Do you have a Wifi alarm clock?

iank.org says they have serious flaws specifically the Loftie alarm clock This is apparently in the alarm clock file structure: $ strings config.arm64_v8a.apk … assets/icons/clock.svg _setClient@91206165 _TapStatusTrackerMixin@113288344 https://fwbek2lb0a213kbewqoit.byloftie.com/Loftie_EVT.bin # <——- get:digitMatcher ListTileThemeData get:endOfFrame _drawPicture@15065589 … If you notice the weird address in the file: fwbek2lb0a213kbewqoit.byloftie.com This kind of programming is not a good idea.  her … Read more

Botnet Takes Advantage of Cheap IoT Devices

Yes I am assuming IoT devices from china are ‘cheap’. Look at this FBI IC3 headline: Home Internet Connected Devices Facilitate Criminal Activity probably important to know – what is the Botnet? “BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android … Read more

Make Assessments and Prepare for the Unknown

In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering hole tactic is where just like in the desert water is important , and in an oasis there is a watering hole. What does that … Read more

Social Engineer Attack examples: Texts and email

Here are some standard emails that came into my mailbox that are obviously fake….     Also an older post(7/15/2024) discussed  a tax refund scam… by text and email Here is text of email(italicized): Hi <insert-name>, Just wanted to check if you’ve submitted your tax refund claim yet? SETC and ERC are federal government programs … Read more