Showing posts with label Hacked. Show all posts
Showing posts with label Hacked. Show all posts

Saturday, September 18, 2021

Oh No!! - Did you get Notification of a Government-backed attack in your email?!


Notification Email Did You Get One?

 Government Backed Attack!


https://techcrunch.com



I follow Chris Rufo who is an activist against Critical Race Theory and in his current Newsletter he received notification "Government-backed attack" apparently when you rock the establishment and you are against becoming an Experimental Monkey with changing the outcome of a Child in School and ones thoughts; Do they go to ends of the Earth to intimidate you?  (Intimidate: frighten or overawe (someone), especially in order to make them do what one wants.) 
What you think? Leave a comment.


I did some research and google sends you a notification, here is what Google is showing on their page, What is a Government-backed attack:

  • We send the alert to let you know that we believe government-backed attackers are trying to access the account of one of your users. An attack happens to less than 0.1% of all Google Account users.
  • There's a chance the alert is a false alarm. However, we believe we detected activities that government-backed attackers use to try to steal a password or other personal information. Such activity includes the user receiving an email containing a harmful attachment, links to malicious software downloads, or links to fake websites that are designed to access passwords.
  • We can’t reveal what tipped us off because the attackers will take note and change their tactics. If they're successful, they could access data or take other actions using the user's account. You should take steps to secure the user's account from the attack. 


If you have received such notifications you should do the following:
  • Check your email address to see if you are listed with any websites you visited by your email or phone number that have been hacked. Breached πŸ‘ˆ
  • Not familiar with the senders email address just don't open it and DO NOT click on any links within the email. 
  • Reset your password, do not share it with anyone.
  • Use a two step verification
  • Make sure you have updated your virus software. 
  • You might also want to use u a VPN.

250 x 250



Concerned about getting breached? If you have your own Website is it hosted with a Secure Hosting Company?
  • When shopping around it does matter if you look for Quality Hosting for your Website. Research if their has been any breaches or they've been hacked. Sometimes you pay more for a better host, it's a better safe then sorry to have a hosting site for your content that is secure and has a secure track record. One question you might want to find out, is where they are located and how many years they've been in business and even their employee count, Shop like you are buying your first brand new car. 


                 Many Awards Ultra has Received Over the Last 19 Years
Shop UltraWebHosting Today!


Other Important information you might want to read if you are a WhatsApp user:



You can also check out some Articles by Chris Rufo, here are some titles and links to his work.






Now you know!
Dare - Challenge - Learn! 

Be not afraid of life. Believe that life is worth living, and your belief will help create the fact. William James - American philosopher 

Sunday, September 5, 2021

Beware of Hack SPYING! USB-C Cell Phone Cables Key Logging You!

 Key Logging - Privacy Invasion from Cell Phone Cables

"Hand Using Mouse at Desk with Keyboard and Cup" by Image Catalog is marked with CC0 1.0

What is Key Stroke also called Key logging?

Keystroke often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program in which you can be monitored on your computer activity and phone activity. 

Learn more about πŸ‘‰Keystroke Logging

Did you get a new USB cable for your Birthday, or a Spouse or somebody who wants to spy on you? A security researcher that goes by the name MG (mg.lol/blog/) made the worlds most dangerous USB Cable and it just got better! MG showed motherboard prior in 2019 at a DEF CON hacking conference and now here is the current end product now being sold. MG focus on Apple Lightning USB cable but said the ability to do the same on other cables is possible.

MG tweeted:  OMG Cable - "The New Batch Now in USB C, the implant is much smaller, but it’s even more powerful than before. Smartphone/tablet attacks, extreme long range triggers, geofencing, etc."

As shown on a video testing the product from 300 feet away. Video & Music @KANGAkult logo & art contributions @dustrial


Vice.com Reporter Motherboard Joseph Cox spoke with MG:

  • "There were people who said that Type C cables were safe from this type of implant because there isn't enough space. So, clearly, I had to prove that wrong. :)," MG told Motherboard in an online chat.
  • MG said that the new cables now have geofencing features, where a user can trigger or block the device's payloads based on the physical location of the cable.
  • "We tested this out in downtown Oakland and were able to trigger payloads at over 1 mile," he added.

What is Geofencing? Geofencing is a location-based service in which a creator of an app or other platform/software uses GPS, RFID, Wi-Fi or cellular data to send/trigger messages like SMS, Email or In-App/App-based notifications (pre-programmed action) when mobile devices that enter, exit, or remain parked in the geographical location. For more information visit webengage.com

Motherboard only tested the cables in relatively close proximity, but MG said they've improved the range of the cables.


As Shown on Motherboard YouTube - OMG Interface

You can visit the following website to get more info Vice.com & Motherboard YT

My personal opinion: why in the heck would anyone want to cause such damage and harm on another human being? What if some creeper wanted to Key Log your Teenage daughter or Teenage son. Me personally I have been a victim of someone who targeted me, this type of activity can lead to great harm. I can only tell you beware of who gives you anything that pertains to Cell Phones, Cables and a Computer.  As you can see by the following picture, I purchased a new cable from a legit well known store that carries major brands and when I plug my cell phone my USB-C for a ZTE and the Phone Purchased at MetroPCS, my third party cable, I get a popup screen: 

  • Your device is charging slowly: 
  • Use original charger and cable that came with your device. 
  • Inspect and remove any visible foreign material from cable connection


I did a search and I couldn't find anything on why when I use my cable for my cell I get  popup window.  Am I hacked and tracked? Leave a comment, What do you believe this is showing and why on my cell phone ZTE.

What to do if you have been key logged and it's not detected. Me personally I would not use the Computer or Cell phone any longer and I would want to purchase everything new, it's like when you get a brand new car and someone hits it, it just isn't the same. At what cost do you want to be spied on by someone who has it out for you and then later maybe use it against you just to be evil, evil intentions! 

Here is additional information to read about Key logging on your PC and what you need to know. Please visit usa.kaspersky.com/resource-center/definitions/keylogger




Read Breached, You are listed on 80 Billion records!
πŸ‘‡




Now you know!
Dare - Challenge - Learn! 
Be not afraid of life. Believe that life is worth living, and your belief will help create the fact. William James - American philosopher. 



Avid Hemp CBD
Please check out our Affiliate Avid Hemp - Great Deals!
Visit our Affiliate for some Great Deal - Avid Hemp

Wednesday, August 25, 2021

Beware of Trojan - 2 Billion Users - Popular WhatsApp Virus Problem.

WhatsApp Popular Mod FMWhatsApp Trojan

πŸ“²Attention Android users using WhatsApp!

 


As of 2021 there are approx. 2 billion active users using WhatsApp, more popular then Facebook messaging service - Source Statista

Have you recently been wondering why you are being signed up for Paid Subscriptions and where that might be coming from?

Attention Android users, Kaspersky discovered the Trojan (Mobile Virus Detection) called Trojan.AndroidOS.Triada.ef.  FMWhatsApp it's being reported the Triada adds more Malicious Malware, here is what is being reported by Kaspersky on their website:

  • Trojan-Downloader.AndroidOS.Gapac.e, which downloads and runs other malicious modules and can also display full-screen ads at unexpected moments
  • Trojan-Downloader.AndroidOS.Helper.a, which downloads and runs the installer module of the xHelper Trojan and runs invisible ads in the background
  • Trojan.AndroidOS.MobOk.i, a Trojan that signs up for paid subscriptions
  • Trojan.AndroidOS.Subscriber.l, another Trojan that signs up for paid subscriptions
  • Trojan.AndroidOS.Whatreg.b, the most complex Trojan in the list, signs in to the WhatsApp account on the victim’s phone, intercepting the login confirmation text. The device can then become a site for various types of illegal activity such as spam distribution or illegal trading.


Save BIG on Amazon Products with RebateKey!


Expert Igor Golovins at Kaspersky States: The MobOk Trojan opens the subscription page in an invisible window to click “subscribe” while posing as the user and intercepts the confirmation code to confirm the subscription. Get additional information on the Operational side of the Trojan, Click here


How to protect yourself from Trojans and Malware
  • Make sure you download from a legit App Stores
  • Read all the fine print what you are agreeing to before you download it onto your Cell Phone (What they Share or what type of Activity that can change) on your cell phone and who they share your information with (Third Party.)
  • Read the terms and conditions and Privacy information (What We Collect)
  • Always have Mobile Virus Protect. I prefer Kaspersky Protection, but you can use any well known Mobile Virus Protection.

Here is additional information that is vital regards to your privacy and what information is used by thousands of Companies. It's called LexisNexis who harbors 80 Billion Records and you are most likely listed on their database combined with criminals. Read: 80 Billion Records Stop Consuming me and remove your information and PROTECT YOUR PRIVACY!

Thanks for reading and please share and leave some comments.


Get up to 80% Off On Mobile Phone Virus Protection From Our Affiliate Antivirus Deals


Sell Android Cell Phone

Now you know!
Dare - Challenge - Learn! 
Be not afraid of life. Believe that life is worth living, and your belief will help create the fact. William James - American philosopher 


"Happy attractive young woman using mobile phone in summer resort on a tropical Bali island, Indonesia." by Artem Beliaikin is marked under CC0 1.0. To view the terms, visit https://creativecommons.org/licenses/cc0/1.0/

Sunday, August 22, 2021

CyberAttack T-Mobile - Metro by T-Mobile -Updated Information. Secure Your Information Now!

 

What you need to know! Update



Update: Several issues happening you need to beware of with T-Mobile's Cyber Attack and what you can do to secure your information. Metro by T-Mobile is also affected by the Cyber Attack. Look out for Targeting Emails and Phishing.

3 Main Goals.

  • Secure your information.(Get your information off of 80 Billion Records, Free Information Click Here. You are listed with your Social Security Number.)
  • Change all your pins and passwords immediately if you haven't already done so.
  • Get protection! Secure your phone. PC, MAC & MOBILE Antivirus Deals Inc.


Reports are indicating a massive breach throughout T-Mobile and Metro by T-Mobile.
  850,000 prepaid T-Mobile Customers names, phone number and pins affected. T-Mobile is reporting the changed all the pins. Metro by T-Mobile 52,000 names included in the cyberattack.

Following statement issued on T-Mobile.

  • We previously reported information from approximately 7.8 million current T-Mobile postpaid customer accounts that included first and last names, date of birth, SSN, and driver’s license/ID information was compromised. We have now also determined that phone numbers, as well as IMEI and IMSI information, the typical identifier numbers associated with a mobile phone, were also compromised. Additionally, we have since identified another 5.3 million current postpaid customer accounts that had one or more associated customer names, addresses, date of births, phone numbers, IMEIs and IMSIs illegally accessed. These additional accounts did not have any SSNs or driver’s license/ID information compromised. Click Here for further reading

It is also being reported a class action lawsuit is being filed against T-Mobile to read further about the Lawsuit click here and The Federal Communications Commission is opening an investigation as reported by Reuters. I visited Federal Communications Commission website and didn't see any press release, you can keep up to date with Public Notices daily digest -Click Here 

Please Share or leave a comment.



Here are some Products for your review to secure your PC-MAC-MOBILE. 
My favorite is Kaspersky Antivirus Deals Inc. and other Important information.

Stop Human Trafficking!


Now you know!
Dare - Challenge - Learn! 
Be not afraid of life. Believe that life is worth living, and your belief will help create the fact. William James - American philosopher 


Disclaimer rights of logo is owned by the companies shown throughout this post for recognition and for the blind or eyesight problems. πŸ‘€

Thursday, August 19, 2021

Consumer Protection - What you need to know and how to protect yourself. T-Mobile Breach.

 Oh No 😩 A Security Breach & Hacked, what do I do now?

On Aug 16, 2021 T-Mobile announced a security breach and it was reported on Aug 18, 2021 and posted on 9to5mac and confirmed over 47+ million T-Mobile users information taken, includes Social Security Numbers. 

A little information about T-Mobile.  T-Mobile is the brand name used by the mobile communications subsidiaries of the German telecommunications company Deutsche Telekom AG. The brand is active in the Czech Republic, the Netherlands, Poland, and the United States.

What is T-Mobile telling it's customers to do?  If you are a customer of T-Mobile please read T-Mobile's "Our Response" by T-Mobile Click Here 

Now that you read the above and we all know that since the information highway exploded online and you sign up for this or that and your information is everywhere, lets call it your finger prints left at every place you ever visited online a Digital Marketers dream.

It's very important when any type of breach happens to your privacy or it has been stolen sometimes you can't leave it up to any Company to protect you because no matter how hard you've tried erasing that finger print smudge it's just not going away.

  • Here are some helpful easy tips.

Contact all three Credit Bureaus  Equifax, Experian, TransUnion and get a free copy of your Credit Report.
  1. Experian- Your Free Credit Report Once you get the report review it,  if you see anything fishy you can contact the party that is showing up on your credit report, if you see an old debt you are able to get old debts dropped off, just look up in your state how long a collection can be collected on you - (Each states has different Laws on Collection of a debt) Amount of years for a Collection Agency to collect a debt.. You can request it be removed. (this will also helps you repair your credit)
  2. Equifax- will give you one free Credit Report a year Click Here
  3. TransUnion- will also give you one free Credit Report a year Click Here
  • Remove yourself from a Company that holds 80 Billion Record!
Read how to remove yourself from databases that track your Email addresses, Name, Address, Phone Number, Driver License's,  just about everything, your home purchases, car purchases and businesses you've open and some of your social media you signed up with, they even have some things you've have written on a comment that you left on a website you visited.  Here is one database that you can get yourself removed off Click Here and remove yourself from 80 Billion records, YES! you are reading correctly 80 BILLON RECORDS!

Click Here  Consumerfinance.gov. Lots of information in PDF form.

If all fails hire a Good Attorney and sue the Company - If you end up with Monetary Damages you might recoup some of the money stolen from Fraud in your name and remember don't let any Collection Agency Bully you, YOU HAVE RIGHTS!

  • Disclaimer rights of logo is owned by T-Mobile placed here for recognition for the blind or eyesight problems. πŸ‘€
    • NOW YOU KNOW! DARE-CHALLANGE!
      Share to your facebook
      Click on link to Share to your Facebook

      CLEVELAND, OH - TENANT CONCERNS OF SAFETY HAZARD - 3 YEARS CALLS GO UNANSWERED FROM STREET LIGHT PROPERTY MANAGEMENT TO FIX THE PROBLEMS

      STREET LIGHT RENTALS A family of 5 with 3 small children out of Cleveland Ohio has been dealing with it raining inside a bedroom growing mo...