More Browser Problems!
First couple of paragraphs in Dark Reading story says it all: Both the Google Chrome and Mozilla Firefox browsers currently are under separate attacks, the former from actors exploiting a…
Do you have a Wifi alarm clock?
iank.org says they have serious flaws specifically the Loftie alarm clock This is apparently in the alarm clock file structure: $ strings config.arm64_v8a.apk ... assets/icons/clock.svg _setClient@91206165 _TapStatusTrackerMixin@113288344 https://fwbek2lb0a213kbewqoit.byloftie.com/Loftie_EVT.bin # <-------…
What can be done when confronted with ClickFix?
What happens when you are confronted with ClickFix? i.e. (from a linkedinpost by Alex Zammit ) A site popped this “I’m not a Robot check”. The site injected a command…
Botnet Takes Advantage of Cheap IoT Devices
Yes I am assuming IoT devices from china are ‘cheap’. Look at this FBI IC3 headline: Home Internet Connected Devices Facilitate Criminal Activity probably important to know – what is…
Make Assessments and Prepare for the Unknown
In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering…
