Posts made by TWŚ
-
RE: Military Comparison List of the United Nations 2021
@kevinschepis I was surprised that India is number four
-
RE: What is the one thing.......
I will have to do some serious thinking about this, usually I just concern myself with making it through the day and try to set myself up for the next few
-
RE: CRITIQUE MY VIDEO
Thanks for the like, I have been to Oahu
Did you see anything in the video that could be improved? -
RE: CRITIQUE MY VIDEO
@Jerksica very kind ty ty
Do you see anything that can be improved, as far as the video?
Or, did you watch it? -
RE: CRITIQUE MY VIDEO
I said, why didn't you like this post, the video post since you think it is so cool, or awesome, as you said?
-
RE: CRITIQUE MY VIDEO
@tblakee0 well okay
why didn't you upvote it and critique it? -
Infected From A Website?
Has your PC been infected? Have you been hacked? How did your PC get infected? These days, those of us that are online are at ever growing risk of being hacked or infected with trojans/malware. The question is no long if you will be affected, but when it will occur.
That being said:
What are the most common misconceptions of your PC getting a Virus, you wonder?Here they are:
-
You can only get viruses from malicious websites.
-
If you access a malicious website, as long as you don't download anything, you're OK.
-
Even if you download something, on purpose or unknowingly, if you don't open it, you're OK.
-
Should the malicious website try to automatically download something on your device, your antivirus software should flag and block the action.
Wrong. Wrong. Wrong. Wrong. A website doesn't have to be malicious to pose dangers to a user. Sure, there are many malicious websites out there, specifically built to cause harm. Yet those are not the only threat. There are also legit websites that may contain pieces of malicious content. Websites that have been hacked and that contain hidden malicious code. The code was inserted by hackers, without the knowledge of the persons who operate the website in good faith.
Sometimes it's a script, other times it's an ad, and the list can go on and on. For some reason, people believe that even when visiting such a website, you don't have to get infected. It's like if you don't touch it you can't get it.
The problem is, however, that you can get it without touching it... Think of the human viruses that spread from one host to another. In a similar way, computer viruses can get viral without specific action from your side. Allow us to detail the misconceptions from above and you'll see what we mean.
This is the reason why you can't rely on your antivirus for any kind of threat. Malware and virus scanners have mostly been obsolete as an effective defense since the 1980s. They are a 1980s solution, yet many users, if not most, rely on them as their only defense.
-
-
RE: Operation: Domestic Kitten
@Sassy No, but I will check it out, thanks
-
RE: Operation: Domestic Kitten
@Sassy oh, well. However, it is still a concern for people who think they are safe downloading social networking apps, even if they are on official app markets.
-
Operation: Domestic Kitten
Chinese strategist Sun Tzu justified deceit in war as a legitimate form of warfare. Considering this, I believe that Sun Tzu would have been proud, at least on the proper use of this concept, of the creators of the malware associated with what some internet security experts call: DOMESTIC KITTEN.
Operation: Domestic Kitten
Check Point researchers revealed to the info-security world the huge targeted attack that has been taking place since 2016--Domestic Kitten Until then, Domestic Kitten had remained under the radar due to the artful deception of its attackers towards their targets. Through the use of mobile applications, those behind the attack use fake decoy content to entice their victims to download such applications, which are in fact loaded with spyware, to then collect sensitive information about them. Interestingly, these targets include Kurdish and Turkish natives and ISIS supporters. Most interesting of all, though, is that all these targets are actually Iranian citizens. They were being targeted by their own government.
What Information is Collected?
Considering the nature of the target, the data collected about these groups provides those behind the campaign with highly valuable information that will no doubt be leveraged in further future action against them. Indeed, the malware collects data including contact lists stored on the victim’s mobile device, phone call records, SMS messages, browser history and bookmarks, geo-location of the victim, photos, surrounding voice recordings and more. In other words: JUST ABOUT EVERY FILE AND INFORMATION IMAGINABLE ON A SMARTPHONE.
Data Collection via Mobile Applications
These apps were all available via the official Google Playstore. Victims are first lured into downloading applications which is believed to be of interest to them. The applications our researchers discovered included an ISIS branded wallpaper changer, “updates” from the ANF Kurdistan news agency and a fake version of the messaging app, Vidogram.
-
RE: What. What is the most trustworthy animal to buy drugs from?
@Indrid-Cold Are you certain of that?