Safe Harbor on Cyber is a 'safe harbor' blog site on cyber security for families and small businesses with news on cyber threats, risk, data breach, identity thefts, ransomware, cryptocurrency, and vulnerabilities items.
CyberWisdom Safe Harbor Commentary Today I came across this story from thehackernews.com that discovers how malware hidden in the pop-up from Facebook Password Stealing Apps works and are found in Android Play Store. DO YOU HAVE THESE APPS INSTALL, if so delete them ASAP… and enable Google Play Protect. All the apps have since been
CyberWisdom Safe Harbor Commentary Today I came across this story from blog.malwarebytes.com that proposes a surprising hack that a trojan called Lo lo lo Loapi (what a name) could break your Android. Like the Trojan AsiaHitGroup we discovered last month on Google Play, this malware can do all the things-it’s a downloader, dropper, SMS Trojan, and
Today’s smartphones are powerful computers that allow us to perform the task of being a technology genius for only a generation. These devices also often contain a large amount of confidential information, including the content of our text and e-mail correspondence, as well as accessing various accounts through pre-signed applications. Therefore, you must protect your
CyberWisdom Safe Harbor Commentary on Hacked Smartphone Apps The outerplaces.com reveals an outer space article calling the possibility of a – Hacked Smartphone Apps Could Be Used to ‘Blow Up’ Your Workplace – or at least could cause great disruption or havoc in any systems, such as SCADA system in a plant. Any Smartphone Apps with a
CyberWisdom Safe Harbor Commentary I couldn’t believe this story from gbhackers.com that covers a hidden hack under Kali Linux using Metasploit service, Read this article below to show you how to use TheFatRat. This is a simple tool to build a backdoor and post-browser attack. This tool generates malware of a mainstream payload, then perfect