You Name clumped with people you don't even know! 👆 Click on Breached!
Check to see if your email or phone number has been compromised and get a list of the websites that your email or phone was included in the breach! I was listed on 3 websites that had been breached, see below.
PWND:
According to haveibeenpwned there has been 11,454,726,823 pwned (Breached) accounts.
What is pwned? Troy Hunt Microsoft Regional Director and Most Valuable Professional awardee, A Developer Security Blogger for TroyHunt.com who runs haveibeenpwned gives an explantion:
What does "pwned" mean?
The word "pwned" has origins in video game culture and is a leetspeak derivation of the word "owned", due to the proximity of the "o" and "p" keys. It's typically used to imply that someone has been controlled or compromised, for example "I was pwned in the Adobe data breach". Read more about how "pwned" went from hacker slang to the internet's favourite taunt.
I checked several of email addresses, on the first email I checked I was Breached 3 times at the following Websites. I remember using Lumin on Google Chrome as for the other two I don't remember using the other two websites. One of my most used email addresses I used wasn't pwnd thank goodness! Check to see if you are listed on any compromised website you have used!
Dailymotion - 85 Million Users Breached - Dailymotion is a French video-sharing technology
Lumin PDF - 15.5 Million Users Breached - Lumin brings your documents to life with smart PDF
Verifications.io - 763 Million Users Breached - Verifications.io is an “email verification platform” used by marketers, one of the largest of its kind.
Suffice to say just those 3 websites combined total of 843 Million Breaches. 😬 YIKES! that pretty damn scary knowing just those 3 websites had that many breaches.
How do you secure your emails?Troy Hunt says to use one password generator, use 2 factor authentication and get email alerts.
You can always secure your network or family computer using with a VPN - A virtual private network. Don't think your tech savvy? Don't worry I am not tech savvy and using a VPN is easier then it looks. I placed one of my affiliates here, please check them out or shop around for a VPN. Scroll down and check your email, no fee!
Get 20% Off! Coupon Code Ivacy20
Check your email address to see if it's been Breached!
Key Logging - Privacy Invasion from Cell Phone Cables
"Hand Using Mouse at Desk with Keyboard and Cup"by Image Catalog is marked with CC0 1.0
What is Key Stroke also called Key logging?
Keystroke often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program in which you can be monitored on your computer activity and phone activity.
Did you get a new USB cable for your Birthday, or a Spouse or somebody who wants to spy on you? A security researcher that goes by the name MG (mg.lol/blog/) made the worlds most dangerous USB Cable and it just got better! MG showed motherboard prior in 2019 at a DEF CON hacking conference and now here is the current end product now being sold. MG focus on Apple Lightning USB cable but said the ability to do the same on other cables is possible.
MG tweeted: OMG Cable - "The New Batch Now in USB C, the implant is much smaller, but it’s even more powerful than before. Smartphone/tablet attacks, extreme long range triggers, geofencing, etc."
As shown on a video testing the product from 300 feet away. Video & Music @KANGAkult logo & art contributions @dustrial
"There were people who said that Type C cables were safe from this type of implant because there isn't enough space. So, clearly, I had to prove that wrong. :)," MG told Motherboard in an online chat.
MG said that the new cables now have geofencing features, where a user can trigger or block the device's payloads based on the physical location of the cable.
"We tested this out in downtown Oakland and were able to trigger payloads at over 1 mile," he added.
What is Geofencing? Geofencing is a location-based service in which a creator of an app or other platform/software uses GPS, RFID, Wi-Fi or cellular data to send/trigger messages like SMS, Email or In-App/App-based notifications (pre-programmed action) when mobile devices that enter, exit, or remain parked in the geographical location. For more information visit webengage.com
Motherboard only tested the cables in relatively close proximity, but MG said they've improved the range of the cables.
My personal opinion: why in the heck would anyone want to cause such damage and harm on another human being? What if some creeper wanted to Key Log your Teenage daughter or Teenage son. Me personally I have been a victim of someone who targeted me, this type of activity can lead to great harm. I can only tell you beware of who gives you anything that pertains to Cell Phones, Cables and a Computer. As you can see by the following picture, I purchased a new cable from a legit well known store that carries major brands and when I plug my cell phone my USB-C for a ZTE and the Phone Purchased at MetroPCS, my third party cable, I get a popup screen:
Your device is charging slowly:
Use original charger and cable that came with your device.
Inspect and remove any visible foreign material from cable connection
I did a search and I couldn't find anything on why when I use my cable for my cell I get popup window. Am I hacked and tracked?Leave a comment, What do you believe this is showing and why on my cell phone ZTE.
What to do if you have been key logged and it's not detected. Me personally I would not use the Computer or Cell phone any longer and I would want to purchase everything new, it's like when you get a brand new car and someone hits it, it just isn't the same. At what cost do you want to be spied on by someone who has it out for you and then later maybe use it against you just to be evil, evil intentions!