Search the Community
Showing results for tags 'hackers'.
-
Seriously back up your important data. Many people everyday lose their data for good. People are losing data, drives busting, hackers robbing data... Hacking is a serious problem and the thing is any data can be breached including military systems. If you backup your photo's, work, etc you can relax knowing you have it backed up, many people have not backed up and say yes I need to do that, but then bam! bam! bam! out of the blue two drives you're using fail and die, losing all your data. If you have multiple devices you can then make backups. If one device fails you still got your backup. Ideally though you are better off having an offline backup, because it simply cannot be hacked or fail. If you just have online backups that is okay but not ideal because it can be targeted by hackers and corrupted or the drive can fail, components fail all the time. I would be happy If someone read this and thought ohhh yes! I must backitup!!! At least it would have helped someone. It's truly awful for anyone if you lose a lifetime of photo's, what you cannot ever get back.
- 14 replies
-
- backup data
- hackers
-
(and 2 more)
Tagged with:
-
So yeah. I woke to < removed by moderation > now owns my Facebook account They striped the account of my actual email, phone number, and even added a 6 digit pin that can only be accessed by their email. I managed to, thankfully, find the email (as presented) and change the password, but I still need the 6 digit code to log in. Is there a way to access this email at all?? And yes, hacking is my last resort, but just I want my account back. That, and I have next to no clue on how to hack an email. Thank you in advance for any advice you may have! ( I have tried several times to contact Facebook and it's just been radio static) Edit: They found out I changed the password and changed it again themselves. Now I only have their email.
- 7 replies
-
- hack
- hacked account
-
(and 2 more)
Tagged with:
-
I have already reported this matter to both Steam Support and Valve. Now 7 days have passed, they still haven’t done anything with it. As I told them, I’ll public these after 7 days if you guys do nothing with it. ----------------------------------- An application named “腾讯网游加速器” on Windows and Mac, owned by Tencent. Provide a features called “游戏试玩”. Sales temporary Steam account on it. Most of this only for 3 CNY / 1 hour (about 0.45 USD). Or 4 CNY / 1 month unlimited use (about 0.60 USD). All of the temporary account belongs to Argentina and other low costs region. If you get banned, just restart you will have a new account to play. As you know, Tencent is the biggest holder of Epic. This organized action is highly suspect for unfair competition. Plus, Tencent have suspiciously nature like Huawei. This surely damaged Valve’s interests. And have serious impact for all Steam user, especially multiplayer game player. Obviously, it will bring more hackers and rude language and more bad influence. ----------------------------------- The point is temporary account means the users are not responsible for whatever they did. I don't know why they don't care about this. I can only guess that they are afraid of tyrant or simply just want money without any conflict. It could be they are believing that when Steam china final release the problem will fixed automatically. So, they don’t want do anything now. I have tried post this to Steam Community but they remove my post with no reason, no notifications at all. I think all gamers especially Steam users have right to know it.
-
i cant believe the iphone ios 15.5 can still be hacked. some toxic philippine hackers is persistent enough to violate privacy and destroy human rights. i will say that i am being hacked by group of philippine hackers, they have bought some crazy hacking device and hacking software from outside the nation and would use it to anyone. an example of me that they compromise my android phones and even iphones. when they compromise our device they remote and take a naked or senstive photos and videos, they publish it to the social media publicly, and would be delete by then or hidden into group. compromise iphone is easily installed malware and spyware and remotely to close my apps even built in iphone apps, doing ghost touches, they can record the backgroud of the screen. ive been uploading it to all this toxic behaviour https://www.youtube.com/channel/UCuDLlXkv443PUmI-Kc_jqFA its been 9 months thay they still do and laugh about, even having illness of depression and insomnia is a laugh of them and would mock it. they are no more human rights.
- 3 replies
-
- iphone ios 15
- iphone
-
(and 3 more)
Tagged with:
-
Summary Cyble Intelligence and Research Lab (CRIL) discovered several phishing campaigns that use MSI Afterburner to deliver XMR (Monero) cryptomining and information-stealing malware via 50+ fake replica websites. These Researchers have found that a large number of websites have been impersonating MSI's official site to trick users into downloading malware alongside the overclocking tool. Quotes My thoughts Apparently this isn't the first time this has happened. Last year hackers created a duplicate of the official MSI Website containing a malware-loaded version of MSI Afterburner. This time around it seems to be much more prevalent, with many more websites appearing. I've had one of these crypto mining malware infections before, and it was a royal pain in the butt. Luckily, I found a way to mitigate it by turning off the internet. However, when the internet was connected it would drive my CPU and GPU to 100% utilization. I tried many various methods of removal, using some of the best anti-malware programs/anti-virus programs/anti-rootkit etc. But in the end reinstalling Windows was really the only viable option to get rid of all remnants of it. If you downloaded MSI Afterburner recently, it might be wise to double check whether or not you might be infected. If you got it from the official website though, you should be in good standing. Sources https://www.bleepingcomputer.com/news/security/fake-msi-afterburner-targets-windows-gamers-with-miners-info-stealers/ https://www.techspot.com/news/96763-beware-fake-msi-afterburner-installs-cryptojacking-information-stealing.html https://www.techpowerup.com/301461/msi-afterburner-laced-with-malware-circulating-in-the-wild https://hothardware.com/news/hackers-are-spoofing-msis-afterburner-utility-with-malware https://www.eteknix.com/fake-msi-afterburner-software-riddled-with-malware/
-
Well we all knew it was coming, they had to end up getting something after such a huge breach like that, two of the people involved in the CelebGate hack are in prison. Ryan Collins serving 18 months for violation of the Computer Fraud and Misuse Act and Edward Majercyzk sentenced to 9 months in Federal Prison. Edward also got a $5,700 fine for restitution repayments to one of the celebrities that had the iCloud breached. If they knew half of the stuff that goes on we would all be in trouble... Well suppose this serves a reminder that the stuff we do behind the keyboard has real life consequences Sources : https://www.mindblank.org/celebgate-hackers-sentenced-to-federal-prison/ https://www.engadget.com/2017/01/26/second-celebgate-hacker-sentenced-to-nine-months-in-prison/
-
Hajime -- Possibly the Most Advanced IoT Botnet To Date
N3v3r3nding_N3wb posted a topic in Tech News
Hajime is a very advanced botnet that infects Internet of Things devices to (supposedly) protect the device from other infectious botnets. The next part is very detailed, so read the article if you want in-depth info. For the purposes of my summary, I'm going to do a very high-level overview. Hajime is at the very forefront of botnet technology. Whoever created it is very talented. Hopefully, this guy is really just wanting to do good, not just shutting out competition and planning a future takeover of infected devices. Also, the IoT industry better step up their game. It shouldn't be up to vigilantes to plug their security holes. Source: arstechnica.com/security/2017/04/a-vigilante-is-putting-huge-amount-of-work-into-infecting-iot-devices/- 10 replies
-
- iot
- internet of things
-
(and 2 more)
Tagged with:
-
Hackers Claim Hack Into 700 Million iCloud Accounts 03.25.17 Original Article http://anonhq.com/millions-icloud-accounts-hacked-video/ Prof http://www.meethackers.com/2017/03/icloud-hacked-sample-data-video.html
-
Hackers have successfully breached CCleaner’s security to inject malware into the antivirus app and distribute it to millions of users. Security researchers at Cisco Talos discovered that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. “For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner,” says the Talos team. A lot of tech news outlets are offering simple(some nonsensical) descriptions, but the talos blog seems to be the true source of detailed information. They seem to have all the technical information which I haven't fully deciphered at the time of this post. Through what I've seen already things don't seem to add up. Does the hidden malware itself actually consist of a means to actually access an end users computer? It doesn't really seem feasible to me that this could be accomplished and to furthermore go unnoticed. I'm not sure what to think, especially when most of the dumbed down articles seem to be crying wolf by screaming BACKDOOR! RANSOMWARE! HACKERS! I still can't seem to determine if the malware is just collecting some lite system details and only the truly careless are effected or something much worse. Truly scary or blown out of proportion? Was cCleaner truly hacked or was this an inside job(quick big data grab)? Will The Verge ever produce any semblance of an article that's not complete garbage? http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html
-
There was a post that talked about it but.. This problem has slowly been growing and is up to 50 accounts ranging from 10k to 960k subs. Underneath is the link/screenshot (as of 2:30pm est) to a complied google spreadsheet to all the accounts that have been hacked. It is still being edited and adding more accounts https://docs.google.com/spreadsheets/d/1PhmslGsUkOgPmCrmzcI1s8ZErE2Q5KcPBCCtF9admgg/edit#gid=1716791528 The current situation known is that this exploits explained by one of the youtubers that have been hacked Facts so far: 1. It was a program run probably similar to the previous post mentioned above. 2. Program was run it under a VPN 3. It was in a sotware vault via an antivirus quarantine partition where it was analyzed and was said to safe to run 4. The program was launched and the antivirus came with a positive afterwards and was "chested", but it was too late. 5. It did NOT show the "Did you sign in with google" with the google authentication app with the ip and location. (EDITED: Since its a super detail that i forgot to add, 2FA was on) 6. Youtube account hacked and not being able to sign in. Google account also being hacked. 7. Being taken over via scams. Having their accounts completely changed. Videos being deleted, hidden if lucky Not confirmed yet: This program knew the targets location and spoofed it. Might be a cookie hack/phishing of some sort. The same account email from the previous post above So far, very few creators have gotten their channels back. Youtube clearly gives a priority of caring the $$$ channels over the smaller ones. Google does not have a multi factor email like Outlook, where it asks you for your phone and a second email when security info questions are needed to be answered. It is only reliant of an app with gives a specific code. Meaning there was a way to bypass it and gain full access. Something that YOUTUBE has to be called out to change, because it will keep continuing unless enough voices are heard. Let me ask you this, what if it happens to your favorite Youtuber next? ______________________________________________________________________________________________________________________________________________________________________________________________ EDITED AS OF 02-29-2020 1:24PM After this article was posted, I have to add additional key information. The malware was involved the fact that its using session cookies instead of stealing pw info. The 2-factor authentication can be circumvented by disabling it using the session cookie because it doesn't ask for re-authentication is the main issue here. It also changes the account email without any re-authentication This isnt an issue of how youtubers handel their security. Its the fact that this is how youtube and google handle their 2FA. Its a security flaw.
-
Greetings everyone I figure off topic is the perfect place for this post sorry in advance I'm sure someone has already been through this So I guess my question here is obvious. Is it possible to make your home network harder to hack into? I know little to nothing about hacking / cyber security, I just know how easy it is for people who do know as I've seen them do it in front of me. *Is there any way of stopping a ddos attack if your on the receiving end ? a program or software ?? *And with the modem / router is there any way to make it harder to hack ? I mean the people I've seen took about a whole minute if that??
-
Greetings, i came across a these two virus'/malwares on my uncle's pc/laptop.... on briefly studying these two, i found out that is a tool used by hackers to access your machine and which may include various things including keylogger. And hurri is a virus which spreads extensively in NTFS format, which is a Windows Filing System. How would a non-power user prevent their data from such breachers? and how do i solve this... imo i feel i should format his device. If Somebody has more knowledge, Please share, Thankyou.
-
Hi guys recently I have been on non https pages of reputable sites like toms hardware and get a message saying I could be at risk as it is a non https protected page. Would a vpn protect me on these kind of pages or not?
-
Hello guys, So right now i was thinking about the zero team that google created to protect the internet right? What are they doing since ISIS hack the democratic website of france ? Why do Anonymus still exist and will fight for france? What do you guys thik?
-
About eight days ago, my 5 years old Steam account was stolen or locked. During the night, someone tried to access my account from another machine located in Russia. I noticed the emails later that day. There were two messages with a code to confirm the remote access which I did not used. There were about four messages from Steam in only about 4-5 minutes. The last one was saying that my email had been successfully replaced. There also was a letter code included. It said that if it was me that did this I should click on the link to lock my account which I did immediately. Previous to that, I had tried to access my account with no success. I tried to recuperate the forgotten password. When I did this, it was telling me that an email was sent but did not get nothing, so it was probably going to the hacker's account. I then immediately changed my email password. None of my computers were turned on that night so it could not ne from me. I also scanned both the main computers in case but all was clean. I then went to Steam support, I used another email to open a ticket. I supplied all they asked for, name of account, email used, proof of purchase (Paypal) when I acquired that account, more proof of games bought etc. It has been more than a week and Steam is not even responding. After a couple of days I tried sending a message to Gaben at Valve. Nothing back. I use Lastpass, every site I go has a 10 digit different password. I scan my machines regularly. I don't have friends on Steam and I never exchanged or gave nothing away. I am totally desperate. I have lost not only access but probably more than 2000$ worth of games and Steam is in no way even responding to confirm they got the ticket. I feel like suing them, this is grand theft. Has anyone ever had similar problems with their Steam account? Would it be possible for Linus and Luke to have a segment concerning Steam and security and mostly their terrible customer support? I just fell like a part of myself has been stolen, this is insane. If I don't get my account back the way it was I will keep on posting all over the web how bad and terrible Steam is. I posted on their Twitter support account, no answer. WTF is going on with Steam? I think I will sell my computers and quit. I not only spent a fortune in games but also on a machine to play the games that I cannot use anymore. PS I never saw any other signs that my email was hacked by the way.
-
NEW UPDATE: THE HACKERS HAVE OFFICIALLY WON, SONY HAS JUST PULLED ALL THE PREMIERS OF THE FILM WORLD WIDE. #GG REPORTED ON THE FORUM HERE BY @rockking1379 HERE IS ANOTHER SOURCE TO THE ONE PROVIDED IN THE ABOVE TOPIC GIZMODO Updates to this story Thanks to Forum member @AlRayes_BRN for posting this, Cinemas have started to cancel Premiers to "The Interview" amidst Terror Threats made by hackers. Read that article HERE Before anything, I should say right now, this recent note has not yet been confirmed as genuine. It maybe from a fake group like the recent threats to the families of Sony Employees. Until it has been validated, take this post as a fairly large grain of salt. The Verge - http://www.theverge.com/2014/12/16/7402649/sony-hackers-threaten-terror-attacks-on-people-seeing-the-interview Not that long ago I posted an update to the recent Sony hacks brought on due to their new film to be released called "The Interview". if you haven't seen that post or don't know about the Sony hacks, click HERE to catch up, I'll still be here when you get back..... Back? Lets continue with today's update (16/12/2014) The latest threat to come from the hackers is Terror Attacks against people who watch the movie. They are recommending that you stay distant from cinemas and other screening locations showing this movie. Recently the hackers have promised a "Christmas Gift" of some kind. Everyone is expecting it to be more data leak, but after this shocking announcement, who knows what it could be. Here is a fully copy of the note from the Hackers The reason people are suggesting the "Christmas gift" could be an attack due to the hackers telling us to remember what happened on a tragic day, September 11th 2001. This threat was leaked along with another load of Sony e-mail, supposed to be from their CEO, Michael Lynton. There is no evidence that this threat is from the same group as previous attacks due to them contacting media anonymously through reusable e-mail addresses. People believe it is the same group as the information has been fairly consistent. There is no evidence currently to confirm how genuine these e-mails and the authenticity of the new note. My thoughts? Truthfully, I can't say what I want to, (To avoid possible warning post strikes). If this new information is genuine, this is actually quite terrifying how far these hackers are willing to go to get the movie banned. Also, to the hackers, Dick move comparing what you are planning to do to 9/11. Keeping in mind the unknown authenticity of this note, I don't know what's going to happen if it is genuine. Your thoughts? Please leave them down below!
-
Metal Gear Online was launched together with Metal Gear Solid 4 on the PS3 in 2008. In 2012 the servers were shutdown due the low population on the servers. Now some (white hat) hackers have brought Metal Gear Online back with the living through private servers. No word from Konami on this matter, but damn I hope they allow it and maybe try to support it in some way. Source: http://www.vg247.com/2014/09/29/metal-gear-online-resurrected-by-white-hat-hackers/
- 2 replies
-
- metal gear
- online
-
(and 1 more)
Tagged with:
-
Sources: http://www.joystiq.com/2013/05/17/four-lulzsec-hackers-convicted-in-britain/ http://massively.joystiq.com/2013/05/16/prosecutors-laugh-last-lulzsec-hackers-sentenced/
-
This whole my countries spy agencies are spying on all us has kinda freaked me out a little bit. I am not trying to hide anything, but do I really want our government to access all my communications anytime they want? Not really. At the hospital I worked at recently, we used TigerText.com HIPAA compliant text messaging. It was HIPAA compliant for several reasons, but I remember that a main one was that the text messages auto-deleted from the other person’s phone. My questions is, even though the messages auto-delete, can the NSA (or anyone else) still record or log them? I looked on their site but I couldn’t find anything about this.
-
What are hackers really capable of? Why are they doing this?
Guest posted a topic in General Discussion
This isn't a hating thread even if i wanted to just say that they have no life and it isn't good for what are they doing, so i installed windows 8.1 and on metro i have news, this is what ive got. ill just quote! "Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people. Now imagine you had absolutely nothing to do with the accident because your car was taken over by hackers. Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of security intelligence at IOActive, a security research company, recently demonstrated car hacks at the DefCon computer security conferences in Las Vegas. The researchers completely disabled a driver’s ability to control a vehicle. No brakes. Distorted steering. All with a click of a button, while the demos were with hybrid cars, researchers warn that dozens of modern vehicles could be susceptible. Hackers and security researchers are moving away from simply trying to break into — or protect — people’s e-mail accounts, stealing credit cards and other dirty digital deeds. Now they’re exploring vulnerabilities to break through the high-tech security of homes, cause car accidents or in some extreme cases, kill people who use implanted medical devices. “Once any single computer in a car is compromised, safety of the vehicle goes out the window,” Mr. Miller said in an e-mail interview. Modern cars typically have 10 to 40 little computers in them. “Right now, there aren’t a lot of ways for hackers to remotely attack cars: Bluetooth, wireless tire sensors, telematics units,” he added. “But as cars get Internet connections, things will get easier for the attacker.” Carmakers and the government are aware that our vehicles are vulnerable. In fact, Mr. Miller and Mr. Valasek received a grant from the Defense Advanced Research Projects Agency, or Darpa, to research ways carmakers can thwart attacks. The biggest fear is the future: as cars become more computerized — or become fully automated, computers on wheels that drive for you — they’ll become more inviting targets. But the demonstrations by security experts and hackers weren’t a peek at what’s to come. The researchers hacked a Toyota Prius and Ford Escape, two hybrid cars that are already on the road. Certainly, hackable cars are a troubling development for people who don’t even like to use cruise control. Now to add to your paranoia, security researchers warned that our homes are more vulnerable than our cars to attackers. That is, if burglars trade in their lockpicks and crowbars for laptops and Wi-Fi scanners. Devices like the Lockitron, a Wi-Fi enabled front-door lock that can be used with a smartphone, could open a way for technically skilled thieves to break into your home. That’s not to pick on Lockitron. They just happen to be on the cutting-edge of wireless home security. “We’ve built Lockitron from the ground up with security in mind,” the company said in a statement, while acknowledging that “anyone claiming their system is ‘unhackable’ is wrong.” At the conferences, security experts lauded the company for the protection it has built into the Lockitron. Hackers could also turn our televisions and webcams against us, monitoring everything we’re saying and doing. Digital refrigerators could be turned off, allowing food to spoil without your knowledge. Some hacks could be mere practical jokes, albeit messy ones. Researchers have warned that the Bluetooth-enabled INAX Satis model toilets, which can be controlled via a smartphone app, could easily be hacked to spray water up instead of down. In response to warnings that its toilets could be hacked, INAX said it issued a security update for its toilets this month. Yes, in the future, you will need to download security updates for your toilet. And then, there are the usual smartphones fears. At BlackHat, Kevin McNamee, the director of Kindsight Security Labs, demonstrated how to take over an Android smartphone by injecting code through the game “Angry Birds.” Once he had control of the phone, Mr. McNamee was able to remove photos and personal data from the device without the owner having any clue. Other researchers took over an iPhone by hacking a power adapter — yes, a little white power cord — to suck passwords and e-mails from a device that ran operating systems earlier than iOS 7. But some of the most advanced security researchers are thinking about even scarier hacks, of implanted medical devices. Barnaby Jack, who was perhaps best known for a hack that made an A.T.M. spit out cash, was supposed to demonstrate at Black Hat how implantable medical devices, including a pacemaker, can be hacked to kill someone. But Mr. Jack, who was in his 30s, died shortly before he was to make his presentation, of causes that have yet to be determined. He was often referred to as an “ethical hacker” and hoped to show the pacemaker exploit as a warning to device makers. So, should we dig holes in our yards, bury our computers and smartphones and never drive our cars again? Some researchers said many of these demonstrations were provocative, but they were more theoretical than any sort of real risk we had to worry about today. “Sometimes there is a gap between the researcher community and the real world. Researchers bridge this gap often, but it’s not uncommon to see conference talks on exotic technologies that don’t really impact our everyday lives just yet,” said Chris Rohlf, founder of Leaf Security Research, a security consulting company, in an interview. “As technology embeds itself into these everyday devices and other parts of our lives, you will see an increased focus on their security. Anywhere you find technology you’ll inevitably find hackers.” When these technologies do arrive, I would not count on the companies that are installing computers in our cars, homes and bodies to be able to stop rogue hackers. “We haven’t figured out how to stop attacks against Web browsers in personal computers despite trying for the last 10 years, so there isn’t any reason to think that we can stop attacks against cars or other devices in the near future,” Mr. Miller said. “We should be concerned and start taking action now before something bad happens. I’ll still be using my car and refrigerator in the meantime though.” OOOOkkkkkkkkkk, now this is really scary, if there is a post simmilar to this please redirect me but till then, tell me what do you think about this, i don't know why but this reminds me of CarTube video. -
I had this happen to me a while ago. It made me laugh. https://www.youtube.com/watch?v=z2BI6mVJe24
-
All of these data breaches are getting really tiresome, something in the world of network security is going to have to drastically change before we can have nice things like self-driving cars and etc. http://www.wbir.com/story/news/local/2014/08/18/community-health-systems-data-breach-affects-45m/14230939/ "Franklin-based hospital company Community Health Systems Inc. had a data breach that affected an estimated 4.5 million patients." "CHS, which worked with cybersecurity company Mandiant to help address the threat, said that the data affected in the breach is non-medical, but does include sensitive information such as patient names, addresses, birthdates, telephone numbers and Social Security numbers." -Don't worry guys, they didn't get medical data, just SSN, DOBs, names, addresses and etc
- 4 replies
-
- data breach
- hackers
-
(and 1 more)
Tagged with:
-
I recently got an email from my mom saying i need a favor, so I opened it only to 10 minutes later receive a call from my mom, that this is a spam e-mail and eventually hijacks your account, disables it and sends emails to anyone who has ever emailed you asking for money because they have been mugged, I still have a decent amount of time before anything like this will happen to me. I have taken elementary precautions like changing my password and not letting anyone sign in from not my computer. The problem is, this will probably not work. Any suggestions?
-
earlier.. http://torrentfreak.com/the-pirate-bay-now-blocked-in-argentina-140701/ http://torrentfreak.com/hackers-turn-music-industry-site-into-the-pirate-bay-140701/
- 8 replies
-
- tpb
- pirate bay
-
(and 3 more)
Tagged with: