Monday, September 13, 2021

Alert Breached- Check Your Email NOW! Millions of Emails Breached!

 

Have you been pwned?



You Name clumped with people you don't even know! 👆 Click on Breached!


Check to see if your email or phone number has been compromised and get a list of the websites that your email or phone was included in the breach! I was listed on 3 websites that had been breached, see below.


PWND: 

According to haveibeenpwned there has been 11,454,726,823 pwned (Breached) accounts. 

What is pwned? Troy Hunt Microsoft Regional Director and Most Valuable Professional awardee, A Developer Security Blogger for TroyHunt.com who runs haveibeenpwned gives an explantion:

What does "pwned" mean?


AudiobooksNow - Digital Audiobooks for Less



I checked several of email addresses, on the first email I checked I was Breached 3 times at the following Websites. I remember using Lumin on Google Chrome as for the other two I don't remember using the other two websites. One of my most used email addresses I used wasn't pwnd thank goodness! Check to see if you are listed on any compromised website you have used!


  • Dailymotion - 85 Million Users Breached - Dailymotion is a French video-sharing technology
  • Lumin PDF - 15.5 Million Users Breached - Lumin brings your documents to life with smart PDF
  • Verifications.io - 763 Million Users Breached - Verifications.io is an “email verification platform” used by marketers, one of the largest of its kind.

Suffice to say just those 3 websites combined total of 843 Million Breaches. 😬 YIKES! that pretty damn scary knowing just those 3 websites had that many breaches.  

How do you secure your emails? Troy Hunt says to use one password generator, use 2 factor authentication and get email alerts.

You can always secure your network or family computer using with a VPN - A virtual private network. Don't think your tech savvy? Don't worry I am not tech savvy and using a VPN is easier then it looks.  I placed one of my affiliates here, please check them out or shop around for a VPN. Scroll down and check your email, no fee!


250 x 250
Get 20% Off! Coupon Code Ivacy20





Check your email address to see if it's been Breached!
You will also find Recent Breaches
👇



💗I've added Free Stuff to my Blog💗


.

Now you know!
Dare - Challenge - Learn! 

Be not afraid of life. Believe that life is worth living, and your belief will help create the fact. William James - American philosopher 


Botanical and Vitamin Infused Cosmetics

  • Disclaimer rights of logo is owned by their companies listed here. I have placed here for recognition for the blind or eyesight problems.  😎

Sunday, September 5, 2021

Beware of Hack SPYING! USB-C Cell Phone Cables Key Logging You!

 Key Logging - Privacy Invasion from Cell Phone Cables

"Hand Using Mouse at Desk with Keyboard and Cup" by Image Catalog is marked with CC0 1.0

What is Key Stroke also called Key logging?

Keystroke often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program in which you can be monitored on your computer activity and phone activity. 

Learn more about 👉Keystroke Logging

Did you get a new USB cable for your Birthday, or a Spouse or somebody who wants to spy on you? A security researcher that goes by the name MG (mg.lol/blog/) made the worlds most dangerous USB Cable and it just got better! MG showed motherboard prior in 2019 at a DEF CON hacking conference and now here is the current end product now being sold. MG focus on Apple Lightning USB cable but said the ability to do the same on other cables is possible.

MG tweeted:  OMG Cable - "The New Batch Now in USB C, the implant is much smaller, but it’s even more powerful than before. Smartphone/tablet attacks, extreme long range triggers, geofencing, etc."

As shown on a video testing the product from 300 feet away. Video & Music @KANGAkult logo & art contributions @dustrial


Vice.com Reporter Motherboard Joseph Cox spoke with MG:

  • "There were people who said that Type C cables were safe from this type of implant because there isn't enough space. So, clearly, I had to prove that wrong. :)," MG told Motherboard in an online chat.
  • MG said that the new cables now have geofencing features, where a user can trigger or block the device's payloads based on the physical location of the cable.
  • "We tested this out in downtown Oakland and were able to trigger payloads at over 1 mile," he added.

What is Geofencing? Geofencing is a location-based service in which a creator of an app or other platform/software uses GPS, RFID, Wi-Fi or cellular data to send/trigger messages like SMS, Email or In-App/App-based notifications (pre-programmed action) when mobile devices that enter, exit, or remain parked in the geographical location. For more information visit webengage.com

Motherboard only tested the cables in relatively close proximity, but MG said they've improved the range of the cables.


As Shown on Motherboard YouTube - OMG Interface

You can visit the following website to get more info Vice.com & Motherboard YT

My personal opinion: why in the heck would anyone want to cause such damage and harm on another human being? What if some creeper wanted to Key Log your Teenage daughter or Teenage son. Me personally I have been a victim of someone who targeted me, this type of activity can lead to great harm. I can only tell you beware of who gives you anything that pertains to Cell Phones, Cables and a Computer.  As you can see by the following picture, I purchased a new cable from a legit well known store that carries major brands and when I plug my cell phone my USB-C for a ZTE and the Phone Purchased at MetroPCS, my third party cable, I get a popup screen: 

  • Your device is charging slowly: 
  • Use original charger and cable that came with your device. 
  • Inspect and remove any visible foreign material from cable connection


I did a search and I couldn't find anything on why when I use my cable for my cell I get  popup window.  Am I hacked and tracked? Leave a comment, What do you believe this is showing and why on my cell phone ZTE.

What to do if you have been key logged and it's not detected. Me personally I would not use the Computer or Cell phone any longer and I would want to purchase everything new, it's like when you get a brand new car and someone hits it, it just isn't the same. At what cost do you want to be spied on by someone who has it out for you and then later maybe use it against you just to be evil, evil intentions! 

Here is additional information to read about Key logging on your PC and what you need to know. Please visit usa.kaspersky.com/resource-center/definitions/keylogger




Read Breached, You are listed on 80 Billion records!
👇




Now you know!
Dare - Challenge - Learn! 
Be not afraid of life. Believe that life is worth living, and your belief will help create the fact. William James - American philosopher. 



Avid Hemp CBD
Please check out our Affiliate Avid Hemp - Great Deals!
Visit our Affiliate for some Great Deal - Avid Hemp

CLEVELAND, OH - TENANT CONCERNS OF SAFETY HAZARD - 3 YEARS CALLS GO UNANSWERED FROM STREET LIGHT PROPERTY MANAGEMENT TO FIX THE PROBLEMS

STREET LIGHT RENTALS A family of 5 with 3 small children out of Cleveland Ohio has been dealing with it raining inside a bedroom growing mo...