Hacking imgsrc passwords

cybersecurity

2012.05.22 07:07 Not_Not_FBI cybersecurity

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
[link]


2012.02.24 21:11 /r/ScriptSwap - Share your scripts!

[link]


2011.07.27 02:49 ThatGuy20 IMVU

The officially unofficial IMVU Subreddit!
[link]


2024.05.15 00:02 peachyxcorpse Boyfriend's snap hacked, nothing gets rid of hacker.

My boyfriend's account got hacked yesterday. He fell for the "can you do me a favor" scam, not going to go into detail about it. The hacker stole a photo and is snapping and messaging people trying to get their accounts and money from them. We reset the password multiple times on multiple devices but he still has access to the account. We tried to deactivate it but he was able to reactive the account. He is still active on the account and keeps adding more people every time we remove them. We have contacted snapchat support forms multiple times to try to get the account terminated so he can't do anymore harm but all they do is send us password reset links instead of actually helping. All of the help forms I submitted mentioned multiple times that reseting the password didn't help but we just keep getting password reset links instead of help. If anyone has any idea what we can do, please. Someone already sent the dude money. Nothing we can do can get this guy off the account. Snapchat support is doing nothing, I've been having people report hid account for spam but it doesn't seem to be helping.
submitted by peachyxcorpse to SnapchatHelp [link] [comments]


2024.05.14 23:40 LasersAreSo70s ENOUGH of these fucking Windows Alternative Sign In Methods!!!

Fuck please just make a good old school PC that you can just flip the power on and start using it.
Enough of these fucking ' Windows Hello ', ' Authenticators ', ' Passkeys ', ' Fingerprint ' Sign in fucking bullshit you fucking assholes! I now have to use my regular password to generate a 2nd password that will get sent to my fucking phone and then enter that on my PC and only then I can use my computer to just open a powerpoint presentation!?!?!? Like I'm fucking hacking into the CIA server remotely!?
Fuck this bullshit! I've even been locked out of Microsoft apps because one of my authenticators were not set up properly and I cannot even choose to use my regular password for that because I now need to login through that locked-out authenticator to first TURN IT OFF!
Fuck you assholes! I cannot even use your damn apps now.
submitted by LasersAreSo70s to Rants [link] [comments]


2024.05.14 22:58 Bungo_pls Do lockouts make complexity moot?

This question is mostly for my own curiosity but why is the time to brute force a password considered an important metric in driving password policy when account lockouts after X number of attempts are standard practice?
A company I work with is changing from 8 to 11 character length. Upper, lower, number, symbol, and 24 password history was already implemented on top of permanent lockout after 5 attempts until unlocked by admin.
Does this character extension actually do anything at all? Brute force hacks are impossible on accounts that are locked out anyway, yes?
submitted by Bungo_pls to cybersecurity_help [link] [comments]


2024.05.14 21:56 BenjiB1243 I keep getting sms 2fa codes, but it’s not me…

I keep getting 2fa codes for twitter, but I’m not the one requesting them.
At first I thought it was someone trying to access my account, so I changed my password to something very strong, and a few hours later I got another 2fa code.
Is someone trying to access my account? What do I do?
I’m still getting codes to this moment, I actually just got one as I was writing this post.
I’m not worried for my account getting hacked into, because I have 2fa and all of the necessary security settings enabled, but still. If it’s someone trying to get into my account it’s kind of unsettling.
submitted by BenjiB1243 to Twitter [link] [comments]


2024.05.14 21:56 SpiritAxplO Ive been Blocked out My Account Help

So my steam account have literally just been hacked (yes I play gw2 through steam), I was able to contact steam support and thankfully I was able to get back my account the same day. I took some time to play gw2 after getting it back completed dragon end's meta then logged off. fast forward to today I came home wanting to chill on gw2 and I got an error saying that I've been "blocked" for security purposes Please contact customer support for assistance. I went to AreaNet official page to sign in and create a ticket for my issue but I cannot sign in I even change my password incase I forgot it and after that io tried again and still cant log in. I need help. what should I do to Unblock my account. and thank you.
submitted by SpiritAxplO to Guildwars2 [link] [comments]


2024.05.14 21:10 Faithhal The Risks of Unauthorized Access: Understanding the Implications of Hacking Someone's Computer Over the Internet

In recent years, the internet has become an integral part of our daily lives, facilitating communication, commerce, and entertainment on an unprecedented scale. However, this connectivity also brings with it certain risks, including the potential for unauthorized access to personal computers and sensitive information. One of the most concerning threats in this digital landscape is the act of hacking someone's computer over the internet.
Hacking, in its broadest sense, refers to gaining unauthorized access to a computer system or network. While some individuals may be tempted to explore hacking out of curiosity or a desire for adventure, it's essential to recognize the serious legal and ethical implications of such actions. Hacking into someone's computer without their consent is not only unethical but also illegal in many jurisdictions.
There are various methods that hackers may use to gain access to a computer over the internet, each with its own level of complexity and sophistication. One common technique is known as phishing, where attackers send deceptive emails or messages designed to trick recipients into revealing their login credentials or other sensitive information. Once obtained, these credentials can be used to access the victim's computer remotely.
Another method used by hackers is exploiting software vulnerabilities. Software, like any other complex system, is prone to bugs and security flaws that can be exploited by malicious actors. Hackers may exploit these vulnerabilities to gain unauthorized access to a computer or network, often by deploying malware or other malicious code.
For more>> How to hack someones computer over the internet
In addition to these technical methods, hackers may also employ social engineering tactics to manipulate individuals into divulging sensitive information or granting access to their computers. This could involve impersonating a trusted individual or organization, exploiting personal relationships, or preying on emotions such as fear or urgency.
It's crucial for individuals to take proactive steps to protect themselves against these threats. This includes practicing good cybersecurity hygiene, such as using strong, unique passwords for each online account, keeping software and operating systems up to date with the latest security patches, and being cautious when clicking on links or downloading attachments from unknown sources.
Furthermore, individuals should be wary of anyone requesting sensitive information or access to their computer, especially if the request seems suspicious or out of the ordinary. When in doubt, it's always best to verify the legitimacy of the request through independent channels before taking any action.
Ultimately, hacking into someone's computer over the internet is a serious offense with potentially severe consequences. Not only does it violate the privacy and security of the victim, but it also undermines trust in the digital ecosystem as a whole. By understanding the risks and consequences associated with hacking, individuals can better protect themselves and their personal information online.
submitted by Faithhal to u/Faithhal [link] [comments]


2024.05.14 19:49 Sammoonryong Over night my MegaRayquaza got replaced by Basculegion

Over night my MegaRayquaza got replaced by Basculegion
https://preview.redd.it/ch8o4iwfjf0d1.png?width=1732&format=png&auto=webp&s=acc8945eb37e7fc2b33d1ee25b8ce1c1783c6058
Well I started the game just now and noticed my MegaRayquaza is gone. Maybe hacked? Idk since I didnt really take a secure password lmao. Still its kinda weird.
Well my Endless Run is kinda bricked oh well we go againe.
Edit: some of my settings were changed as well.
submitted by Sammoonryong to pokerogue [link] [comments]


2024.05.14 19:05 keblawben Concerns About Sonos Web App Security

I wanted to raise my concerns about the security aspects of the new Sonos web app.
While it's exciting to see the promises of 'enhanced user experience and better remote access' , it's essential for us to consider potential security risks that might come with it.
One concern stems from Sonos' history with security challenges. Take, for example, the discovery of security flaws in Sonos One wireless speakers during a hacking contest back in May 2023. These vulnerabilities could potentially enable attackers to execute arbitrary code or access sensitive information.
Another aspect to consider is the sign-in process for the web app. Currently, it only requires your Sonos account email address and password, with no additional layers of security like two-factor authentication or passkeys. This raises questions about the adequacy of measures to prevent unauthorized access.
Moreover, if you have locally stored music, it's likely on a PC or network storage device. Given recent issues with app upgrades, it's valid to question how well Sonos has ensured that a breach in the login procedure couldn't lead to exploitation of network links.
Common web application vulnerabilities like Cross-Site Scripting (XSS) and Injection Attacks are also potential threats. It's crucial to understand what protections are in place to mitigate these risks.
While Sonos has addressed security issues in the past, the transition to a web-based platform introduces new challenges. We need clear communication from Sonos regarding the specific security enhancements and protections implemented in the new web app.
submitted by keblawben to sonos [link] [comments]


2024.05.14 18:58 GiversBot /u/NOT_DJ_ZX removed from /r/ModSupport on 2024-05-14 (t3_1crwzfy up 0.00 days)

NOT_DJ_ZX was removed from /ModSupport

Quick search

Title

My account is hacked and i can login help asap

Post contents

this reddit account (u/yazan_zx12) was one of my accounts that got hacked and i am trying to get it back or at least try unlinking the google account but the hacker changed the password and the E-mail so i can't do nothing but report my problem and i have proof of me owning it(e-mails and screenshots), i can login to this account with my google but i don't want this account so am trying to delete it or take it back and unlink and change the pass even it's banned i don't care about the reddit account more than the google account and i want to make another one with this google account so i need help as fast as possible
submitted by GiversBot to modsupportremovals [link] [comments]


2024.05.14 18:38 Rigamortus2005 Account hacked

Hi, my account has been hacked and the password changed, I don't have access to the recovery phone number and I don't have any images or videos in the account. I primarily use it for memes and stuff. How can I regain access? So far I've emailed support but what else can I do?
submitted by Rigamortus2005 to Instagram [link] [comments]


2024.05.14 18:28 Busy_Door4825 Account hacked and its strange

Hello guys
So my account was stole few months back and i have contacted ubisoft and as expected not a single reply yet from their side. I have rainbow six siege which was purchased from epic games so i thought to myself what happens if i download it from epic games and to my surprise when i downloaded it and opened the game it opened my ubisoft account without requireing any email or password (Ubisoft security excellance lol) Anyway i was able to see the dihead who stole the account he deleted all my friends made the account private and changed the email , he is from argentina appearntly and this fuhead got the account banned from r6s due to hacks. 14 years i have had this ubisoft account for it to be hacked by someone without even recieving an email that someone changed my email and getting it banned. It's kinda of sad how poor ubisoft support is and i will never ever buy a single thing from them , i had all AC games Far cry games ...etc. In conclusion should i be optimistic that i can get my account back ? And if i could can this ban be removed if i contact them and explain that my account was hacked ?
submitted by Busy_Door4825 to ubisoft [link] [comments]


2024.05.14 17:49 ForGxz I lost my roblox account which I created on 2019

Can anyone help me regarding my Roblox account? I remember the password correctly since it's saved on my computer, but it was incorrect. Also, I received an email from Roblox saying that they are removing my 2-step verification without proper reason. What I think is that because of Roblox, my account got hacked due to the fact that they turned off my 2-step verification (I was taking a break from Roblox). My account has been offline ever since February 6, 2023, 12:22 PM. Someone help me. I have full proof that I am the account owner. I have receipts,codes, anything that will prove that the account is mine. Please help me.
And yes I already tried contacting roblox support but they end up ignoring me even with full proof that the account is mine. (useless clowns)
submitted by ForGxz to RobloxHelp [link] [comments]


2024.05.14 17:26 LeekAggravating345 Hacked / Compromised Account Got Banned

A year ago, somone got access to my account and changed the credentials on it (password, email, id). Last week I finally retrieved the account because I was scrolling through the pictures folder and saw the date on the screenshot of my screen when I first played valorant. I recovered my account using the details that I have (username, email that I used to create my account, account creation date, dob, and other extra details that needed to be filled up).
When I opened the account I saw that the account is "Permanently Suspended due to repeated disruptive communications". I looked up the account on tracker.gg and I saw that the person who hacked it was playing on it. So I sent a ticket to support to see if they can lift the ban because the account was compromised during the time of ban and the damages done to the account was not of my doing.
After explaining the situation to the ticket description, riot replied with: I have re-check your chat logs and I can see some negative attitudes in the game. I'm sorry to tell you that if the ban becomes warranted, the ban will remain.
I didn't have access to the account during the ban hence I asked for an investigation on it but they just keep responding the same thing over and over again.
I'm wondering what should I do? I've done the things that the people advised me to do yet support refuses to investigate my account. It's been very tiring for me to keep explaining the same thing over and over again. Is there anyone who can help with this situation that I have? Anything that I should say or do for them to investigate and verify that my account was banned DURING compromisation?
TL;DR - Someone hacked into my account, played with it, and got it banned. Asked riot for investigation to get the ba lifted but refuses to do so.
submitted by LeekAggravating345 to riotgames [link] [comments]


2024.05.14 16:27 Billiethebattlecattl I think my icoud got hacked

I think my iCloud was hacked
I think my iCloud was hacked
I am having a number text me old nudes of myself saying fucked up stuff that’s making me feel awful about myself. I dont know what to do because I dont know who it is and they said they hacked my iCloud but my iCloud doesn’t show that I was hacked so I just changed my password and signed out of all devices. I’m getting really fed up with this it’s such an invasion. I have so much going on right now and this shit is pushing me over the edge. I’m not even sure if anyone here can help I just figured someone here might have some advice. The number isn’t the same every time and they’ve been adding one of my friends to the chat (they also do this to him). There has been 2 different numbers so far but they seem to be coming from the same person and they always come through as texts not iMessage.
submitted by Billiethebattlecattl to cybersecurity_help [link] [comments]


2024.05.14 16:21 Big_Bag3648 HOW TO HACK INSTAGRAM ACCOUNT/PASSWORD REMOTELY INSTAGRAM MESSAGE HACKER NEEDED INSTAGRAM HACKING INSTAGRAM SPY HACKER FACEBOOK HACK AVAILABLE RECOVER LOST/HACKED INSTAGRAM ACCOUNT

A̅s̅ ̅f̅o̅r̅ ̅h̅a̅c̅k̅i̅n̅g̅ ̅r̅e̅l̅a̅t̅e̅d̅ ̅i̅s̅s̅u̅e̅s̅A̅s̅ ̅f̅o̅r̅ ̅h̅a̅c̅k̅i̅n̅g̅ ̅r̅e̅l̅a̅t̅e̅d̅ ̅i̅s̅s̅u̅e̅s̅;̅ ̅C̅o̅n̅t̅a̅c̅t̅ ̅t̅h̅i̅s̅ ̅h̅a̅c̅k̅e̅r̅
̅
̅C̅o̅n̅t̅a̅c̅t̅ ̅h̅e̅r̅
̅C̅Y̅B̅E̅R̅T̅O̅O̅L̅Z̅0̅0̅9̅@̅g̅m̅a̅i̅l̅.̅c̅o̅m̅
̅S̅M̅S̅ ̅o̅n̅ ̅W̅h̅a̅t̅s̅a̅p̅p̅:̅ ̅+̅1̅ ̅2̅3̅4̅ ̅5̅4̅2̅-̅8̅8̅9̅8̅
̅T̅e̅l̅e̅g̅r̅a̅m̅ ̅t̅e̅x̅t̅ ̅(̅@̅)̅c̅y̅b̅e̅r̅_̅h̅e̅l̅p̅9̅1̅1̅
̅f̅o̅r̅ ̅t̅h̅e̅ ̅f̅o̅l̅l̅o̅w̅i̅n̅g̅:̅
̅F̅a̅c̅e̅b̅o̅o̅k̅ ̅H̅a̅c̅k̅*̅ ̅S̅n̅a̅p̅c̅h̅a̅t̅ ̅H̅a̅c̅k̅*̅ ̅T̅i̅k̅t̅o̅k̅ ̅H̅a̅c̅k̅*̅ ̅T̅e̅l̅e̅g̅r̅a̅m̅ ̅H̅a̅c̅k̅*̅ ̅W̅h̅a̅t̅s̅a̅p̅p̅ ̅H̅a̅c̅k̅*̅ ̅O̅n̅l̅y̅f̅a̅n̅s̅ ̅H̅a̅c̅k̅*̅ ̅I̅n̅s̅t̅a̅g̅r̅a̅m̅ ̅H̅a̅c̅k̅*̅ ̅E̅m̅a̅i̅l̅ ̅A̅c̅c̅o̅u̅n̅t̅ ̅H̅a̅c̅k̅*̅ ̅E̅m̅a̅i̅l̅ ̅I̅n̅t̅e̅r̅c̅e̅p̅t̅i̅o̅n̅ ̅H̅a̅c̅k̅*̅ ̅V̅o̅t̅i̅n̅g̅ ̅C̅h̅a̅n̅g̅e̅r̅ ̅H̅a̅c̅k̅*̅ ̅C̅r̅e̅d̅i̅t̅ ̅R̅e̅p̅a̅i̅r̅*̅ ̅B̅l̅o̅c̅k̅e̅d̅ ̅W̅e̅b̅s̅i̅t̅e̅ ̅H̅a̅c̅k̅*̅ ̅W̅e̅b̅s̅i̅t̅e̅ ̅&̅ ̅B̅l̅o̅g̅ ̅H̅a̅c̅k̅*̅ ̅C̅y̅b̅e̅r̅ ̅T̅r̅a̅c̅k̅i̅n̅g̅*̅ ̅D̅e̅l̅e̅t̅e̅d̅ ̅T̅e̅x̅t̅ ̅M̅e̅s̅s̅a̅g̅e̅ ̅R̅e̅c̅o̅v̅e̅r̅y̅*̅ ̅W̅o̅r̅d̅ ̅P̅r̅e̅s̅s̅ ̅B̅l̅o̅g̅ ̅H̅a̅c̅k̅*̅ ̅L̅o̅s̅t̅ ̅F̅i̅l̅e̅/̅D̅o̅c̅u̅m̅e̅n̅t̅ ̅R̅e̅c̅o̅v̅e̅r̅y̅*̅ ̅C̅r̅i̅m̅i̅n̅a̅l̅ ̅R̅e̅c̅o̅r̅d̅ ̅C̅l̅e̅a̅r̅a̅n̅c̅e̅ ̅H̅a̅c̅k̅*̅ ̅D̅a̅t̅a̅b̅a̅s̅e̅ ̅H̅a̅c̅k̅ ̅*̅ ̅H̅a̅c̅k̅i̅n̅g̅ ̅c̅a̅r̅d̅ ̅d̅u̅m̅p̅s̅ ̅o̅f̅ ̅a̅l̅l̅ ̅k̅i̅n̅d̅s̅ ̅*̅ ̅U̅n̅t̅r̅a̅c̅e̅a̅b̅l̅e̅ ̅I̅P̅s̅ ̅*̅ ̅H̅a̅c̅k̅i̅n̅g̅ ̅b̅a̅n̅k̅ ̅a̅c̅c̅o̅u̅n̅t̅s̅ ̅*̅ ̅H̅a̅c̅k̅i̅n̅g̅ ̅i̅n̅d̅i̅v̅i̅d̅u̅a̅l̅ ̅c̅o̅m̅p̅u̅t̅e̅r̅s̅ ̅*̅ ̅H̅a̅c̅k̅i̅n̅g̅ ̅w̅e̅b̅s̅i̅t̅e̅s̅ ̅*̅ ̅R̅e̅m̅o̅t̅e̅ ̅d̅e̅v̅i̅c̅e̅ ̅c̅o̅n̅t̅r̅o̅l̅ ̅h̅a̅c̅k̅ ̅*̅ ̅B̅u̅r̅n̅e̅r̅ ̅N̅u̅m̅b̅e̅r̅s̅ ̅h̅a̅c̅k̅ ̅*̅ ̅P̅a̅y̅p̅a̅l̅ ̅a̅c̅c̅o̅u̅n̅t̅ ̅v̅e̅r̅i̅f̅i̅e̅d̅ ̅*̅ ̅D̅e̅l̅e̅t̅e̅ ̅l̅e̅a̅k̅e̅d̅ ̅s̅e̅x̅ ̅t̅a̅p̅e̅ ̅a̅n̅d̅ ̅a̅ ̅l̅o̅t̅ ̅e̅v̅e̅n̅ ̅m̅o̅r̅e̅
̅D̅o̅ ̅y̅o̅u̅ ̅w̅a̅n̅t̅ ̅t̅o̅ ̅h̅a̅c̅k̅ ̅s̅o̅m̅e̅o̅n̅e̅ ̅e̅l̅s̅e̅'̅s̅ ̅a̅c̅c̅o̅u̅n̅t̅ ̅o̅r̅ ̅p̅h̅o̅n̅e̅ ̅t̅o̅ ̅m̅o̅n̅i̅t̅o̅r̅ ̅o̅r̅ ̅t̅r̅a̅c̅k̅ ̅t̅h̅e̅i̅r̅ ̅c̅a̅l̅l̅s̅ ̅a̅n̅d̅ ̅m̅e̅s̅s̅a̅g̅e̅s̅,̅ ̅w̅h̅y̅ ̅n̅o̅t̅ ̅a̅s̅k̅ ̅a̅ ̅p̅r̅o̅f̅e̅s̅s̅i̅o̅n̅a̅l̅ ̅h̅a̅c̅k̅e̅r̅ ̅t̅o̅ ̅h̅e̅l̅p̅ ̅y̅o̅u̅ ̅m̅o̅n̅i̅t̅o̅r̅,̅ ̅t̅r̅a̅c̅k̅ ̅a̅n̅d̅ ̅h̅a̅c̅k̅ ̅t̅h̅e̅i̅r̅ ̅m̅e̅s̅s̅a̅g̅e̅s̅ ̅a̅n̅d̅ ̅d̅a̅i̅l̅y̅ ̅a̅c̅t̅i̅v̅i̅t̅i̅e̅s̅.̅
̅A̅n̅d̅ ̅i̅f̅ ̅y̅o̅u̅'̅r̅e̅ ̅w̅o̅n̅d̅e̅r̅i̅n̅g̅ ̅h̅o̅w̅ ̅i̅t̅ ̅w̅i̅l̅l̅ ̅b̅e̅ ̅d̅o̅n̅e̅,̅ ̅w̅h̅y̅ ̅d̅o̅n̅'̅t̅ ̅y̅o̅u̅ ̅l̅e̅a̅v̅e̅ ̅i̅t̅ ̅t̅o̅ ̅t̅h̅i̅s̅ ̅h̅a̅c̅k̅e̅r̅
̅Y̅o̅u̅ ̅j̅u̅s̅t̅ ̅h̅a̅v̅e̅ ̅t̅o̅ ̅s̅i̅t̅ ̅b̅a̅c̅k̅ ̅a̅n̅d̅ ̅r̅e̅l̅a̅x̅ ̅a̅n̅d̅ ̅w̅i̅t̅h̅i̅n̅ ̅a̅ ̅f̅e̅w̅ ̅h̅o̅u̅r̅s̅ ̅y̅o̅u̅ ̅w̅i̅l̅l̅ ̅h̅a̅v̅e̅ ̅f̅u̅l̅l̅ ̅u̅n̅n̅o̅t̅i̅c̅e̅d̅ ̅a̅c̅c̅e̅s̅s̅ ̅t̅o̅ ̅t̅h̅e̅ ̅a̅c̅c̅o̅u̅n̅t̅ ̅y̅o̅u̅ ̅w̅a̅n̅t̅ ̅t̅o̅ ̅h̅a̅c̅k̅.̅ ̅B̅e̅l̅i̅e̅v̅e̅ ̅m̅e̅.̅
̅I̅ ̅h̅a̅v̅e̅ ̅c̅o̅m̅e̅ ̅a̅c̅r̅o̅s̅s̅ ̅w̅h̅a̅t̅ ̅w̅i̅l̅l̅ ̅a̅n̅s̅w̅e̅r̅ ̅t̅h̅e̅ ̅m̅i̅l̅l̅i̅o̅n̅s̅ ̅o̅f̅ ̅q̅u̅e̅s̅t̅i̅o̅n̅s̅ ̅w̅e̅ ̅h̅a̅v̅e̅ ̅b̅e̅e̅n̅ ̅a̅s̅k̅i̅n̅g̅ ̅o̅u̅r̅s̅e̅l̅v̅e̅s̅ ̅a̅l̅l̅ ̅t̅h̅i̅s̅ ̅t̅i̅m̅e̅ ̅a̅n̅d̅ ̅o̅n̅c̅e̅ ̅w̅e̅ ̅a̅n̅s̅w̅e̅r̅ ̅o̅u̅r̅ ̅q̅u̅e̅s̅t̅i̅o̅n̅s̅,̅ ̅w̅e̅ ̅w̅i̅l̅l̅ ̅b̅e̅ ̅f̅r̅e̅e̅ ̅f̅o̅r̅e̅v̅e̅r̅.̅
̅I̅t̅ ̅h̅a̅s̅ ̅a̅ ̅2̅4̅-̅h̅o̅u̅r̅ ̅r̅e̅f̅u̅n̅d̅ ̅p̅o̅l̅i̅c̅y̅ ̅i̅f̅ ̅y̅o̅u̅ ̅f̅i̅n̅d̅ ̅t̅h̅e̅ ̅s̅e̅r̅v̅i̅c̅e̅ ̅u̅n̅s̅a̅t̅i̅s̅f̅a̅c̅t̅o̅r̅y̅ ̅a̅n̅d̅ ̅d̅o̅n̅'̅t̅ ̅l̅i̅k̅e̅ ̅w̅h̅a̅t̅ ̅y̅o̅u̅ ̅s̅e̅e̅.̅
̅W̅h̅y̅ ̅d̅o̅n̅'̅t̅ ̅y̅o̅u̅ ̅c̅l̅e̅a̅r̅ ̅y̅o̅u̅r̅ ̅t̅h̅o̅u̅g̅h̅t̅s̅ ̅a̅n̅d̅ ̅c̅l̅e̅a̅r̅ ̅y̅o̅u̅r̅ ̅d̅o̅u̅b̅t̅s̅ ̅t̅o̅d̅a̅y̅ ̅a̅n̅d̅ ̅a̅s̅k̅ ̅a̅ ̅p̅r̅o̅f̅e̅s̅s̅i̅o̅n̅a̅l̅ ̅h̅a̅c̅k̅e̅r̅ ̅t̅o̅ ̅h̅e̅l̅p̅ ̅y̅o̅u̅ ̅w̅i̅t̅h̅ ̅y̅o̅u̅r̅ ̅h̅a̅c̅k̅s̅.̅ ̅T̅o̅d̅a̅y̅ ̅I̅ ̅r̅e̅c̅o̅m̅m̅e̅n̅d̅ ̅t̅h̅i̅s̅ ̅g̅r̅e̅a̅t̅ ̅h̅a̅c̅k̅e̅r̅ ̅t̅o̅ ̅e̅v̅e̅r̅y̅o̅n̅e̅
̅
̅C̅o̅n̅t̅a̅c̅t̅ ̅h̅e̅r̅
̅
̅C̅Y̅B̅E̅R̅T̅O̅O̅L̅Z̅0̅0̅9̅@̅g̅m̅a̅i̅l̅.̅c̅o̅m̅
̅
̅S̅M̅S̅ ̅o̅n̅ ̅W̅h̅a̅t̅s̅a̅p̅p̅:̅ ̅+̅1̅ ̅2̅3̅4̅ ̅5̅4̅2̅-̅8̅8̅9̅8̅
̅
̅T̅e̅l̅e̅g̅r̅a̅m̅ ̅t̅e̅x̅t̅ ̅(̅@̅)̅c̅y̅b̅e̅r̅_̅h̅e̅l̅p̅9̅1̅1̅
submitted by Big_Bag3648 to u/Big_Bag3648 [link] [comments]


2024.05.14 16:17 Trajemoi25-02 Account hacked and stolen.

Hello all!
I’m writing this message because my account “Trajemoi25” was hacked and my email and password changed - Reddit not being in any way helpful.
If anyone has received a private message from Trajemoi25 or have seen a post from that account on or after May 1st this year, it was NOT me.
So far I am not aware of any unsavory activity and I hope it stays that way, but I would like to in advance apologize in the event it occurs, and make sure everyone knows it isn’t me.
Just another thing to deal with on my lonesome.
Take care, And thanks again.
submitted by Trajemoi25-02 to widowers [link] [comments]


2024.05.14 16:14 HisDudeness3008 A spanish university behind german ransom emails?

Edit: upon further searching, the concerned university is not Spanish, but Peruvian. My bad for European-centric thinking.
Hello, everybody! I'm here with my story about an ongoing series of ransom emails I've been receiving. I'm not scared as they are obviously fake, I'm more between entertained and curious.
Let's start from the beginning. I received an email having the low-effort password I use for non-important sites as a subject. The body is a copypasta in German, only having my password, my email address, the amount to pay and the address where to send the money as the customized parts, written in bold. The text, for whoever is curious enough to analyze this absurd story in depth, is the "Hallo, mein perverser Freund" one.
To summarize the content, this self-declared Big Brother or the All-Seeing Eye ("Big Brother oder das alles sehende Auge nennen") claims to have installed an unspecified trojan on an unspecified device of mine, and with that they recorded me pleasuring myself to highly controversial videos using the webcam. They ask for €1200 in Bitcoins with a 48h deadline to stop them from sending those videos to all my email contacts as well as uploading them online.
What's ludicrous about that, aside from how generic the claim is in order to be a little credible for any victim, is they claims they gained access to all my devices by hacking one. In my case, that's even more comedic as my laptop has a killswitch for the webcam (meaning it always had a black piece of plastic obscuring it, since I never use it), while my phone is an Asus Zenfone 6, which has no front camera (the rear camera flips over when you need one). They have been really unlucky with me. Also, How can they film what I've supposedly been watching while engaging in self eroticism with my front camera?
Other criticalities are: I have no contact in my email account, nor in any application I use it with. That's not how people use emails in 2024, unless it is a business account. Plus, they claim the password they displayed as the mail's subject is my email account password. No, it is not. It is just the zero-effort password I used on some websites that have been breached (eg Linux Mint Forums and the defunct Linux Forums among the others) back in 2018-2020 (they sure took their sweet time to decrypt an all-lowercase 10 letter password).
Also, they say they sent the mail form a temporary account. They did not. They used a regular hotmail account, which has been pwned too (the poor sap, which has the misfortune of having a physical address linked to his email address on a google-able website, used the same password for his email and a website that suffered a data breach). They say, judging from my conversations, people think I'm a decent person. I have no human conversations in my email. Just notices of new replies on forums etc.
To get to the title of my post, let's skip to 3 days later (oops, more than 48h). I received another email. This time in English. This time, apparently from my own address (I suppose it is to show they really have access to my email account), even if it doesn't show in my "Sent" folder (if they want to convince me they have access to my account, they shouldn't delete it from there, I think). They say they approved "a new payment schedule" for some random practice number never mentioned before. This time, they talk about Pegasus. I'm honored to know they used a spyware that costs millions of dollars for each license, and that the DEA refused to use because of its high price, on me. Luckily for me, either they are a different party, or they lowered their price. This time, they ask for $850 dollars. I suppose they don't know much about leverage.
Anyway, I opened the email's header. They were lazy enough to modify the "from" field, but not the "return-path" one. What puzzled me? This field appears to be an administrative address belonging to a private-owned Peruvian online university. I have to admit I don't know much about informatics, and I can't tell if that grants the fact that was the true sender behind the fake self-sent email. But the hypothesis alone has me in stitches. Please help me uncover this mystery.
Thank you for your attention!
submitted by HisDudeness3008 to cybersecurity_help [link] [comments]


2024.05.14 16:10 daisy5305 My facebook got hacked and i have no idea how to retrieve it please help

My facebook was recently hacked, it only had my old phone number registered which i no longer have access to, and the password was changed, the person keeps posting random photos, how can I contact facebook and report this or get my account back, a CS number appeared but im concerned its a scam, i don't care if i shut it down or keep it, I just want the hacker or whoever out of it
submitted by daisy5305 to facebook [link] [comments]


2024.05.14 15:58 jolipixel Twitter/X Account Hacked, No Email Change Notification?

I woke up this morning to find that my TwitteX account has been hacked. I've been logged out, and it looks like both my password and email address have been changed. Strangely, I didn't receive any notification on my email about these changes. How is this even possible?
I've already sent a support request to TwitteX. For those who have experienced this before, how long does it usually take for them to restore access to the account? Any tips on speeding up the process or ensuring it gets resolved?
submitted by jolipixel to Twitter [link] [comments]


2024.05.14 15:57 SN1226 HACKED

Someone have hacked my account in codm I can still log in but the person keeps log in to my account and changed my names and deleted my friends and everything. And plays on my account. Can I in any way do so this person leave my account? I have change password and everything but nothing seems work 🙃
submitted by SN1226 to CallOfDutyMobile [link] [comments]


2024.05.14 15:36 ThatOnePersonUwU AITAH for unfriending an alcoholic who won’t get help?

Before I start this, I just want to answer some question I know I’ll probably have to answer later, or share some information that might be important.
  1. I have gone no contact with him. (He tries to bait me into talking to him.) Only my friend group knows about the alcohol.
  2. I know for a fact he drinks, I was with him once when he did it.
  3. It’s not his parent’s fault, he sneaks it from open vodka bottles in their refrigerator.
  4. I know he is drinking while underage, I plan to report him to the school counselor if he doesn’t seek help.
  5. We’re both gay, though I do not like him like that in any way shape or form. He swears up and down he doesn’t like me like that either, but take that how you will.
  6. He has allegedly been drinking since he was 7. I can neither confirm nor deny this.
  7. He blames all of his problems on the alcohol.
I, 16m, was friends with another boy, 15m, for roughly 4 years. We used to call each other every day to play games. Every single day for 4 years. Everything was fine until I started hanging out with our other (mutual) friends.
After I started hanging out with other people, he began to get very jealous and bitter towards me and the friend I was talking to. He would act annoyed and upset whenever I would do things with my other friends, even though it’s the same things I would do with him. This is when the arguing began. He would make snarky comments toward me indirectly through his bio on either a game we play together or the app we use to text and call. He would always deny that it is about me, even if it was blatantly obvious. (For example, I used to give myself nicknames on the game we play together. He combined the starting letter of the 3 I've used and said something along the lines of “ABC gave me everything but real love.”)
We would argue like this and he would come to school like nothing happened and act friendly towards me, even if it was obvious that I didn’t want to act friendly with him. He would also frequently block me for absolutely no reason, and unblock me after a few hours. If I asked for a reason, he would get mad and change the subject. Of course, I got tired of this and blocked him back one day. To nobody’s surprise, the next day at school he was talking to me and making jokes like absolutely nothing happened.
One day, he even decided it would be a great idea to ignore me while I was sitting right next to him. I would talk to him, wave my hand in front of him to get his attention, and even tap his shoulder. No response. I obviously got fed up with him and let my friends know in a group chat that he isn’t in what was going on incase they were curious why either of us were annoyed. (This wasn't the best idea, I know, however he gets mad when I hang out or talk to them differently than I do with him so the most logical thing to do was to not let him know when I hang out or text with them.)
Before this next part, I have to go back a little bit. Because we would play games together, we would log into each other’s account to farm or grind for something the other wants. This lead to him knowing my password and email. Since he saw me typing on my phone, he saw the group chat that doesn’t have him in it. He took that as a sign that I was talking shit about him to our friends (I truly was not.) and decided to try and hack my account. Luckily, I’ve always used a secondary email on the games we play, so he only got my old account.
Not knowing that this happened, I forgave him for everything that he did prior. A few days later, at the end of school before I left, we were talking when he said the name of my secondary account. Of course, I asked how he knew about it, and he said he logged in. I obviously got very angry at him for this, as I had not given him permission whatsoever. I told him I would have showed him my messages had he just simply asked. This caused him to get angry at me for being angry at him. (He also got angry at me when he got the notifications that he had been removed from my email. I also changed my passwords, have no fear.)
After discussing this with our mutual friends, they confirmed that what he did was not okay. Because I was getting more distant from him, he thought that he should buddy up to someone else in our friend group. (He barely speaks to anyone else if he doesn’t have to.) Of course, he chose the one person that he supposedly hates based on past events. (Not my story to share, I apologize.)
(I don’t remember this part all too well so take it with a grain of salt.) After a while, I decided to give him another chance. We had a conversation where I brought up all of the issues I had with him in a few paragraphs. (Mainly stuff about boundaries and respecting me. Also for pulling my hair whenever he got the chance even though I told him multiple times on multiple occasions to stop.) His response was changing the subject to something different, and about me. I promptly him shut down, however, as he was bringing up stuff that I didn’t do, insisting that he at least acknowledges his problems instead of pretending everything is fine. This ultimately lead to him getting angry and ending the conversation with his signature “Okay. Bye.”
He then went back to pretending everything was normal with me, though he was talking shit about me in a group chat with our mutual online friends and one of our real life friends (The one he hated that I mentioned previously.) She would tell me everything he said about me, but she didn’t want to get involved so I couldn’t call him out for any of it. At this point, I was just tired of fighting, so I went with it. Many more minor arguments happened after this. I won’t include details for the sake of this post not being too unbearably long, since what happened was basically the previous fight over and over.
A while later, one of our friends called him out for his shit, as I had been letting them know what was going on for every argument we had. He got really heated over this, and told her to kill herself and that he never valued her as a friend. She gave no shits at all. He was promptly removed, or left on his own, from all of the group chats with her in them except our main server. They had each other blocked, though to nobody’s surprise that didn’t stop him from talking about her or to her in the server.
Though 2 out of 5 people in our friend group wanted nothing to do with him, that didn’t stop him from sitting with us and trying to joke around with us like nothing happened. For a while, everything was fine. I wasn’t talking to him, he wasn’t talking to me. Another fight happened between him and the friend he hated before, but that isn’t my story to tell either, sorry. The only thing I can say about the fight is that he mentioned his alcohol addiction.
One thing lead to another and I decided to give him one last chance. Again. So, I had another conversation with him, letting him know that im serious about unfriending him if he doesn’t talk to his therapist about the alcohol, jealousy, and obsession with me.
I gave him until the end of the week to talk to his therapist, or I’m gone. Everything was fine until the weekend. I went on a trip to Dollywood on the weekend, 4 of my friends being there. He of course did not come on the trip, as he isn’t in the school club that took us. I asked him on Sunday if he had talked to his therapist about anything yet, and he had said no. I rightfully blocked him, just as I said I would. He proceeded to play the victim and started asking our friends what he did wrong, pretending that I hadn’t told him anything about blocking him.
I unblocked him momentarily to send a message on why I did it. I told him blatantly that if he didn’t talk to his therapist I would block him, and he did not. I may have been a little harsh with my words, but keep in mind that I have given him many chances to grow and learn from his mistakes that he has not taken. He needs help, and I can’t help him. I wished him the best, but told him that the best is not something I am capable of giving him.
After I blocked him again, he edited one of his messages to “call me out” for not doing what he wanted. He claims that I should’ve just listened to his issues and tell him everything was fine instead of letting him know that what he’s doing is wrong. He doesn’t want help, he wants someone to ignore his problems. I told him that im not that person and im tired of pretending I am. He proceeded to make his bio things along the lines of “You never actually loved me” once more.
After his numerous attempts at getting me to talk to him by making his bio about me, I got fed up. I confronted him, letting him know that I don’t want to be friends with him, I don’t want anything to do with him, and that he needs to stop talking about me in his bio. He of course pretended his issues didn’t exist, instead telling me that he would get help for real this time. I let him know that he just admitted to not trying to get help the first time, and that in lying to me, he broke my trust in him.
Because I knew he wouldn’t try to get help, I blocked him after saying goodbye once more. This is when he started openly shit talking me and the friend that called him out one single time. He changed his bio to things about my body he knew I was insecure about, such as my forehead. While I admit that this wasn’t the best thing to do, I gave him a taste of his own medicine. He’s a bigger individual, and he’s told me that he’s insecure about his weight.
Again, I apologize for what I said to him, I was angry when I said it. He said I have a sixhead, so I retaliated with seventeen stomach and that he can’t be talking about me when he looks 5 years pregnant. I mean no hate to pregnant people, I was angry at him when I said it. I do not condone rudeness towards plus sized or pregnant individuals. Back to the story.
He made a post on a platform we all use about how he hates Taylor Swift fans, especially the blonde ones. (Ironic when he was talking about how he liked her a while ago. Also, the friend that called him out is blonde and a big Taylor Swift fan.) So, in retaliation, our other, OTHER friend commented the username to his twitter account where he actively reposts nsfw images of gay furries, often depicted as children. I was the only person that knew about it, since he reposted such images and showed them to me in class, to my discomfort. I am usually not one to air out dirty laundry like that, however he had done something similar to me a while back, and I honestly didn’t care how it would make him feel.
I took another page out of his book and edited my message since we had each other blocked, telling him to stop shit talking me in his bio, and that I wanted nothing to do with him. Since that happened, he hasn’t made his bio anything about me, instead changing it to some joke about being 5 years pregnant.
Nobody has told me that what I’ve done was wrong, I just would like to make sure that I’m not in the wrong here. Any thoughts would be appreciated.
submitted by ThatOnePersonUwU to AITAH [link] [comments]


2024.05.14 14:33 SALVAGEDATA_ What Are Physical Access Attacks and How Do I Stop Them?

What Are Physical Access Attacks and How Do I Stop Them?
https://preview.redd.it/j91u12l6zd0d1.png?width=600&format=png&auto=webp&s=c6207e093e878cfe73739275f732645286602c52
Physical access attacks encompass all the ways someone could steal your information. When attackers are able to physically reach a system, they can wreak havoc in the business operations, databases, documentations or archives, thieve confidential information, capture traffic through attaching a protocol analyzer to your network and so on.
Let’s say you are working at your local Starbucks; only for a moment, you get up for a refill, leaving your laptop on the table, believing nothing bad can happen while you’re away; but should you turn your head, someone comes by, inserts a USB device and steals your data, or deploys malicious software onto your device. Of course, it’s just a rough example; but it demonstrates well that in actual it is just as simple, and it leaves you with a compromised system or corrupted, rendered inaccessible data.
All the above means any education, as well as user awareness training on social engineering will be beneficial for them.
PHYSICAL ACCESS ATTACKS: A TOOL OF SOCIAL ENGINEERING
Since it includes both technical and administrative elements, physical security is often overlooked due to lack of awareness: to avert hacking attacks, most organizations are focusing on technology-oriented security countermeasures — and, despite the fact industry leaders have been saying for ages that physical access will always trump digital controls, physical security remains one of the weakest points in an otherwise robust defense.
Not only malefactors from outside organisations, however, may be involved in inflicting harm on the crucial information stored in your device — those can also be insiders: disgruntled employees, greedy contractors, malevolent business partners etc. This is why companies should keep an eye on their routers, firewalls, server farms, cameras, doors, fences, lights, and key systems that are often ignored and exploited; once the importance of real-world security is taken into account in addition to efforts on the digital front, it might save them from vast material losses.
Now, the most common ways of physical access attacks (apart from actual breaking into server rooms, of course) are invasions via USB and insecure passwords.
USB CONNECTION
When you or someone else plug equipment into a USB connection, your computer has a USB host controller that it joins to. This connection runs similar to an internet connection in that it contains packets and other components. Upon accepting the connection, the host then presents the USB device to the operating system, and this could represent the biggest risk to your computer’s data. If the USB device possesses malicious packets, these can transfer onto your device; once successful transfer happens, these files can corrupt your entire system. Even worse, they can deploy a Rubber Ducky attack, which creates malicious code by mimicking the keyboard.
As to the physical access through the USB, Google Chrome’s intention to limit USB access will come to your aid: in case you leave your laptop alone (but have the foresight to lock the screen) and someone tries to plug in a USB device, the computer’s operating system will prevent it from executing the code. Along with this, Google is adding a feature that allows users to disable all USB connections from their Chromebook, eliminating any of the USB attacks from happening.
PASSWORDS
Since they represent a common access point into a PC and network, passwords are considered to be vulnerable to attacks by hackers as they may allow the intruders to access files and other data. A physical access attacks caused by broken passwords remain quite frequent case these days — which is why knowing what can be done about it is a must since there’s a risk each computer user may face.
The most common advice for precluding such incidents consists of a) using hard-to-guess passwords, and b) regularly changing them in order to prevent hackers from cracking the access and using them to penetrate your system.
Meanwhile, improved method to protect a PC and network from physical access attacks includes also investing in biometric devices in addition to — or to eliminate the need of — using passwords. This, however, is quite an expensive way (especially if users want to protect multiple computers).
TIPS FOR PREVENTING PHYSICAL ACCESS ATTACKS
Since hackers prey on the easiest opportunities, physical security control includes extra precautions.
  1. Refrain from leaving your device unattended (especially in public areas) should also be remembered. And, if for some reason you have to, lock the screen before leaving. Doing so can shield your device from executing malicious files.
  2. Apply best practices when setting passwords — select long passwords which include letters, numbers and special characters, and bother to change them frequently. If needed, consider using tools, such as enterprise password management or Identity and Access Management (IAM), as an additional measure.
  3. Deploy two factor authentication (2FA) and biometric devices for better protection.
  4. Avoid utilizing USB devices that came from untrusted sources.
  5. Watch over all the elements of physical security of your enterprise (fences, key systems, security alarms etc).
Finally, if you lose data due to malicious code, physical hardware failures or other problems, know solutions could be available: the team at SALVAGEDATA specializes in data recoveries for a diverse array of server and device types, so we can surely help you there!
submitted by SALVAGEDATA_ to u/SALVAGEDATA_ [link] [comments]


http://swiebodzin.info