Search results

  1. Father

    Students found a bug in the work of the mobile laundry service CSC ServiceWorks, which allows you to wash your clothes for free

    Two research students at the University of California at Santa Cruz, Alexander Sherbrooke and Yakov Taranenko, discovered a vulnerability in the CSC GO Laundry mobile service of the CSC ServiceWorks laundry network, which allows you to use washing machines for free an unlimited number of times...
  2. Father

    Malicious Chrome extension VenomSoftX steals passwords and cryptocurrency

    Experts warn about a malicious extension for Google Chrome called "VenomSoftX". By installing this addon, users run the risk that the contents of their clipboard in Windows will fall into the hands of intruders. In fact, VenomSoftX is one of the components of a malicious program for...
  3. Father

    The Ministry of Internal Affairs "protects" the pocket crypto exchange drugs OG

    Once popular "pocket" banks are now being actively replaced by the same "pocket" crypto-exchangers. The City is full of them, and some of them have very interesting founders and approaches to doing business. Of course, each such exchange has its own "roof", and it's high time to deal with all...
  4. Father

    In the US, two Chinese citizens were arrested for defrauding crypto investors for $73 million

    The US Department of Justice announced the arrest of two Chinese citizens accused of laundering $73 million and leading a group of cryptocurrency scammers. Fraudsters converted the funds received from their victims into USDT stablecoins, American justice says. Daren Lee was detained on April...
  5. Father

    Binance found 13.4 million accounts abusing spam transactions in BNB Chain

    Cybersecurity experts of the largest cryptocurrency exchange Binance have developed an algorithm that allows you to determine the addresses used in fraud with so-called spam transactions. The identified accounts are included in the Web3 partner company's HashDit database. The algorithm was used...
  6. Father

    Банковский троян Grandoreiro вновь появляется, нацеленный на более чем 1500 банков по всему миру

    Злоумышленники, стоящие за банковским трояном Grandoreiro под управлением Windows, возобновили глобальную кампанию с марта 2024 года после устранения правоохранительными органами в январе. Масштабные фишинговые атаки, которым, вероятно, содействуют другие киберпреступники по модели "вредоносное...
  7. Father

    Граждане Китая арестованы за отмывание 73 миллионов долларов при крипто-афере с разделкой свиней

    Министерство юстиции США (DoJ) предъявило обвинения двум арестованным гражданам Китая в предполагаемой организации аферы с забоем свиней, в результате которой жертвы отмыли по меньшей мере 73 миллиона долларов через подставные компании. Эти лица, 41-летний Дарен Ли и 38-летний Ичэн Чжан, были...
  8. Father

    Are we living in a computer simulation? Opinions of scientists.

    The lack of proof of existence is recognized, but then we are faced with the task of proving that this is not true… Recently, the widespread but largely faith-based idea of the existence of intelligent beings on other planets has been discussed. Despite the lack of convincing evidence, this...
  9. Father

    Everything you need to know about the MAC address

    Everyone knows that these six bytes, usually displayed in hexadecimal format, are assigned to the network card at the factory, and at first glance are random. Some people know that the first three bytes of an address are the manufacturer's identifier, and the remaining three bytes are assigned...
  10. Father

    POS для кардинга

    Недавно я получил пакет файлов, найденных в зараженной POS-системе (POS-система взломана из-за слабого пароля rdp) Интерфейс взломанной POS-карты, используемой ювелиром: out.exe это кейлоггер Ardamax (ardamax.com), а vui qua.exe это SFX-архив, который отображает это изображение при...
  11. Father

    Types of online fraud

    How to avoid scammers and what to do if you were scammed. Easy money on the Internet is almost always a scam. Pyramid schemes, online casinos, beauties from a dating site that promise to earn money on cryptocurrency, iPhones at half price, sites with free music or movies — all this is a chance...
  12. Father

    How a pyramid scheme works

    Most of them are sites on the Internet that offer to invest money in cryptocurrency and get fabulously rich. Usually, pyramid sites are blocked at the very start. But some manage to disguise themselves well, gain popularity, and attract "investors"within a few months. On average, each...
  13. Father

    How spoofing works

    And how to avoid becoming a victim of an attack Do you remember the fairy tale about the wolf and the seven little goats? One day the wolf overheard Mama goat singing. And when she was gone, he sang in her voice. The kids believed, opened the door, and the wolf ran into the hut and ate them all...
  14. Father

    What sects are there

    And why it is better not to hit them.' The concept of "sect" is usually associated with religion, but modern sects often have nothing to do with it. The main thing in them is money and power. Dictionaries define sects primarily as religious organizations and groups that are separated from world...
  15. Father

    What is doxing and can I protect myself from it online?

    Deanon can cause great damage to a person. Doxing is the deliberate search and disclosure of information on the Internet about a particular person. Once upon a time, deanon was already a method of attack in its own right. Gradually, they began to disclose data on the network for the purpose of...
  16. Father

    Как определить скиммеры самообслуживания Ingenico

    В прошлом месяце история компании KrebsOnSecurity о скиммерах для кредитных карт, обнаруженных на полосах самообслуживания в некоторых магазинах Walmart, была подхвачена несколькими публикациями. С тех пор я слышал от нескольких читателей, работающих в розничных магазинах, которые используют...
  17. Father

    Carders are getting more and more inventive in creating skimmers

    Source: krebsonsecurity.com Skimmers in the form of overlays on terminals are becoming more popular. Since Ingenico terminals are common in a number of countries, including the United States, the creators of overhead skimmers pay most attention to such devices. Despite the fact that information...
  18. Father

    How to protect yourself from skimming

    What you need to know to avoid becoming a victim of carders-scammers. It happens like this: you find yourself in an unfamiliar place without money. You see an ATM in the alley. Withdraw cash. A few weeks later, a text message arrives: someone in Cape Town is also withdrawing money from your...
  19. Father

    Как создаются поддельные кредитные карты с помощью банкоматных скиммеров

    Изобретательности человека нет предела, когда дело доходит до мошенничества. Ранее мы обсуждали распространенность мошенничества в розничной торговле с использованием поддельных кредитных и дебетовых карт, и в частности скимминга с карт. Мошенники монтируют небольшое устройство поверх...
  20. Father

    Как кардеры совершают мошенничество с кредитными картами

    Посвятив последние два поста в блоге мошенничеству с кредитными картами с помощью скиммеров, мы посвящаем этот пост изучению роли хакеров в краже личных данных и создании поддельных кредитных карт от своего имени. Мы начинаем с ареста Альберта Гонсалеса, жителя Майами, которому вместе с двумя...
Top