Search the Community
Showing results for tags 'hack'.
-
Hello guys! So the other there, one of my friends wanted to get some scripts on a Roblox game (neither did I or he know that, the respective game did not have scripts for a while) and since I used some scripts in the past, I advised him to proceed with caution. So he downloaded a injector with some scripts, but in the installation setup he had to allow all oh those crappy bloatware and spam, however I told him to just skip those, but he did not. After he did all that, a bunch of windows CMD'S and also a lot of google tabs. Then hes PC crashed, and he got security alerts from all of his Google Accs., and right after that, his Steam Acc. and Discord Acc. started sending those weirds mesaages to all his friends, to click on a link for something free and stuff, after that he reinstalled windows and created new passwords. It all went great, until yesterday when all of this stuff happened again. So what is to do? Im guessing that the virus had some kind of deep roots that it restared again, since he didnt do shady stuff after the reinstall. Can you guys help me and him with this? Also, I am sorry if i picked the wrong topic.
-
Hello I’m considering ghost spectre 11 on my old laptop with ssd and 8gb if ram and wanted to install a good lite windows 11 (because I heard it’s better in performance) but I’m considered that it may be an account spyware of some sort to steal accounts, is it safe? also is there other lite os better than it in performance for gaming but not too ugly? Thanks.
-
"I will preface this post by saying that I have just lost my whole dogechain.info wallet balance, so naturally I have scoured the web and Reddit for answers. Searching for 'hacked,' 'stolen,' or the like will bring up posts with the exact same thing happening. Random unauthorised transactions with no notification that they had occurred. Some of these transactions have actually been made to the same wallet. This is a serious issue which everyone needs to be made more aware of. Everyone has different preferences on who to buy from/which wallet to use etc, and some people call each other stupid for using dogechain.info, for example. If we could have some proper talks about this topic it would be brilliant. It's been a horrible experience for those affected." - above is a Reddit post which was just deleted by r/dogecoin mods. FYI: it's Rap Escape. I know.
-
I did a fair amount of research before resorting to this, but my problem seems to be 1 in 1000. I JUST purchased a brand new pair of "bluetooth" headphones (in reality they use a 2.4hz dongle thing) NONEtheless when I plug them in to charge they themselves power down. Why in gods name. But I'm hoping to fear not as you great folk may have a hacky open the headphones type solution; for which I'm willing to put under the knife if need. Any additional help would be appreciated like say "oh you're so stupid this is a waste of time and impossible just return them"
- 9 replies
-
- help
- headphones
-
(and 2 more)
Tagged with:
-
After canceling creating a file system on OMV I am not able to flash anything to my 64 GB USB. I am not able to format it in NTFS. When I try to do it the USB gets disconnected and loses its partition and a popup says windows couldn't identify the device plugged It won't even show up on file explorer. I have to physically remove and reconnect the USB to be detected and should create a new partition. But still not working I tried cleaning it Also tried it on other Pc Please help me fix it because it is a new USB
-
First time that I see this, it would be interesting if it is tested, but I don't have an xbox series x. Interesting product, I hope it is useful for someone. (Aliexpress Link)
-
Hey, My boss and I are investigated a potential compromise of our network, and we say that one of our windows servers was using the tor browser. It was only once, but we looked into it and found the folder the exe was in. See picture. We were wondering if this is proof of a compromised server, and if so how to remove the file
-
Hey Guys, Its been a crazy week. My fiancé 's father took his own life. He has an Android phone with the "swipe pin" and we thought we knew it and we don't. Any ideas?
- 3 replies
-
- android
- phone question
-
(and 2 more)
Tagged with:
-
So yeah. I woke to < removed by moderation > now owns my Facebook account They striped the account of my actual email, phone number, and even added a 6 digit pin that can only be accessed by their email. I managed to, thankfully, find the email (as presented) and change the password, but I still need the 6 digit code to log in. Is there a way to access this email at all?? And yes, hacking is my last resort, but just I want my account back. That, and I have next to no clue on how to hack an email. Thank you in advance for any advice you may have! ( I have tried several times to contact Facebook and it's just been radio static) Edit: They found out I changed the password and changed it again themselves. Now I only have their email.
- 7 replies
-
- hack
- hacked account
-
(and 2 more)
Tagged with:
-
So, I recently bought a QNAP TS-473A and also a QNAP QXP-T32P.When I wanted to install the card I realised that I messed up.The card does not match the PCIE slot on the NAS.The PCIe port on the NAS are x4 Gen3, two of them but don't have that first part. So the card fits in the slot but the first part of the card remains unconnected ( in air ).My question is...Can I hack it? Can I connect with the X1 cable the first part of the card and put the other side of the cable in the second slot? Do I risk burning the card or the nas? I can't manage to figure out hot this works regarding powering. The last pictures are from QNAP TVS-1288X which is the nas that the card was designed for.This NAS also cost around 3000+ euro and mine was around 600 euro, so a big difference. Any engineer advise would be highly appreciated as this is the only solution for having a DAS / NAS configuration at this price.
- 8 replies
-
- thunderbolt
- qnap
-
(and 4 more)
Tagged with:
-
I'm curious, how bad would this be after you rip and tear it apart such as to force fit it into the role?
- 5 replies
-
- virtual reality
- diy
-
(and 4 more)
Tagged with:
-
Hello, I will start this with some backstory of the event that happened. In the morning I powered on my PC and discord has automatically logged me out (I'm usually logged in automatically) and for my 5-6 years of using discord it has never logged me out. At first I thought nothing of it, later on I received an email from google that someone knows my password and I should change it, they said my password appeared in a non google data breach. This concerned me and also answered my question about my discord however although my email and discord emails are the same they do not share the same passwords. Overall I still didn't think too much of it, just a data breach, happens all the time now so i just changed my password and didn't think about it again. Later on in the day I discovered with conversations with my family that my mother, father and sister's email all had the same email from google that someone knows their password and should change it, also the email was sent near around the same time as each other. What worries me here is that this seems targeted, I mean obviously all our passwords are different, and the thing is that my email that was hacked is kind of a email I don't use, like I think I only signed up to discord and one other thing with it and that's it so I don't know where the data breach with my details are. Because even if it came from discord or the other website I used to register my email with, my other families members 100% haven't signed their emails to that service. This is all assuming that our details were involved in a non google data breach, since google told us this. Anyways, I just wrote this looking for answers, what happened, how could of this happened, is this a targeted attack against me and my family? I don't know why it would be, were not important or anything. Some extra details, when i was trying to find a common link to come up with an explanation, the thing that connects our emails together is that my mothers email that got hacked has emailed my email that got hacked and she has also emailed all my other family members who's emails got hacked. But my email (the one that got hacked) the last time she emailed me was a very long time ago and she has since been emailing my main email(the one that hasn't been hacked) Although this theory has holes in it since it doesn't explain how they knew all our passwords since they are all different. (this is also assuming that this is in fact how they found our emails) If you need any other details please ask, i want to get to the bottom of this. Thanks.
- 12 replies
-
- data breach
-
(and 4 more)
Tagged with:
-
i cant believe the iphone ios 15.5 can still be hacked. some toxic philippine hackers is persistent enough to violate privacy and destroy human rights. i will say that i am being hacked by group of philippine hackers, they have bought some crazy hacking device and hacking software from outside the nation and would use it to anyone. an example of me that they compromise my android phones and even iphones. when they compromise our device they remote and take a naked or senstive photos and videos, they publish it to the social media publicly, and would be delete by then or hidden into group. compromise iphone is easily installed malware and spyware and remotely to close my apps even built in iphone apps, doing ghost touches, they can record the backgroud of the screen. ive been uploading it to all this toxic behaviour https://www.youtube.com/channel/UCuDLlXkv443PUmI-Kc_jqFA its been 9 months thay they still do and laugh about, even having illness of depression and insomnia is a laugh of them and would mock it. they are no more human rights.
- 3 replies
-
- iphone ios 15
- iphone
-
(and 3 more)
Tagged with:
-
i messed up and didnt have 2factor on my outlook account and a hacker/thief gained entry through my old backup email. within minutes of changing my password, my phone number and old email was removed and then they changed the primary email on my outlook account. so i lost ALL my emails from the past 8 years or so, all my onedrive files(including my only copes of photos of my dead son), all my contacts and notes. my access to my humble bundle account and epic account(they use email verification). and i cant change me email on many of my online accounts. suffice to say i screwed up big time. however i thought i'd prove to microsoft support i was me (so many things which only i could have) and they world see the hack and return my account. boy was i wrong. its been 2 weeks now of "we will let you know in 24-48 hours our decision" and i have spoken to them every day or two and keep being told they will look at it. i'm confident it does not take 2 weeks to see the logs that 30 mins before my initial complaint my email, password, phone number were all changed from a strange ip (mine hasn't changed in at 5ish years). confirm my identity with multiple proof like bank proof, driving license, xbox id, proof i have previously had access to the account, and photos of devices (windows/surface pro's) & there id's that are associated with the account. suffice to say microsoft support/escalation team are not reliable in the slightest. i have been promised a result 7 or 8 times(all within 24-48 hours), including that i'd get a phone call, which never happened. so i'm stuck relying on microsoft to get my life back. its obvious to me they have problems and my life/sleep/anxiety are being heavily affected. so my suggestion is dont trust microsoft with your data. and if you must then 2 factor everything.
-
Summary Axie Infinity is pokemon style play-to-earn game from Sky Mavis, in which players buy cryptocurrencies (SLP, AXS) and NFT (axies) to play, and are rewarded crypto for playing. On the 23 of march 2022, hackers stole all the crypto inside the bridge that connected the Ronin blockchain with the Ethereum blockchain for 173,600 ETH and 25.5M USDC. On the 29 of march 2022, the developers noticed the hack after being notified by users unable to cash out from the game and took measures to contain the hack. Quotes My thoughts About the tech: A crypto bridge is meant to connect two blockchains, but can't move cryptocurrency from one blockchain to another blockchain, instead the bridge tags some of the crypto on both sides of the bridge as "this crypto is somewhere else, please do not move it". In this case, hackers were able to ignore this restriction and move ETH and USDC from the Ethereum side of the bridge, meaning the SLP, AXS and Axies on the Ronin side of the bridge are now partially unbacked. I think crypto bridges are inherently dangerous, with too many attack surfaces, even if implemented properly (not the case here). Below, tweet from Vitalik on the topic of crypto bridges: About the game: I think "play-to-earn" games are an abomination. The "earn" part of the game is often tauted as great because it allows high ranked players in impoverished countries to earn about a minimum wage while playing, but a part that is often glossed over is that to play, one needs to invest hundreds or thousands of dollars building a basic team, and that money coming in IS the source of revenue for high ranked players, the company and the share holders. Axie Infinity is the most successful "play-to-earn" game based on NFT, and it has middlmen called "Scholarship Programs" who buys the expensive NFT and hire workers to play with them, paying workers with a share of the SLP (Smooth Love Potion) crypto they earn while playing. "play-to-earn" games need a constant influx of new players to maintain the ingame economy, and when this influx wane, the economy crashes, which already happened to Axie Infinity last year, and caused earning of the player base to plummet. I think this section of the great "Line Goes Up" video says it all: Sources Announcement from the developers: https://roninblockchain.substack.com/p/community-alert-ronin-validators Detailed breakdown: https://blog.mollywhite.net/axie-hack/
- 11 replies
-
- axie infinity
- hack
-
(and 1 more)
Tagged with:
-
AU health insurance provider, 9.7 million affected?
Quackers101 posted a topic in General Discussion
Summary From what Medibank from australia saw as "baseless claims" or threats, before the hackers gave out personal information and that they were serious. It's unsure how they got it? and a lot of personal + gov ID, medical information and so on. Maybe no credit information stolen. Quotes My thoughts lol, another one. Sources https://www.medibank.com.au/health-insurance/info/cyber-security/ https://www.bbc.com/news/world-australia-63564544 -
Hello LTT community, I am trying to find the best antivirus software that has all the features that Total Av has I am thinking about buying the total AV premium license but I thought it would be smart to check with you guys first becuase you will probably have the right answer on if I should buy it or if not what other premium anti virus are out there.
-
For the last 2 days my phone has randomly been texting random numbers even when im using the phone at the time, literally without my knowledge adn as shown in the photo is just a bunch of gibberish that i havent any idea of what it means an its only been doing this since i played around with samsung link to windows feature
-
Hey all. Anyone familiar with the Wii hacking scene may know of my previous work with the Nintendo Wii and hardware hackery. Also, anyone familiar with the wii hacking scene certainly knows of Team Twiizers and their BootMii software used for backing up and restoring the Wii's system software. Well, I would like to share with you something that myself and a fellow hacker have been working on. We, like many others, got our hands on the leaked Nintendo files a few weeks ago. In those leaked filed contained what is known as SDBoot. SDBoot was used in factory for installing the system onto the Wii. My friend (whom asked to not be named anymore) found an exploit in Nintendo's SDBoot code. I was able to flash SDBoot to my Wii with a hardware flasher. The result of which allows us to have BootMii for every model of Wii including the Wii Mini. In the video below you will see a Wii Mini motherboard that I have added an SD card slot and reset button to, and I will turn on the Wii Mini and BootMii will load up right away. <video link removed by staff> This is something that a majority of Wii owners have missed out on as early in the Wii's life Nintendo patched the vulnerability in Boot1 that did allow the installation of Bootmii in Boot2 making it impossible to have this anti-brick feature in most Wii's. I thank you guys for coming and checking this out. I do original hardware hacks to the Wii quite consistently, and as of lately I have been doing a live stream hacking on youtube. If you are interested in seeing more then just check out my youtube channel
-
Yep you read right there is not a single signed software device that Apple makes that is safe from this zero day hack. This is breaking news direct from their Reddit account: Source: https://www.reddit.com/r/jailbreak/comments/gnm9k7/news_unc0verteam_we_are_going_to_release_unc0ver/?utm_medium=android_app&utm_source=share
-
https://www.wordfence.com/blog/2020/05/28000-godaddy-hosting-accounts-compromised/ https://www.techrepublic.com/article/godaddy-data-breach-shows-why-businesses-need-to-better-secure-their-customer-data/ This is hosting accounts of theirs. So, DNS users get a pass this time 'round. While they haven't said it is related, this could be additional persistent threat fallout from the March GoDaddy employee phishing breach. https://krebsonsecurity.com/2020/03/phish-of-godaddy-employee-jeopardized-escrow-com-among-others/ In short, if you use GoDaddy for anything, especially hosting at this time, you should go change your ssh keys and set up 2 factor auth if you're able. Also, check the history of files and minor edits in your sites (particularly if you're using any of the popular CMSs), as this is notification NOW of a breach that appears to have occurred last October.
-
Dutch IT student Björn Ruytenberg discovered a persistent hack for the Thunderbolt eco-system. A well-prepared hacker could gain access to a device via this port within 5 mins. Complete story here: https://www.tue.nl/en/news/news-overview/10-05-2020-eindhoven-security-researchers-find-fatal-vulnerabilities-in-thunderbolt/ A tool was released to investigate whether a port is vulnerable via this link: https://thunderspy.io/ Article on Wired: https://www.wired.com/story/thunderspy-thunderbolt-evil-maid-hacking/
-
Mike Pence used a private email account when he was govenour of Indiana and got hacked last summer. source: http://www.telegraph.co.uk/news/2017/03/03/mike-pence-used-private-email-indiana-governor-hacked/ So, let the political drama begin. Pence is being exposed as a hypocrite however outshines the fact that there are two bigger problems out there: Apparently government email addresses are too inconvenient for political users. Why this is I don't know but the fact that Clinton, Pence and others (In my home country of the Netherlands this happened as well) are using private email, shows that government email is not satisfying user demands. The consequence of this is that users are communicating sensitive info over unsecured channels. Government employees are not educated enough on the fact of (email)security. If users get a good reason why they are (pretty much) required to use government email. They should know why they shouldn't put sensitive info on private email addresses and why they should separate work and private life. So, another political scandal for the Trump administration aside. What do you guys think?
- 247 replies
-
- mike pence
-
(and 2 more)
Tagged with:
-
Today while I was working on my PC suddenly I started to listen something really strange! The voice was like Google translate or the Google TalkBack.. the first time I didn't heard it clear because I was listening to music and it was last about 5 seconds but after 5 minutes I listened it again but I didn't understand what she was trying to tell.. The opened apps was only Spotify Discord Google Drive and Steam (in the background) and I was working on FL Studio.. I was really terrified I opened Discord to see if someone is connected in voice chat but no I exit most apps (Discord Google Drive steam and Spotify) and opened the task manager to see if something weird was working but no I didn't find something using my cpu or internet or ram so.. I thought know I wouldn't have any problem.. BUT the third time I heard it she was telling me that I need to pay (that's what I understood from the whole sentence) and instantly I pressed to restart my pc and then I closed my router and disconnected my WiFi adapter.. then I opened my pc and continue working on my projects but till now I didn't connect my pc on the internet.. I don't have any antivirus software only windows defender :'( Did I get hacked? What was this thing anyone know what should I do??? Thanks anyway and sorry for the long post
-
The hacking group 'thedarkoverlord' (-Twitter) Has hacked into a LA ADR company and released the new season of OITNB (Orange Is The New Black). They have spoken to torrent freak about this and claim to have large amounts of unreleased content from both film and television. thedarkoverlord was in talks with Larson Studios in an attempt to hold the content they had stolen ransom for the price of 50 Bitcoins (~£51,819.00) Larson Studios signed the contract agreeing to this however failed to pay the requested 50 Bitcoins It looks like thedarkoverloard means serious business about the content they are holding as leverage and it is possible we may see more leaks in the near future.... From thedarkoverlords twitter; The stolen content is not complete to broadcast quality and will contain audio errors, missing ADR and audio levels before they are properly mixed. The Video quality will also be missing its final touches such as colour grade. Original article; https://torrentfreak.com/hackers-leak-netflixs-orange-is-the-new-black-season-5-premiere-170429/