Royal Spa
Toronto Escorts

Cyber Safety & Security

escapefromstress

New member
Mar 15, 2012
944
0
0
I do research on internet related topics, so thought I'd post some of my resources and articles here for those who are interested.

Please add yours!

TechWorm.net Latest Security News, Hacking News, Technology, Science and more ...

The Hacker News Cybersecurity, Hacking News

Cyber Security Bulletins Public Safety Canada

US Cert United States Computer Emergency Readiness Team

Internet Law: The Complete Guide


Flexara Personal Software Inspector
Free Security Software

How do I run a traceroute? Cloudflare Support

How do I generate a HAR file? Cloudflare Support

Microsoft Safety Scanner Free Virus Scan

Flush DNS

Open Bug Bounty Top Security Researchers

Site24x7 Free Ping Test Tool

Trace Email Address Source

IROC2 Institute for Responsible Online and Cell Phone Communication

websitedown Is this website down for everyone or just me?

GetCyberSafe Government of Canada

Privacy Rights Clearinghouse


securityinabox Social networking platforms

accountkiller Delete Your Online Accounts

schoolofprivacy Self Doxing, the way we mean here is NOT getting your personal information and releasing it to the public. This self dox tutorial will explain and help you with information about gathering all of the information you have online and either getting rid of it OR changing it to a profile with misinformation.

ExtremeTech 19 ways to stay anonymous and protect your online privacy

pcmagonline How to Stay Anonymous Online

How to take a Screenshot:

With an iPhone

With a Mac

Windows

Vids on YouTube[FONT=&quot] [/FONT]



**many thanks to friends who've contributed to this list.
 

escapefromstress

New member
Mar 15, 2012
944
0
0
Pornhub Asked To Hand Over Personal Data And History Of Users
By Delwyn Pinto on APRIL 8, 2017

Court Orders Pornhub To Disclose User History And Personal Data

Not many of us want to share information about the sites we visit but we would like some websites that we’d rather have people be less aware of than others. One such site – PornHub – has just been ordered to hand over details of its users to the court.

The Case


As long as you’ve restricted yourself to only viewing its content, you should have no reason to worry. The court order only applies to users who have uploaded copyrighted content onto the website.

The order, handed down by a federal court in California, has demanded the names, email address, IP addresses and other identifying information of certain users.

The court approved the request for a DMCA subpoena which was filed by the Seychelles-based adult company, Foshan Ltd known for its adult film brand “Wankz”. The company has sought the ruling to find out the culprits who have infringed upon its copyright to over a thousand videos by uploading them onto PornHub without permission. PornHub allows all of its users to upload their own videos onto the website, so this isn’t the first time the website has been on the receiving end of a copyright claim.

PornHub’s Response

“We take claims of copyrighting infringement seriously,” an official Pornhub spokesperson has said, adding that infringements to these rules will be severely punished. “Responses may include removing, blocking or disabling access to material claimed to be the subject of infringing activity, terminating the user’s access to PornHub, or all of the foregoing.”

The court order has a very broad scope requesting for a host of details from its users. Perhaps most worryingly, however, it also includes posting and user history, yep, the smutty videos that users’ have watched.

Industry experts admit that it is the first time that a copyright holder has used a DMCA subpoena to get information about Pornhub uploaders.

This isn’t the only case of users uploading copy right content however. Recently it was reported that the site was being used to host full length movies as well. Apparently, users choose Pornhub since its copyright checks are more relaxed that other platforms.

https://www.techworm.net/2017/04/pornhub-asked-hand-personal-data-history-users.html
 

Mythos

Active member
Jan 10, 2017
117
74
28
These days, people should be more concerned about their cell phones, Smart TV's, any ChromeCast and/or Android devices.
All these devices are simply in the business of collecting your information and sending it to data aggregator companies, which correlate the data and sell it to anyone who will pay.

Put a firewall app on your phone, run a syslog server app for your router traffic, or connect a port mirroring Ethernet switch for your Chromecast or Smart Tv and use a packet capturing application.
You will be shocked at how much data is being sent constantly to Google networks.
 

escapefromstress

New member
Mar 15, 2012
944
0
0
Many people are unaware of another factor that impacts our online life - Geomagnetic storms caused by Solar Flares.

I've kept track over the last few years, and every time I see Nasa or another news agency publish an article about recent solar activity, I remember noticing or hearing about technical glitches that occurred as a result. Our Internet runs on satellite feeds, and if those are disrupted, so is our Internet, GPS systems, etc.


SpaceWeatherLive.com Real time auroral activity and solar activity

3-Day Forecast
Issued: 2017 Apr 13 1230 UTC
Prepared by the U.S. Dept. of Commerce, NOAA, Space Weather Prediction Center and processed by SpaceWeatherLive.com

A. NOAA Geomagnetic Activity Observation and Forecast

The greatest observed 3 hr Kp over the past 24 hours was 2 (below NOAA Scale levels).

The greatest expected 3 hr Kp for Apr 13-Apr 15 2017 is 4 (below NOAA Scale levels).


spaceweather.com News and Information about the Sun-Earth Environment

SOLAR FILAMENT EXPLODES, HURLS CME: On April 9th, a dark filament of magnetism on the sun rose up and hurled a portion of itself into space. NASA's Solar Dynamics Observatory recorded the eruption:

Flying debris from the filament formed the core of a coronal mass ejection (CME). A movie from the Solar and Heliospheric Observatory (SOHO) shows the cloud leaving the sun. At first it appeared that the CME would miss Earth, but a new analysis by NOAA forecasters suggests that a glancing glow is possible on April 14th. G1-class geomagnetic storms are possible when the CME arrives this weekend.


www.nasa.gov Space Weather

NASA’s Solar Dynamics Observatory Captured Trio of Solar Flares April 2-3

The sun emitted a trio of mid-level solar flares on April 2-3, 2017. The first peaked at 4:02 a.m. EDT on April 2, the second peaked at 4:33 p.m. EDT on April 2, and the third peaked at 10:29 a.m. EDT on April 3. NASA’s Solar Dynamics Observatory, which watches the sun constantly, captured images of the three events. Solar flares are powerful bursts of radiation. Harmful radiation from a flare cannot pass through Earth's atmosphere to physically affect humans on the ground, however — when intense enough — they can disturb the atmosphere in the layer where GPS and communications signals travel.
 

escapefromstress

New member
Mar 15, 2012
944
0
0
Android Trojan Targeting Over 420 Banking Apps Worldwide Found On Google Play Store

Thursday, April 13, 2017

Beware if you have installed a funny video app from Google Play Store.

A security researcher has discovered a new variant of the infamous Android banking Trojan hiding in apps under different names, such as 'Funny Videos 2017', on Google Play Store.

Niels Croese, the security researcher at Securify B.V firm, analyzed the Funny Videos app that has 1,000 to 5,000 installs and found that the app acts like any of the regular video applications on Play Store, but in the background, it targets victims from banks around the world.

This newly discovered banking Trojan works like any other banking malware, but two things that makes it different from others are — its capability to target victims and use of DexProtector tool to obfuscate the app's code.

Dubbed BankBot, the banking trojan targets customers of more than 420 banks around the world, including Citibank, ING, and some new Dutch banks, like ABN, Rabobank, ASN, Regiobank, and Binck, among many others.

How Android Banking Trojan Works

In a nutshell, BankBot is mobile banking malware that looks like a simple app and once installed, allows users to watch funny videos, but in the background, the app can intercept SMS and display overlays to steal banking information.

Mobile banking trojan often disguises itself as a plugin app, like Flash, or an adult content app, but this app made its way to Google Play Store by disguising itself as any other regular Android app.

Google has removed this malicious app from its Play Store after receiving the report from the researcher, but this does not mean that more such apps do not exist there with different names.

"Another problem is that Google [Play Store] mainly relies on automated scanning without a full understanding of the current obfuscation vectors resulting in banking malware on the Google Play Store." researcher told The Hacker News.

Once downloaded, the app persistently requests administrative rights, and if granted, the banking malware can control everything that's happening on an infected smartphone.

The BankBot springs into action when the victim opens any of the mobile apps from a pre-configured list of 425 banking apps. A complete list of banks a BankBot variant is currently imitating can be found on the blog post published by the researcher.

Once one of the listed apps is opened, BankBot immediately displays an overlay, which is a page on the top of legitimate mobile banking app and tricks Android users entering their banking credentials into the overlay, just like a phishing attack.

This will not only sends your banking credentials to your bank’s servers but also sends your financial credentials to the server controlled by fraudsters.

This social engineering technique is often used by financially motivated criminals to deceive users into giving up their personal details and sensitive banking information to fraudsters.

How to protect yourself?

There are standard protection measures you need to follow to remain unaffected:

  • Install a good antivirus app that can detect and block such malware before it can infect your device. Always keep the app up-to-date.
  • Always stick to trusted sources, like Google play Store and the Apple App Store, and verify app permissions before installing apps. If any app is asking more than what it is meant for, just do not install it.
  • Do not download apps from third party source. Although in this case, the app is being distributed through the official Play Store, most often such malware are distributed via untrusted third-party app stores.
  • Avoid unknown and unsecured Wi-Fi hotspots and Keep your Wi-Fi turned OFF when not in use.
  • Be careful which apps you give administrative rights to. Admin rights are powerful and can give an app full control of your device.
  • Never click on links in SMS or MMS sent to your mobile phone. Even if the email looks legit, go directly to the website of origin and verify any possible updates.

http://thehackernews.com/2017/04/android-banking-malware.html
 
Ashley Madison
Toronto Escorts