 5 Minute Parent’s Guide to Social Media appeared first on McAfee Blog.

Читать полностью…

Black Hat ☠

📃 OpenAI Launches ChatGPT App for iOS, Bolstering Accessibility and Safety

By Habiba Rashid
While the ChatGPT app is currently available exclusively for iOS users, OpenAI assures Android users that they are next in line to experience the benefits of the app.
This is a post from HackRead.com Read the original post: OpenAI Launches ChatGPT App for iOS, Bolstering Accessibility and Safety

Читать полностью…

Black Hat ☠

McAfee Blogs
Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks

https://www.mcafee.com/blogs/wp-content/uploads/2023/05/300x200_Blog_Malware-Dead-in-Its-Tracks.png
Concerned about ransomware? McAfee stops it dead in its tracks.

Newly published findings from the independent labs at AV-TEST show that McAfee’s antivirus technology performs best. In recent tests, it detected and blocked top forms of ransomware sooner than the entire field of nine other antivirus technologies.

In their lab setting, AV-TEST used emails loaded with ransomware attachments to test the defenses of computers. Ransomware is a type of malware that infects a network or a device and then typically encrypts the files, data, and apps stored on it, digitally scrambling them so the proper owners can’t access them, often using sophisticated methods of cryptography that are nearly impossible to undo. AV-TEST used ten different forms of ransomware, each one employing the latest techniques. Only McAfee detected and blocked ransomware at its earliest stage—right when it first arrived by email.

Put in practical terms, McAfee eliminated the ransomware threat the moment it spotted it.

https://www.mcafee.com/blogs/wp-content/uploads/2023/05/csm_AV-TEST_2022-12_EPP_Homeuser_McAfee_87b032b0be.png

Other antivirus software wasn’t so quick. They only detected the ransomware when the user clicked and activated the ransomware. Some antivirus allowed one or two attacks to fully succeed—encrypting files with ransomware as a result.

McAfee earned a perfect score of 30/30 points possible in this battery of ransomware tests, earning it the distinction of AV-Test’s “Advanced Certified” certificate.

https://www.mcafee.com/blogs/wp-content/uploads/2023/05/avtest_certified_advanced_logo_2022-12.png

This follows earlier recognition where McAfee was awarded “Best Protection” by AV-Test in March of this year.

Note that while AV-Test used McAfee Total Protection in its tests, McAfee uses the same antivirus technology across all our online protection software. That includes all our McAfee+ products, McAfee Total Protection, McAfee LiveSafe, McAfee Internet Security, McAfee AntiVirus Plus, and McAfee Small Business Security.

For more about ransomware, what it looks like, how it acts, and how you can protect yourself from it, check out our Ransomware Security Guide. It’s part of our broader Security Series, which covers topics from safer online shopping to your privacy on social media and more. Learn more about our award-winning antivirus here—plus even more features that can protect your privacy and identity as well.

The post Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks appeared first on McAfee Blog.

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

🅶🅾🅾🅶🅻🅴 🅿🆁🅾🅼🅾
━━━━━━━━━━━━━━━━━━━━
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🔰 𝗔𝗣𝗣𝗦 & 𝗔𝗖𝗖𝗢𝗨𝗡𝗧𝗦 ♨️
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🔰 @mod_games_store
🔰 @mod_apps_store1
🔰 @M0d_apk
🔰 @fauggamer007
🔰 @gigamodz
🔰 @Mod_Apps_Game
🔰 @hackedsoftware
🔰 @Premium_free_apps
🔰 @Mod_Apk_Store
🔰 @CoLLEt_TIOn
🔰 @hackers_zone_fz
🔰 @ModdedApkStores
🔰 @freepremiuimaccounts
🔰 @UNITEDHACKERTEAM
🔰 @freeprimiumsAcounNtTs
🔰 @crazy_giveaways_OT
🔰 @moddedapplicationss
🔰 @netflixmoodedapp
🔰 @KineMaster_NetFlix_HotStar
🔰 @apks_juegos_premiummods
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
👨‍💻 𝗛𝗔𝗖𝗞𝗜𝗡𝗚 TACH & 𝗖𝗢𝗨𝗥𝗦𝗘𝗦 📈
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
👨‍💻 @dehoodday
👨‍💻 @Blackhat_001
👨‍💻 @courseseekers
👨‍💻 @scriptsPentester
👨‍💻 @AllHackersUnited
👨‍💻 @TechnologyRam
🧑‍💻 @technofreakworld
👨‍💻 @black_hat_hacker9
👨‍💻 @harsh_hacker_yt
🧑‍💻 @maltech112
🧑‍💻 @hackrows
🧑‍💻 @udemymega
🧑‍💻 @cyber_hell_1
🧑‍💻 @demonofpakistan
👨‍💻 @Wordpress_Free_For_You
👨‍💻 @black_hat_hacker_master
👨‍💻 @TenminuteSchoolFree
👨‍💻 Hacking And Programming
🧑‍💻 Comeback Channel
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
📹 𝗠𝗢𝗩𝗜𝗘𝗦 & 𝗪𝗘𝗕-𝗦𝗘𝗥𝗜𝗘𝗦 🎥
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🎬 G-drive Movies
🎬 @Hindi_Hits
🎬 @Mediatek_1
🎬 @movieshindi6
🎬 @HollywoodLifemovies
🎬 @SK_Network_Channel
🎬 @movies_club_0
🎬 @tiktokmania_alt
🎬 @telugumovies_33
🎬 @Hindi_Movie_HD_5
🎬 @moviesmodz
🎬 @AGAwhatsapstatuschannel
🎬 Sunny leone Only Fans
🎬 Lust Girls WhatsApp Numbers
🎬 Insta Girls WhatsApp Numbers
🎬 @Netflixmoviesfreechannel
🎬 @ethical_hacking_in_hindi
🎬 @moviesandseriesonlinedownload
🎬 Hot & Cute Girls WhatsApp Numbers
🎬 Desi Albums
🎬 Delhi Girls WhatsApp Numbers
🎬 Club House Girls WhatsApp Numbers
🎬 Girls Chatting Corner
🎬 Dating With Nurses
🎬 CINE_INFANTIL_FAMILIAR
🎬 CINE INFANTIL FAMILIAR
🎬 SERIES CARTOON NETWORK
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
❤️ 𝐐𝐮𝐨𝐭𝐞𝐬 & 𝐖𝐚𝐥𝐥𝐩𝐚𝐩𝐞𝐫𝐬 🎴
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
♥️ @Quotesinspirations
♥️ @shayari_dil_say
❤️ @twolineshayrii
❤️ @bhaktivide
❤️ @beststatusvideoz
♥️ @Whatsappstatus1080p
♥️ @shayariHARekDILkiAWAJ
♥️ अद्भुत रोचक तथ्य
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
😂 𝗙𝘂𝗻𝗻𝘆 𝗝𝗼𝗸𝗲𝘀 & 𝗩𝗶𝗱𝗲𝗼𝘀 😜
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
😜 @B4bgm_lucky
😜 @FunnyJokesHub
😜 @majedar_jokes
😜 @MEMES_LOVER
😜 @funny_loverpoint
😜 @Raseele_Chutkale
😜 @funny_desi_memes
😜 @DesiHindijokes24
😜 @Comedyvideoandjokes
😜 @Lol_funny_videos_fails_wtf
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
📝 𝗘𝗫𝗧𝗥𝗔 𝗖𝗛𝗔𝗡𝗡𝗘𝗟𝗦 💈
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🎧 @alltrendingsongs
🎧 @Hungama_music_lovers
🎧 @allhitsongs
🎧 @Music_World_India
🛍️ @sellerzonez
🛍️ @ROYAALCLUB
🛍️ @crazyamzdeals
🛍️ @onlinebestdealsam
🛍️ @amazoniansonly
🛍️ AppyMart
❓ @tiptopleaks
❓ @gkstudy0
❓ @marlonetech
❓ @factoland13
❓ @earnunlimi
❓ @AZBusinessbooks
❓ @hotnewsupdates
❓ @Paytmcashop
❓ @BusinessNewsOfficial
❓ @secrets_des_plantes
❓ @mundodefrasesvip
❓ @recetas_de_cocinas_y_postres
❓ @googleplayredeemcodefreeplay
MAKE $500 DAILY
DIRECTORIO DE CANALES/GRUPOS
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
📸 𝗣𝗛𝗢𝗧𝗢𝗚𝗥𝗔𝗣𝗛𝗬 🎑
▭▬▭▬▭▬▭▬▭▬▭▬▭▬
🖼️ @hotschickpics
🖼️ @ViralWallpapers_mob
🖼️ @desipicsandvideosleaks
┎┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┒
POWERED BY : Mod Apps
┖┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┈┚
━━━━━━━━━━━━━━━━━━━━
✝ Add Your 100+ Channel ✝
━━━━━━━━━━━━━━━━━━━━
✘ ʟɪsᴛ ᴅᴏɴ'ᴛ ᴅᴇʟᴇᴛᴇ ᴍᴀɴᴜᴀʟʟʏ. ✘

Читать полностью…

Black Hat ☠

Schneier on Security
Security Risks of New .zip and .mov Domains

Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability.

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

📃 Steer Clear of Rip-offs: Top Tips for Safer Online Shopping

Everyone loves a great deal when they shop online. Until they discover it’s a rip-off.  Social media ads for vintage...
The post Steer Clear of Rip-offs: Top Tips for Safer Online Shopping appeared first on McAfee Blog.

Читать полностью…

Black Hat ☠

ilia. The scammers then create an ad that takes that audience to a phony website loaded with bogus t-shirts, coats, and bags.

All of it costs relatively little. A small ad budget of a few hundred dollars can give scammers exposure to millions of potential victims.

The best way to avoid getting stung by these sites is to do your homework. Seek out the company’s track record. Look for reviews. And if you’re unsure, take a pass. Don’t shop with that company. Buyer be wary …Shopping scams can look and feel rather sophisticated today. With a host of low-cost and easy-to-use tools for publishing and advertising online, scammers of all sizes can create bogus shopping experiences that look convincing.

So buyers be wary. Before you click or tap on that ad, do some research. Determine if the company is legitimate, if it’s had complaints waged against it, and how those complaints were resolved. And always use your credit card. It offers the best consumer protections you have in the event you do end up getting scammed.

The post Steer Clear of Rip-offs: Top Tips for Safer Online Shopping appeared first on McAfee Blog.

➖ @Blackhat_001

Читать полностью…

Black Hat ☠

McAfee Blogs
Steer Clear of Rip-offs: Top Tips for Safer Online Shopping

https://www.mcafee.com/blogs/wp-content/uploads/2023/05/300x200_Blog_051923.png
Everyone loves a great deal when they shop online. Until they discover it’s a rip-off.

Social media ads for vintage wear. Website ads for home entertainment gear. Search ads for handbags. Some of these ads aren’t what they seem. Instead of leading you to deals on a trustworthy ecommerce site, the ads take you to a bogus page designed to steal your money and personal info.

Unfortunately, it happens. And one global report estimated that online shoppers lost $41 billion to fraud in 2022. How do scammers pull it off? With the same tools that legitimate businesses use.

Let’s look at how they do it and how you can steer clear of their tricks. Organized cybercrime in your cartMany of today’s scammers work in organized fashion. They oversee large cybercrime operations that run much like a business. They employ web designers, coders, marketing teams, and customer call centers that mimic a genuine online retailer. Which makes sense. The more they can look and act like the real thing, the more likely they can lure victims into their online stores.

Smaller bands of scammers get in on this action as well. Just as a small business can easily create an online store with any number of off-the-shelf services and solutions, so can a couple of scammers.

In this way, scammers large and small can readily create a professional-looking website, create effective ads to drive traffic to it, and collect financial information from there.

Yet, some scammers don’t steal financial information outright. They might indeed ship you the goods, but they won’t be the goods you ordered. They’re counterfeit. And it might be part of a large-scale operation that exploits child workers.

Whether they’re out to steal your money or sell you knockoff goods, online shopping scams tend to ramp up around gift-giving seasons. They’ll bait shoppers with hard-to-find items, tout steep discounts on other popular items, and otherwise play into the rush of holiday gift buying. Yet they crop up year-round as well. Really, any time you shop is a time to be on the lookout for them. Top tips for safer shopping online1. Stick with known, legitimate retailers online.This is a great piece of advice to start with. Directly typing in the correct address for online stores and retailers is a prime way to avoid scammers online. In the case of retailers that you don’t know much about, the U.S. Better Business Bureau (BBB) asks shoppers to do their research. Ensure that the retailer has a good reputation. The BBB makes that easier with a listing of retailers you can search by typing in their name.

Also in the U.S., you can visit the website of your state’s Secretary of State. There you can search for the business in question, learn when it was founded, if it’s still active, or if it exists at all. For businesses based in a state other than your own, you can visit that state’s Secretary of State website for information. For a state-by-state list of Secretaries of State, you can visit the Secretary of State Corporate Search page here.

For a listing of businesses with international locations, organizations like S&P Global Ratings and the Dun and Bradstreet Corporation can provide background information. 2. Research new sellers for their history and reviews.Never heard of that retailer before? See when they launched their website. A relatively new site might be a sign that it’s part of a scam.

A quick visit to the ICANN (Internet Corporation for Assigned Names and Numbers) website can show you certain background information for any website you type in. Given how quickly and easily scammers can register and launch a website, this kind of information can help you sniff out[...]

Читать полностью…

Black Hat ☠

📃 S3 Ep135: Sysadmin by day, extortionist by night

Laugh (sufficiently), learn (efficiently), and then let us know what you think in our comments (anonymously, if you wish)...

Читать полностью…

Black Hat ☠

📃 FBI, GCHQ Unite To Foil Russian Malware Hacking Tool

By Owais Sultan
A joint advisory from the National Cyber Security Centre has detailed how the UK and its allies have cracked Snake, a Russian malware used by the FSB.
This is a post from HackRead.com Read the original post: FBI, GCHQ Unite To Foil Russian Malware Hacking Tool

Читать полностью…

Black Hat ☠

Proofpoint News Feed
Proofpoint Joins Joint Cyber Defense Collaborative



➖ @Blackhat_001

Читать полностью…

Black Hat ☠

📃 Is it Getting Harder to Pigeonhole Games into Specific Genres?

By Owais Sultan
Back in 2015, a study from Syracuse University analysed how grouping video games into genres can be limited.…
This is a post from HackRead.com Read the original post: Is it Getting Harder to Pigeonhole Games into Specific Genres?

Читать полностью…

Black Hat ☠

one. Turn on “Find My Phone.”Another powerful tool you have at your disposal is the find my phone feature made possible thanks to GPS technology. The “find my” feature can help you pinpoint your phone if your lost or stolen phone has an active data or Wi-Fi connection and has its GPS location services enabled. Even if the phone gets powered down or loses its connection, it can guide you to its last known location.

Setting up this feature is easy. Apple offers a comprehensive web page on how to enable and use their “Find My” feature for phones (and other devices too). Android users can get a step-by-step walkthrough on Google’s Android support page as well. Back up your stuff in the cloud.Thanks to cloud storage, you might be able to recover your photos, files, apps, notes, contact information, and more if your phone is lost or stolen. Android owners can learn how to set up cloud backup with Google Drive here, and iPhone users can learn the same for iCloud here. Write down your phone’s unique ID number.Here come a couple of acronyms. IMEI (International Mobile Equipment Identity) or MEID (Mobile Equipment Identifier) are two types of unique ID numbers assigned to smartphones. Find yours and write it down. In case of loss or theft, your mobile carrier, police department, or insurance provider might ask for the information to assist in its return or reimbursement for loss.

* For Android phones, you can find it in Settings à About Phone.
* On iPhones, you can find it in Settings à General à About. More ways to protect your smartphone from loss or theft.Beyond digital security measures, plenty of loss and theft prevention falls on you. Treat your phone like the desirable item it is. That’s a big step when it comes to preventing theft. Keep your phone close.And by close, we mean on your person. It’s easy to leave your phone on the table at a coffeeshop, on a desk in a shared workspace, or on a counter when you’re shopping. Thieves might jump on any of these opportunities for a quick snatch-and-grab. You’re better off with your phone in your pocket or zipped up in a bag that you keep close. Secure your bags and the devices you carry in them.Enterprising thieves will find a way. They’ll snatch your bag while you’re not looking. Or they might even slice into it with a knife to get at what’s inside, like your phone.

Keep your bag or backpack close. If you’re stopping to grab a bite to eat, sling the handles through a chair leg. If you have a strong metal carabiner, you can use that too. Securing your bag like that can make it much tougher for a thief to walk by and swipe it. For extra security, look into a slash-resistant bag. Stay aware.Thieves will also look for an easy mark. People who appear a little distracted, lost, or even dozing off. Aside from securing your bags, keep an eye on your surroundings. Look at people and smile, walk with purpose, and generally put across an air of confidence. Behavior like this sends a clear signal to thieves—you’re aware. That might be enough for them to pass you up. Consider what you’re carrying—and where you carry it.If you have a credit card and ID holder attached to the back of your phone, you might want to remove your cards from it. That way, if your phone gets snatched, those important cards won’t get snatched as well. Take a pass on keeping things in your back pocket. Use your front pocket where it’s much more difficult for a thief to pick your pocket. And if the unfortunate happens, know how to remotely, track, lock or erase your phone.In the event of your phone getting lost or stolen, a combination of device tracking, device locking, and remote erasing can help protect your phone and the data on it.

Different device manufacturers have different ways of going about it. But the result is the same—you can prevent others from using your phone, and even erase it if you’re truly worried that it’s in the [...]

Читать полностью…
Подписаться на канал