Yasmin walmart generic

Did I experience racism?

2024.06.09 22:12 Pale_Field4584 Did I experience racism?

I was on vacation (I'm Mexican-American from Texas) and stopped by the Walmart in Smelterville, Idaho. I'm 29 F light skin, 5'7, brown eyes and hair (honestly I look very generic). I was wearing a blue cap.
I was standing near the clothing area with the cart, waiting for my partner who went to fetch some wood. I was 10ft from the registers just chilling/waiting.
I noticed a young White man (employee) that just stood there in front of me with his arms crossed looking at me intently in a not-so friendly manner like this As soon as I noticed it I just looked down on my phone and pretended I was minding my own business, but I could still see him from my peripheral vision.
He stood there for a solid 4 minutes watching me until my partner came, then he left.
I still wonder what that was about. Was he mad I was there? Did he think I was going to steal something? Maybe my cap made me look sus?
submitted by Pale_Field4584 to Idaho [link] [comments]


2024.06.09 21:56 Latios- [TOMT] Name of the brand that would put weird little quotes on their packaging

Not Dr. Bronner’s, but the feel is the same.
They made very generic items that you could find in Walmart or in a dollar store, and the things you used to be able to see on google were like, paper plates, plastic utensils, birthday candles, napkins, pencils; stuff like that.
The quotes were usually inspirational and I think religiously based, but I don’t exactly remember.
the part that made it weird is that every product had a different quote, and the quote was very inconspicuously placed on the packaging to where you would almost miss it if you weren’t looking for it.
The brand name is coming to me like “___- brite” or something.
submitted by Latios- to tipofmytongue [link] [comments]


2024.06.09 18:27 Initial_Ring3014 Bausch & Lomb Sensitive Eyes® Plus Saline Solution

Does anyone know why Bausch & Lomb Sensitive Eyes® Plus Saline Solution Is no longer available in stores? I have had to get it off of Amazon lately. I have been unable to find it in a store for over 2 years! I emailed the company a few times and their answer is always "Oh yes, it's available at Walmart, Target, etc.." but I can't find it anywhere but Amazon.
The generic versons are not the same and very uncomfortable. Usually I think the brand makes no difference and it's just something in people's heads but the generic really isn't as good. I have tried the Equate, Up & Up, CVS versions and they are not the same. Equate was the worst! I had to take the lenses out immediately!
submitted by Initial_Ring3014 to contacts [link] [comments]


2024.06.09 07:10 AshKetchep Yard Sale Scare [Pet tax included because she's relevant to the story]

Yard Sale Scare [Pet tax included because she's relevant to the story]
Hey Joel and fellow Let's Read fanatics, I'm a long time fan of your narrations. Funny enough, the stories I'm sending in happened yesterday and today, and I was listening to some of your videos at the time.
So, to set the scene, today and yesterday I (f) hosted a yard sale. It went very well, I had fun, made a friend and even found something cool at a yard sale across the street from mine.
The yard sale was mixed. I had some expensive things near me (games, consoles, electronics, dishes, pristine/unused name brand stuff, etc) and some less expensive (sold for $1 or less) items scattered around the lawn like generic t-shirts, hoodies, movies and miscellaneous toys.
Friday (yesterday) was uneventful (sales wise) with some vague interest but no buyers. I set up at 8 and sat around until around 3:00pm, when I packed up. There was a storm due around then anyway, but that wasn't what drove me to pack everything up so soon.
I believe it was 2:15pm when it happened. I was sitting outside with my dog (don't worry, dog tax will be provided) when I noticed a man across the street behaving suspiciously.
Now, the yard is in an L shape that wraps around the house. On the left side facing away from the house is a busy street, and across that street is some more homes. Most of the people in those homes are elderly or otherwise vulnerable. I was in my seat facing that side due to my signs and tables being set up along that sidewalk.
Anyway. The man was waving his hands around, looking at the sky and skipping around like a child. I watched as he went to someone's door and began to knock on it erratically, talking to himself, and making a motion like he was praying. When nobody answered, he just walked down the porch. He then sort of waved at me when he saw I was there and casually moved to the next house to repeat this routine.
I then realized the house he was going to had their garage wide open. The elderly lady who lived there has two outdoor cats and I realized she must have forgotten to close it when she got the food.
The man seemed to forget I was there for a moment, and went to walk into the garage. He then froze and slowly turned to look in my direction.
Now, to explain something before I go on, my dog is exactly medium sized. She's about up to my knees height wise, and on her back legs her head reaches my chest. Despite her size, she has a scary bark and massive teeth. She's a big, playful sweetheart though and wouldn't hurt a fly.
She was sitting under my chair because it was hot out and was obscured. I feel this is important to note.
Back to the story. The guy turned to look at me, then began to walk toward the street to cross and come toward me.
I immediately stood up, trying to make myself look more alert. I'm 5'6 and I don't look small by any means. I've done taekwondo for years, and am by no means scrawny. I think my adrenaline kicked in about now, because I felt pretty confident standing up like that, but all that confidence felt like it drained from my body seconds later.
At first, he didn't seem to care about my front which I'll admit, really scared me because at this point he was on the sidewalk near where I was seated now.
When he crossed the sidewalk onto my lawn though, my dog came out from under my chair and growled at him, baring her teeth and everything.
This dog is an absolute sweetheart, and I've never seen her genuinely bare her teeth at anyone if it wasn't for playing. She plays rough, but I've never seen her behave that way.
The guy immediately stopped and looked at her, then just smiled at me for a few minutes before backing up and, get this- skipping away along the sidewalk to leave.
I was just frozen for a moment, wondering what the hell just happened. At some point though, I decided to call my dad and keep him on the phone while I started to pack up the valuables in my sale. I also kept my knife out in case something else happened but thankfully nothing did. The guy was gone, and the most that happened later was a little rain that afternoon.
Today I set up again to sell, and yet another odd thing happened. Today I kept a weapon near me to be on the safe side (my knife and some wooden Kali/Escrima sticks) and warned my neighbors who were having a yard sale about what happened yesterday.
Today, I was just relaxing during the last hour I planned to keep the sale up. My grandparents (who I live with) had gone to the store so I was alone out there. I had just put my dog back inside since it was too hot for her, and was listening to the podcast (specifically one with a story about a schizophrenic roommate) while I watched people walk by.
At some point, a very thin man carrying a Walmart bag and a jug of water came to my corner. He was talking to himself on the way over, and when he got to the tables, I greeted him with a smile as one does.
He then immediately launched into a whole spiel about how he loves, loves LOVES the bracelets I had on display and asked me over and over if I made them. I'd made them for a shop a while ago. They were ATLA (Avatar the Last Airbender) themed. I remember specifically he picked one I made with blood bending in mind (blue and white beads with pearl beads surrounding a clear, red one).
I told him as much, and let him know they were just 25 cents, and casually asked if he had someone in mind to give it to while he searched his pockets for a quarter. I should have guessed by his initial behavior that he was gonna launch into another thing.
He began going on about how he was single, and how he wished he had someone to give the bracelet to but he didn't. He then suddenly changed the topic asking if I played guitar. I should have gently sent him on his way and told him no, but for some reason my dumbass told him I did.
I play electric and acoustic. He then immediately got right up close and told me to get my guitar so he could play me a song. I politely declined, holding onto one of my kali sticks in case he didn't back off. He then got really pushy, walking me closer to the front door before I gave him a stern no and asked him for payment on the bracelet. He just smiled and handed me a pile of coins before going to grab his water jug and Walmart bag.
I didn't feel as threatened by this guy despite him being more invasive because I felt more prepared to deal with him. Despite his behavior, which I suspect had to do with drug use since meth/similar stumulants and their respective junkies are popular in my area, he wasn't aggressively walking toward me and backed off when I was firm unlike the first guy. I grew up around drug addicts because of my mom, so I know what the behavior is like, and I'm pretty sure this guy took something before heading out.
I later found out this same guy borderline harassed my neighbor and was actually pretty aggressive toward them. He was pushy, and threatened to "leave a note" on their door.
Anyway, there's my back to back weird encounters at a yard sale stories.
I decided to write this out for two reasons. One, to warn people about how weird people can be, especially in environments like yard and garage sales, and two, because writing things down and talking about it helps me process.
It didn't strike me until just an hour ago that the guy being weird on Friday (yesterday) possibly meant to do me harm, but my dog being there possibly prevented that.
submitted by AshKetchep to LetsReadOfficial [link] [comments]


2024.06.09 04:51 peanutbutterandjulie Does picking up Adderall from a specific pharmacy affect its efficacy for you personally?

I have been on generic Adderall 25mg XR for about 10 years so far. I usually pick up my Adderall from Walmart because they usually have it in stock, but had to switch to CVS this time because it was back ordered at Walmart. I’ve never had an issue like this before but I can’t even tell that it’s working. Could this be because Walmart gets it from a different manufacturer? How do I find out which manufacturer supplies which med to which pharmacy? If it’s not the meds, what other reason could it be?
I’m curious to hear others experiences and thoughts on the matter, particularly on how others are dealing with their ADHD in the midst of the Adderall shortage. Thank you!
submitted by peanutbutterandjulie to adhdwomen [link] [comments]


2024.06.09 04:16 zjor1 Ibuypower aio

what are the thoughts on this/ibuypower aios in general? tbh, this aio looks cool imo and is a nice and low price, but i cant find a single review about it online as it seems to be a very new product. if i get this, can i expect it to perform atleast as well as my generic $20 amazon single fan air cooler, and not destroy my pc?
and to explain why i’m shopping on walmart for an aio, i was given a $50 gift card lol
submitted by zjor1 to PcBuild [link] [comments]


2024.06.09 04:15 Zestyclose-Leg9325 Personal postpartum experience opinions and recommendations

No one asked for this, but honestly, I just feel l like talking, don't have any friends that particularly care about this information, and maybe someone will find this useful.
First baby. I'm about 4 days post partum and had an all natural birth at a birth center at 41 weeks 6 days. I was in labor for 30 hours and in active labor for 6 of those hours. Pushed out a 9 pound 8 oz baby with a total of 3 small tears on my left and right sides that did get stitched up.
-Everyone loves and recommends the peri bottles, the Frida mom ones arnt the only ones available if you look up portable bidet you can find the same type with the angled water spout for half the cost at Walmart Amazon wherever
-i have 2 peri bottles cause getting up to refill is one of the worst things
After I'm done spaying and the bottle is empty, I like to use it as an air fan to help me "airdry" faster, like keep squeezing it, and it should blow air on you
I started taking a generic amazon stool softener at 38 weeks. I definitely missed a few days here and there, and I started taking them religiously while in labor and post partum 1 per day. Took a very large and compacted poop day 4 with extremely low strain, no pain, and lots of slow controlled breathing.
i already have enough laundry without getting blood all over everything. Adult diapers have 100% prevented the leakage I would have otherwise had if just using a pad.
People rave about the homemade padsicles with the regular pad, Aloe, which hazel thrown in the freezer. I made some. Not really a fan it's way too cold to be comfortable to begin with, and then the perfect amount of cold lasts for like 2 seconds. I just put 2 or 3 tucks wipes in my diaper and spray with Dermoplast
Getting help while getting in and out of the shower makes me feel significantly safer and not like my leg is going to slip left or right and rip open all my stitches
I don't feel particularly maternal in any way, but I am very proud of my perfect little baby. And the midwives say it's totally natural to take a while to prosess everything
To actually get the baby out, I had to push through the rest between 2 contractions to get enough push for a lack of better words
I didn't do this but if I had to do it again I would trim up my lady bits, not shave, but mow some of the longer patches for literally no other reason than the blood drying the hair in a weird way and being uncomfortable. Just one less dollop of discomfort on an already heaping Sunday of uncomfortable.
they lubed me up with olive oil to loosen things up, like an onion to be sautéed.
The midwives had to coach me through getting my water to break naturally and " pushing it out" cause it didn't till about hour 4 of active labor. My husband described it as watching a cartoon ball of snot fly across the room. The midwives had a chuck absorbant pad to catch it, but they missed entirely. It hit the wall.
afterbirth smells quite potent, all the stuff in your pad/adult diapers it's not a period it's after birth with blood clots and other birth remnants, anyway it has a very unique and strong smell to say the least. I put a candle or 2 in my bathroom to help cover up the smell as I do not enjoy it
The hormone letdown after giving birth made me sweat profusely, no temperature high or anything, but i would be totally drenched when I woke up
I put a pack of disposable face wipes in my bathroom recovery cart so I can at least clean my face while doing my thing and not have to deal with the strain if leaning over a sink
The little one gallon trashcan that most people have in their bathrooms is not fully equipped to take the amount of trash that you are about to produce. Between diapers, nipple pads, and anything else, I fill one to the brim, a day
I'm using a Google spreadsheet on my phone that I shared with my husband so we can both add in times and sides and temperatures on our own devices
I'll add more as I think of them Edit: added more and grammer
Personal opnions, not medical advice
submitted by Zestyclose-Leg9325 to BabyBumps [link] [comments]


2024.06.08 23:27 Ok_Pipe_6630 hsa saver plan prescriptions

are generic meds $4 at walmart/sam’s before the deductible or only after if you are on the saver plan?
I know brand name will be full contracted cost till i meet deductible for rx
submitted by Ok_Pipe_6630 to walmart [link] [comments]


2024.06.08 16:07 DenseEnvironment4959 Yet another Aldi appreciation post (also better than Lidl?)

Like literally everyone in this sub, I've noticed that stores like Lidl, Aldi, (and Walmart and Target) tend to offer better prices compared to the regular chain grocery stores in my area, such as Stop and Shop and ShopRite. I usually opt for store brands as well.
Recently, I did a shopping trip at Aldi and found it to be cheaper than Lidl. Aldi had significantly lower prices on some items, like eggs, and prices were otherwise comparable. There are a few specialty products, like the beets, pierogis and cabbage at Lidl, that are second to none. But I've noticed some issues with certain 'generic' products at Lidl, like the dairy having almost no taste and the naan not being great. We tend to avoid their tomato sauce as well. Aldi on the other hand was pretty universally okay to good. Like the cottage cheese might be some of the best that I've had. And the cream cheese didn't taste like saltless foam.
Overall, while I used to think these stores were pretty similar, I've come to realize that taste-wise, Aldi stands out. So while, I'll have to drive more than double the distance, I think I'm an Aldi-boy for the most part from here on out. Anyone else notice the same? Anything I should be avoiding at Aldi?
submitted by DenseEnvironment4959 to Frugal [link] [comments]


2024.06.08 09:12 breadslinger Hello everyone, I just joined because I'm getting back into biking and would like opinions on upgrading my old bike or buying new.

https://lumalabs.ai/capture/026AA941-591C-4B3F-8F72-6B568AF65BA0
That is a link to the LumaAI 3D model of my bike, I figured it be the best way for y'all to check it out and give me y'all's thoughts on if I should upgrade or not and possibly some directions to cheap upgrades y'all would recommend.
My dad bought it for me when I was roughly 14-15 I think( now 31) and was 130lbs heavier (yes the bike played part lol) He actually did a lot of research, went to a dedicated local bike shop, and had them put certain parts like the springs in the forks for my weight and honestly I love the bike even as it stands so I'm really leaning to upgrading.
The forks squeak and I can tell they are not a squishy as it should be and I can barely make it go mid stroke even bouncing full weight on handle bars. It has the generic older style 3/7 transmission which except for it not being able to shift to 3rd isn't bad and I think a slightly upgraded kind than you'd get from a Walmart bike (I think, it's been a while since it was bought so)
I think my only beef with the bike is the forks. I'd like cheap, but also decent air forks that would give me that super soft front suspension. I'd say it wouldn't be a bad idea to upgrade to a 1/10-1/12 trans but I'm not sure how difficult that would be or if the cost of a full new transmission would be worth it. I rarely even want to use my current highest gear 2/7 much less needing to drop into a 3rd gear. My 1st and 2nd work fine and I'll tend to stay in 1st and switch through my rear 7 on trails anyway.
If I said anything or I'm confusing certain terms or parts that's because back when I got this bike I didn't care about the technical stuff, it was a good mountain bike. Now being older along with more time freedom and my own money I've been looking deeper into biking and never realized how much it interested me so I apologize as I am definitely a newb atm lol
Edit: adding that my current riding is urban/back road like, and trails (Nothing with jumps or big hill ramps or crazy downhill, but more Hiking/biking through cut out cleared wooded old atv trails and stuff, Like very rough and uneven terrain.
submitted by breadslinger to MTB [link] [comments]


2024.06.08 08:42 Annual_Order_1676 Cannot Install Fresh Windows 11, Boot to Recovery Screen.

So I've consistently encountered an issue for 9+ hours today and figured I would bring my issue to you guys, as I'm completely up in arms at this point. For starters, I've built over a dozen computers, and never had one this difficult to boot.
So here's the Gist, I had a fully functional PC, that was running Windows 10 Pro without issues (except for a bug with wireless mouse/keyboard constantly losing connection). I saw the windows 11 popup suggesting upgrade and figured my partner would like the newer OS as it's much cleaner visually. I also figured it would help fix her extremely annoying mouse/keyboard issue she's been having for months. A fresh windows install couldn't hurt anything right? I also noticed my drives were for some reason formatted to legacy variants (MBR instead of GPT) and as someone generally building computers I'm unsure why I would have went with that over using UEFI to boot and formatting GPT.
So, I got my USB drive, installed the Windows Media Creation Tool, and set it up to target such drive. Plopped that bad boy into the working PC, edited the bios (Gigabyte x470 Aorus Gaming Ultra) to run UEFI (Disabled CSM) and set the boot USB drive as Boot Option #1 (UEFI:SanDisk, Partition 1). I needed the CSM disabled in order to use Secure Boot, which is only available with UEFI to my understanding. Upon starting the system I got a recovery page.
RECOVERY
There was a problem with a device connected to your PC
An unexpected I/O has occurred
File: \windows\system32\boot\winload.efi Error Code: 0xc00000e9
Press ENTER to try again (Does Nothing, flashes screen black) Press F8 for startup settings (again, black flicker) Press ESC for UEFI Firmware Settings (Sends me to BIOS)
I've tried quite a few things, scoured the internet for numerous solutions, but to no avail.
  1. I disconnected my SSD (mass storage option) and Removed my NVMe to put into my own computer. I then used my computer for to format the drive and convert it to an unallocated GPT drive (figured I could format it again properly when in windows boot).
  2. Updated my BIOS to version F64 (most recent).
  3. Reinstalled Windows 11 to my USB drive.
  4. Installed Windows 10 to my drive to see if it would work.
  5. Re-enabled CSM, now it won't boot either.
  6. Formatted my flash drive, tried both GPT and MBR, also tried both Fat32 aswell as NFTS. None of these options changed anything.
  7. Reset CMOS, tried running with basic settings, same result.
  8. Tried using a different USB Drive, in case the one I had was the culprit.
Another issue I noticed is in my boot options, Windows Boot Manager fails to be an option at any point. Also, neither my NVMe drive nor SSD are in the boot option menu. Only the USB Drive. I've tried numerous tutorials. I cannot get anything other than the recovery screen. The only thing I have yet to change is removing the M.2 NVMe drive again (it's under the GPU and didn't really want to rip it apart again just for another recovery screen. Plus, wouldn't help much if I got to the boot manager and didn't have my planned boot drive available for format and installation). So essentially I've changed multiple BIOS settings, tried everything from enabling legacy boot options to disabling CSM like I originally wanted, resetting CMOS, removing and formatting drives, etc. and nothing is working. I'm halfway tempted to drown this thing in a bath tub. Hardware can't be an issue and it was working great before attempting this factory wipe. I remember having some pretty bad issues with this computer when I first built it, and maybe that's why I went with CSM and MBR in the beginning. But it's been years and I can't wrap my head around any of this.
Specs.
Ryzen 7 2700x EVGA GTX 1050ti X470 AORUS GAMING ULTRA (non-wifi) 16GB Ballistix 3600MHz TEAM NVMe 256gb (Even when formatted GPT, doesn't show unless CSM enabled)
Other Hardware 1TB SanDisk Ultra SSD (Not Connected Anymore) 64GB SanDisk USB 64GB Generic USB (Walmart)
I'm tired of dealing with it. PC only needed secure boot to have W11, figured I was doing the wife a favor.
submitted by Annual_Order_1676 to techsupport [link] [comments]


2024.06.08 01:51 colonelhakuna Advice on Resume

submitted by colonelhakuna to resumes [link] [comments]


2024.06.08 00:59 ErikCoolness O.MG/Malicious Cables - What I Found and How to Protect Your Smart Device

Warning: I am not a technician, programmer, or a cybersecurity expert, I am simply a tech enthusiast who hopes to help people in whatever way possible. So do take my advice with a grain of salt, as what I know may not be 100% true.
Also disclaimer: This post is not to criticize Hak5, O.MG or ridicule their staff, but rather to point out the potential danger posed from anyone who intend to use one of their products for malicious intent. I am sure they mean well, as their products are made to help improve the security of companies and software products.
——————————-
It’s a bit of a rare topic to talk about when it comes to cybersecurity, and I think it deserves more attention, especially since hackers are becoming more clever with hardware.
https://youtu.be/mPF9f-PLDPc?si=NG_MZvUZowT6czQz
I came across this YouTube video by Linus Tech Tips where he talks about a special type of cable known as, O.MG Cables. They sound terrifying because they are replica cables of the ones officially sold for iPhones and Android devices. These cables at first glance look normal and exactly like the ones you’d plug into your phone, but are actually hacking devices. Inside the USB end of the cable is a small, compact Wi-Fi connector that uses the Wi-Fi your device is connected to allow remote access to it. Once plugged in, a hacker immediately has remote access to your phone and it automatically keylogs everything you type, allowing the hacker to read everything you are saying, including in chat messages with other people, and even see your logins and passwords. I’ve been doing research on these things for the past two weeks now, and as a guy who travels a lot, either to college or general public, I even started to wonder if my cables were replaced at some point by somebody unknowingly. It was just simply out of fear and imagination though, and I’m pretty sure they’re still the same cables I’ve always had and used, plus I’m sure I would’ve noticed if somebody replaced them or tapped into my phone, but I am keeping a close eye on my cables from now on. (I mean I’m using my phone to make this post now.)
Now, I want to clarify, what I’m about to say is pretty much already covered in Linus’ and other YouTube videos, but I felt it necessary to spread word with more detail as possible.
Throughout my research, I found out these cables are sold by a company called, Hak5, who sells a bunch of hacking devices to red teams, IT departments, corporations, police departments, government agencies, or people in general to help improve security systems and patch out vulnerabilities in software. This is their website here:
https://shop.hak5.org
No, it’s not some black market scheme; these are legally sold. I know the media usually portrays hacking in a dark tone, whether it’s on a fictional TV show or video game, or news outlets explaining the dangers of hacks, but not all hacks are malicious as the media portrays; as already mentioned, they are sometimes done to help find vulnerabilities to be patched. If you’re into cybersecurity or a tech enthusiast like me, you may have at one point heard of the Wi-Fi Pineapple, a device used to find holes in a public Wi-Fi and eavesdrop on people, or the USB Rubber Ducky, a device made to look like a normal USB Flash Drive is actually a small computer that loads hacking payloads onto PC’s. These are actually products of Hak5. The O.MG Cable basically does the same thing as the Rubber Ducky, but it’s harder to detect since it was mainly made for smartphones, and they’re often detected as keyboard or mouse peripherals, which is usually the method of bypassing. They are indeed intended for smartphones, but in some cases I heard it can also affect computers too.
In case you don’t know what a payload is, it’s basically a script or a piece of code written by a hacker, made to cause the target system to do things without the need of its intended user, such as commanding the computedevice to open the default web browser and immediately go to a malicious website to download malicious files. Another reason why O.MG Cables and their payloads in particular are harder to detect is because the payloads are written in a unique coding language made for the O.MG Cables.
The O.MG Cable isn’t actually made by Hak5, but rather a product they sell in cooperation with another company, that being O.MG. Now I know what some of you iPhone users may be thinking: “what’s the big deal? Just update your iPhone and don’t jailbreak it!” Oh my friend, you have no idea what this thing is capable of. The O.MG Cables are regularly updated, with various updates, and new payloads are shared amongst people who use Hak5 sold products, and O.MG every once in a while releases a new model of O.MG Cables. Just last month, as of the time of this post, they released a new version:
https://youtu.be/TYXeIBhYZrw?si=-nFc1WuDH9Has5Dh
The good thing about cables like these, whether they’re O.MG or generic malicious cables, because there are some that have existed before O.MG ones, is that they are rare, and Hak5 sells O.MG Cables at a minimum of $180 USD. You’re most likely to see one of these things left on the ground at corporate offices or government agencies, where hackers might attempt to breach and obtain vital company or government information by hoping someone working in those fields will pick them up and think they’re benign devices. Now, that doesn’t mean that anybody who has a hold of one of these things won’t try to hack into a random individual’s device.
However, if you are somewhat worried whether or not your USB cables are legit or not, there do exist software and devices that can help you ease your worries, most notably, USB data blockers. These small USB devices were made to block out data transfers but allow power to pass through them, making it safer to even use public chargers that the FBI and other law enforcement agencies keep telling people not to use (though, I personally still wouldn’t trust them anyways). There’s plenty of them out there, but the most popular choices I’ve seen are the following:
-Juice Jack Defender -PortaPow USB Data Blocker -Charger Defender -Gosund USB Data Blocker -USB Condom (Yes, that’s actually its name.) -The Databloc -JSAUX USB Data Blocker
O.MG even made one themselves, because (this may make you chuckle) the wife of the guy who made the O.MG Cables got tired of trying to figure out which cables they had in their home were O.MG Cables, and which ones were genuine charger cords. According to the webpage on Hak5 and O.MG’s instruction manual for the product, this not only blocks data, but also there’s an LED indicator to alert the user that the Cable is attempting to connect to Wi-Fi or perform actions other than charging, so good thing they made such a product:
https://shop.hak5.org/products/malicious-cable-detector-by-o-mg
If you’re wondering whether or not your cable may be malicious, and for some reason you cannot get ahold of a device or software that can help you find out, here are some things and some signs to know if your phone is hacked, especially by one of these:
  1. You may already know this one, but one of the first well known obvious signs is that your battery is draining fast. This is because your phone or device is being forced to do extra work so that the hacker maintains access to your phone.
  2. Another well known and obvious sign is that your device is heating up even without you using it. This ties in with #1, where the device is doing extra work to keep the hacker connected.
  3. Your web browser suddenly opens a web page you didn’t even intend to open. The keyboard is also acting on its own to make this happen.
  4. Your device suddenly installs an app that you don’t even remember installing.
  5. Probably the scariest one, is that your device suddenly sends texts or messages to others you don’t remember sending or the phone suddenly takes a photo from the camera or screenshot of what’s currently on the screen and immediately sends it to an unknown contact.
  6. If you’re using an iPhone, it should be un-jailbroken. Being jailbroken means that your iPhone can download unauthorized apps and run files that are not approved by Apple and published in the AppStore. Apple keeps the iPhone un-jailbroken and sandboxed to ensure the safety of the user and to make sure iOS is as secure as possible, and the only software that you can download to your iPhone are the ones approved by Apple. If you find that your iPhone is jailbroken and you did not intend for this to happen, this means a hacker had somehow tapped into your phone and uploaded malicious code to jailbreak itself, so that the hacker could do more damage to it by making it download unauthorized files.
Note: 3,4, and 5 are signs that payloads were executed onto your device. As mentioned before, these are scripts or at least, pieces of code that were unknowingly sent by the hacker and executed so that the device performs actions that were not intended by the user and could most definitely be an indication that something you plugged into your phone is malicious.
These are some of the more well known signs of malware or hacks present on your device, and it may be best to check and see if your cable or whatever you may connect to it may be responsible. But what should you do if you believe the cable you currently hold is malicious? Here’s some steps I came up with:
  1. Throw it away, or if possible, turn it in to police department. Throwing it away may sometimes or most times be the better, time saving option because oftentimes, a malicious cable has a self-destruct feature. Don’t worry, I do not mean it’ll blow up and cause physical harm to you. What this means is that the hacker can put in a command that’ll tell the cable’s computer components to delete everything it may have stored onto itself and fry the electronics, turning it into a normal charging cable and leaving no traces in the code as to who was hacking you. The hacker no longer has access to your device or can control the cable afterwards, but you should still throw what’s left in the cable away even if they could or did self-destruct it. So, when throwing it away, and I recommend wearing rubbenon-conductive gloves if you feel the need to do this, cut the wire in half or in pieces with a pair of scissors, flush cutter, or a knife and dismantle the connectors on both ends, the USB connector and the lightning/USB-C connector; this can be done by either crushing the shell and pulling the components apart with some strong pliers, or, and a bit of a dangerous method, smash it with a hammer. I don’t recommend the latter though, as the internal pieces could go scattering and end up somewhere you can’t find or get to them. If you can and it’s recommended anyway, dispose of the now dismantled cable in an e-waste bin. The reason we want to tear it up like this is so nobody else falls victim to the cable.
  2. Replace your wire with an official wire from retail, such as Best Buy, Walmart, or even an Apple Store, or a phone service store like T-Mobile, Verizon, etc. Don’t buy a cable off of eBay, since most of the times, those are just random sellers who are not affiliated with a business and there’s a chance they might have tampered with it in some way and secretly turned it into a malicious cable (unless of course for whatever reason, you have a really old iPhone model that requires the old bulky connector). If you intend to buy a third-party cable online, especially from Amazon, do research first, see what people say about the particular cable you are about to buy whether it’s YouTube reviews or reviews on Amazon. I don’t know anything about Android cables unfortunately since I’ve never owned an Android phone, but for iPhones, definitely look for a cable that’s MFI Certified. MFI Certified means that the cable/product was checked and verified by Apple themselves and they confirmed it safe to use.
  3. Factory Reset or download an AV app for your device if the hacks and possible malware continue to persist, even with the cable gone. If you have an Android phone, it’s definitely possible to download an AV off of the Google Store. Definitely find one with good detection rates and a firewall. I usually recommend the following for computer users and they could be just as good on Android if they are available: Bitdefender, Kaspersky, ESET, Malwarebytes, and Sophos. For iPhone users, I hate to say it, but you’re most likely going to have to backup and factory reset your iPhone. Because of the nature of the iPhone and Apple’s strict policy and sandboxing doesn’t allow true antivirus software onto iPhone. You’ll see many AV companies make apps for iPhone, but these are mostly jailbreak checkers and VPNs. Factory resetting is usually the way most iPhone users go to remove malware, hacks, payloads, and even reverse jailbreaks on an iPhone. Even then, Apple usually does great job at patching security exploits, so if you don’t want to do the factory reset, try checking for updates for iOS or simply turning off and on your iPhone again to see if that removes any problems first.
  4. Lastly, and very simple. Keep your device’s OS and apps up to date. Especially if there’s a major update, download and install it. Consider a VPN for extra security if you feel the need.
If the steps above don’t work, it’s probably best to go see a cybersecurity or computer expert. At the very least, you should definitely change any the passwords and set up 2-Factor Authenticators for any and all accounts that were logged in onto your device through a non-compromised one.
That’s all I have to say for this post. I simply wanted to bring attention to malicious USB charging cables and give out some tips on whenever and if ever you came across one and you may have infected your smartphone device with one of these. I’m sure Hak5 and O.MG mean well, since their products are mainly done to pentest security systems and seek out vulnerabilities to help companies and people patch up their systems. The O.MG Cables have been around for some time, about four years now, they even come in different models that aren’t smartphone replicas, such as a USB to USB-C adapter, though the smartphone replicas are much more prevelent. While it is a bit rare to see a hardware based attack these days with tight security amongst corporations, and people being more weary of their surroundings, I still felt it necessary to make this post, and I hope it does potentially help someone in the future.
submitted by ErikCoolness to cybersecurity_help [link] [comments]


2024.06.07 22:24 ErikCoolness O.MG/Malicious Cables - What I Found and How to Protect Your Smart Device

Warning: I am not a technician, programmer, or a cybersecurity expert, I am simply a tech enthusiast who hopes to help people in whatever way possible. So do take my advice with a grain of salt, as what I know may not be 100% true.
Also disclaimer: This post is not to criticize Hak5, O.MG or ridicule their staff, but rather to point out the potential danger posed from anyone who intend to use one of their products for malicious intent. I am sure they mean well, as their products are made to help improve the security of companies and software products.
——————————-
It’s a bit of a rare topic to talk about when it comes to cybersecurity, and I think it deserves more attention, especially since hackers are becoming more clever with hardware.
https://youtu.be/mPF9f-PLDPc?si=NG_MZvUZowT6czQz
I came across this YouTube video by Linus Tech Tips where he talks about a special type of cable known as, O.MG Cables. They sound terrifying because they are replica cables of the ones officially sold for iPhones and Android devices. These cables at first glance look normal and exactly like the ones you’d plug into your phone, but are actually hacking devices. Inside the USB end of the cable is a small, compact Wi-Fi connector that uses the Wi-Fi your device is connected to allow remote access to it. Once plugged in, a hacker immediately has remote access to your phone and it automatically keylogs everything you type, allowing the hacker to read everything you are saying, including in chat messages with other people, and even see your logins and passwords. I’ve been doing research on these things for the past two weeks now, and as a guy who travels a lot, either to college or general public, I even started to wonder if my cables were replaced at some point by somebody unknowingly. It was just simply out of fear and imagination though, and I’m pretty sure they’re still the same cables I’ve always had and used, plus I’m sure I would’ve noticed if somebody replaced them or tapped into my phone, but I am keeping a close eye on my cables from now on. (I mean I’m using my phone to make this post now.)
Now, I want to clarify, what I’m about to say is pretty much already covered in Linus’ and other YouTube videos, but I felt it necessary to spread word with more detail as possible.
Throughout my research, I found out these cables are sold by a company called, Hak5, who sells a bunch of hacking devices to red teams, IT departments, corporations, police departments, government agencies, or people in general to help improve security systems and patch out vulnerabilities in software. This is their website here:
https://shop.hak5.org
No, it’s not some black market scheme; these are legally sold. I know the media usually portrays hacking in a dark tone, whether it’s on a fictional TV show or video game, or news outlets explaining the dangers of hacks, but not all hacks are malicious as the media portrays; as already mentioned, they are sometimes done to help find vulnerabilities to be patched. If you’re into cybersecurity or a tech enthusiast like me, you may have at one point heard of the Wi-Fi Pineapple, a device used to find holes in a public Wi-Fi and eavesdrop on people, or the USB Rubber Ducky, a device made to look like a normal USB Flash Drive is actually a small computer that loads hacking payloads onto PC’s. These are actually products of Hak5. The O.MG Cable basically does the same thing as the Rubber Ducky, but it’s harder to detect since it was mainly made for smartphones, and they’re often detected as keyboard or mouse peripherals, which is usually the method of bypassing. They are indeed intended for smartphones, but in some cases I heard it can also affect computers too.
In case you don’t know what a payload is, it’s basically a script or a piece of code written by a hacker, made to cause the target system to do things without the need of its intended user, such as commanding the computedevice to open the default web browser and immediately go to a malicious website to download malicious files. Another reason why O.MG Cables and their payloads in particular are harder to detect is because the payloads are written in a unique coding language made for the O.MG Cables.
The O.MG Cable isn’t actually made by Hak5, but rather a product they sell in cooperation with another company, that being O.MG. Now I know what some of you iPhone users may be thinking: “what’s the big deal? Just update your iPhone and don’t jailbreak it!” Oh my friend, you have no idea what this thing is capable of. The O.MG Cables are regularly updated, with various updates, and new payloads are shared amongst people who use Hak5 sold products, and O.MG every once in a while releases a new model of O.MG Cables. Just last month, as of the time of this post, they released a new version:
https://youtu.be/TYXeIBhYZrw?si=-nFc1WuDH9Has5Dh
The good thing about cables like these, whether they’re O.MG or generic malicious cables, because there are some that have existed before O.MG ones, is that they are rare, and Hak5 sells O.MG Cables at a minimum of $180 USD. You’re most likely to see one of these things left on the ground at corporate offices or government agencies, where hackers might attempt to breach and obtain vital company or government information by hoping someone working in those fields will pick them up and think they’re benign devices. Now, that doesn’t mean that anybody who has a hold of one of these things won’t try to hack into a random individual’s device.
However, if you are somewhat worried whether or not your USB cables are legit or not, there do exist software and devices that can help you ease your worries, most notably, USB data blockers. These small USB devices were made to block out data transfers but allow power to pass through them, making it safer to even use public chargers that the FBI and other law enforcement agencies keep telling people not to use (though, I personally still wouldn’t trust them anyways). There’s plenty of them out there, but the most popular choices I’ve seen are the following:
-Juice Jack Defender -PortaPow USB Data Blocker -Charger Defender -Gosund USB Data Blocker -USB Condom (Yes, that’s actually its name.) -The Databloc -JSAUX USB Data Blocker
O.MG even made one themselves, because (this may make you chuckle) the wife of the guy who made the O.MG Cables got tired of trying to figure out which cables they had in their home were O.MG Cables, and which ones were genuine charger cords. According to the webpage on Hak5 and O.MG’s instruction manual for the product, this not only blocks data, but also there’s an LED indicator to alert the user that the Cable is attempting to connect to Wi-Fi or perform actions other than charging, so good thing they made such a product:
https://shop.hak5.org/products/malicious-cable-detector-by-o-mg
If you’re wondering whether or not your cable may be malicious, and for some reason you cannot get ahold of a device or software that can help you find out, here are some things and some signs to know if your phone is hacked, especially by one of these:
  1. You may already know this one, but one of the first well known obvious signs is that your battery is draining fast. This is because your phone or device is being forced to do extra work so that the hacker maintains access to your phone.
  2. Another well known and obvious sign is that your device is heating up even without you using it. This ties in with #1, where the device is doing extra work to keep the hacker connected.
  3. Your web browser suddenly opens a web page you didn’t even intend to open. The keyboard is also acting on its own to make this happen.
  4. Your device suddenly installs an app that you don’t even remember installing.
  5. Probably the scariest one, is that your device suddenly sends texts or messages to others you don’t remember sending or the phone suddenly takes a photo from the camera or screenshot of what’s currently on the screen and immediately sends it to an unknown contact.
  6. If you’re using an iPhone, it should be un-jailbroken. Being jailbroken means that your iPhone can download unauthorized apps and run files that are not approved by Apple and published in the AppStore. Apple keeps the iPhone un-jailbroken and sandboxed to ensure the safety of the user and to make sure iOS is as secure as possible, and the only software that you can download to your iPhone are the ones approved by Apple. If you find that your iPhone is jailbroken and you did not intend for this to happen, this means a hacker had somehow tapped into your phone and uploaded malicious code to jailbreak itself, so that the hacker could do more damage to it by making it download unauthorized files.
Note: 3,4, and 5 are signs that payloads were executed onto your device. As mentioned before, these are scripts or at least, pieces of code that were unknowingly sent by the hacker and executed so that the device performs actions that were not intended by the user and could most definitely be an indication that something you plugged into your phone is malicious.
These are some of the more well known signs of malware or hacks present on your device, and it may be best to check and see if your cable or whatever you may connect to it may be responsible. But what should you do if you believe the cable you currently hold is malicious? Here’s some steps I came up with:
  1. Throw it away, or if possible, turn it in to police department. Throwing it away may sometimes or most times be the better, time saving option because oftentimes, a malicious cable has a self-destruct feature. Don’t worry, I do not mean it’ll blow up and cause physical harm to you. What this means is that the hacker can put in a command that’ll tell the cable’s computer components to delete everything it may have stored onto itself and fry the electronics, turning it into a normal charging cable and leaving no traces in the code as to who was hacking you. The hacker no longer has access to your device or can control the cable afterwards, but you should still throw what’s left in the cable away even if they could or did self-destruct it. So, when throwing it away, and I recommend wearing rubbenon-conductive gloves if you feel the need to do this, cut the wire in half or in pieces with a pair of scissors, flush cutter, or a knife and dismantle the connectors on both ends, the USB connector and the lightning/USB-C connector; this can be done by either crushing the shell and pulling the components apart with some strong pliers, or, and a bit of a dangerous method, smash it with a hammer. I don’t recommend the latter though, as the internal pieces could go scattering and end up somewhere you can’t find or get to them. If you can and it’s recommended anyway, dispose of the now dismantled cable in an e-waste bin. The reason we want to tear it up like this is so nobody else falls victim to the cable.
  2. Replace your wire with an official wire from retail, such as Best Buy, Walmart, or even an Apple Store, or a phone service store like T-Mobile, Verizon, etc. Don’t buy a cable off of eBay, since most of the times, those are just random sellers who are not affiliated with a business and there’s a chance they might have tampered with it in some way and secretly turned it into a malicious cable (unless of course for whatever reason, you have a really old iPhone model that requires the old bulky connector). If you intend to buy a third-party cable online, especially from Amazon, do research first, see what people say about the particular cable you are about to buy whether it’s YouTube reviews or reviews on Amazon. I don’t know anything about Android cables unfortunately since I’ve never owned an Android phone, but for iPhones, definitely look for a cable that’s MFI Certified. MFI Certified means that the cable/product was checked and verified by Apple themselves and they confirmed it safe to use.
  3. Factory Reset or download an AV app for your device if the hacks and possible malware continue to persist, even with the cable gone. If you have an Android phone, it’s definitely possible to download an AV off of the Google Store. Definitely find one with good detection rates and a firewall. I usually recommend the following for computer users and they could be just as good on Android if they are available: Bitdefender, Kaspersky, ESET, Malwarebytes, and Sophos. For iPhone users, I hate to say it, but you’re most likely going to have to backup and factory reset your iPhone. Because of the nature of the iPhone and Apple’s strict policy and sandboxing doesn’t allow true antivirus software onto iPhone. You’ll see many AV companies make apps for iPhone, but these are mostly jailbreak checkers and VPNs. Factory resetting is usually the way most iPhone users go to remove malware, hacks, payloads, and even reverse jailbreaks on an iPhone. Even then, Apple usually does great job at patching security exploits, so if you don’t want to do the factory reset, try checking for updates for iOS or simply turning off and on your iPhone again to see if that removes any problems first.
  4. Lastly, and very simple. Keep your device’s OS and apps up to date. Especially if there’s a major update, download and install it. Consider a VPN for extra security if you feel the need.
If the steps above don’t work, it’s probably best to go see a cybersecurity or computer expert. At the very least, you should definitely change any the passwords and set up 2-Factor Authenticators for any and all accounts that were logged in onto your device through a non-compromised one. Also, if you must borrow a USB cable from someone, borrow it from someone you trust, and not just anyone.
That’s all I have to say for this post. I simply wanted to bring attention to malicious USB charging cables and give out some tips on whenever and if ever you came across one and you may have infected your smartphone device with one of these. I’m sure Hak5 and O.MG mean well, since their products are mainly done to pentest security systems and seek out vulnerabilities to help companies and people patch up their systems. The O.MG Cables have been around for some time, about four years now, they even come in different models that aren’t smartphone replicas, such as a USB to USB-C adapter, though the smartphone replicas are much more prevelent. While it is a bit rare to see a hardware based attack these days with tight security amongst corporations, and people being more weary of their surroundings, I still felt it necessary to make this post, and I hope it does potentially help someone in the future.
submitted by ErikCoolness to antivirus [link] [comments]


2024.06.07 21:04 ErikCoolness O.MG/Malicious Cables - What I Found and How to Protect Your Smart Device

Warning: I am not a technician, programmer, or a cybersecurity expert, I am simply a tech enthusiast who hopes to help people in whatever way possible. So do take my advice with a grain of salt, as what I know may not be 100% true.
Also disclaimer: This post is not to criticize Hak5, O.MG or ridicule their staff, but rather to point out the potential danger posed from anyone who intend to use one of their products for malicious intent. I am sure they mean well, as their products are made to help improve the security of companies and software products.
——————————-
It’s a bit of a rare topic to talk about when it comes to cybersecurity, and I think it deserves more attention, especially since hackers are becoming more clever with hardware.
https://youtu.be/mPF9f-PLDPc?si=NG_MZvUZowT6czQz
I came across this YouTube video by Linus Tech Tips where he talks about a special type of cable known as, O.MG Cables. They sound terrifying because they are replica cables of the ones officially sold for iPhones and Android devices. These cables at first glance look normal and exactly like the ones you’d plug into your phone, but are actually hacking devices. Inside the USB end of the cable is a small, compact Wi-Fi connector that uses the Wi-Fi your device is connected to allow remote access to it. Once plugged in, a hacker immediately has remote access to your phone and it automatically keylogs everything you type, allowing the hacker to read everything you are saying, including in chat messages with other people, and even see your logins and passwords. I’ve been doing research on these things for the past two weeks now, and as a guy who travels a lot, either to college or general public, I even started to wonder if my cables were replaced at some point by somebody unknowingly. It was just simply out of fear and imagination though, and I’m pretty sure they’re still the same cables I’ve always had and used, plus I’m sure I would’ve noticed if somebody replaced them or tapped into my phone, but I am keeping a close eye on my cables from now on. (I mean I’m using my phone to make this post now.)
Now, I want to clarify, what I’m about to say is pretty much already covered in Linus’ and other YouTube videos, but I felt it necessary to spread word with more detail as possible.
Throughout my research, I found out these cables are sold by a company called, Hak5, who sells a bunch of hacking devices to red teams, IT departments, corporations, police departments, government agencies, or people in general to help improve security systems and patch out vulnerabilities in software. This is their website here:
https://shop.hak5.org
No, it’s not some black market scheme; these are legally sold. I know the media usually portrays hacking in a dark tone, whether it’s on a fictional TV show or video game, or news outlets explaining the dangers of hacks, but not all hacks are malicious as the media portrays; as already mentioned, they are sometimes done to help find vulnerabilities to be patched. If you’re into cybersecurity or a tech enthusiast like me, you may have at one point heard of the Wi-Fi Pineapple, a device used to find holes in a public Wi-Fi and eavesdrop on people, or the USB Rubber Ducky, a device made to look like a normal USB Flash Drive is actually a small computer that loads hacking payloads onto PC’s. These are actually products of Hak5. The O.MG Cable basically does the same thing as the Rubber Ducky, but it’s harder to detect since it was mainly made for smartphones, and they’re often detected as keyboard or mouse peripherals, which is usually the method of bypassing. They are indeed intended for smartphones, but in some cases I heard it can also affect computers too.
In case you don’t know what a payload is, it’s basically a script or a piece of code written by a hacker, made to cause the target system to do things without the need of its intended user, such as commanding the computedevice to open the default web browser and immediately go to a malicious website to download malicious files. Another reason why O.MG Cables and their payloads in particular are harder to detect is because the payloads are written in a unique coding language made for the O.MG Cables.
The O.MG Cable isn’t actually made by Hak5, but rather a product they sell in cooperation with another company, that being O.MG. Now I know what some of you iPhone users may be thinking: “what’s the big deal? Just update your iPhone and don’t jailbreak it!” Oh my friend, you have no idea what this thing is capable of. The O.MG Cables are regularly updated, with various updates, and new payloads are shared amongst people who use Hak5 sold products, and O.MG every once in a while releases a new model of O.MG Cables. Just last month, as of the time of this post, they released a new version:
https://youtu.be/TYXeIBhYZrw?si=-nFc1WuDH9Has5Dh
The good thing about cables like these, whether they’re O.MG or generic malicious cables, because there are some that have existed before O.MG ones, is that they are rare, and Hak5 sells O.MG Cables at a minimum of $180 USD. You’re most likely to see one of these things left on the ground at corporate offices or government agencies, where hackers might attempt to breach and obtain vital company or government information by hoping someone working in those fields will pick them up and think they’re benign devices. Now, that doesn’t mean that anybody who has a hold of one of these things won’t try to hack into a random individual’s device.
However, if you are somewhat worried whether or not your USB cables are legit or not, there do exist software and devices that can help you ease your worries, most notably, USB data blockers. These small USB devices were made to block out data transfers but allow power to pass through them, making it safer to even use public chargers that the FBI and other law enforcement agencies keep telling people not to use (though, I personally still wouldn’t trust them anyways). There’s plenty of them out there, but the most popular choices I’ve seen are the following:
-Juice Jack Defender -PortaPow USB Data Blocker -Charger Defender -Gosund USB Data Blocker -USB Condom (Yes, that’s actually its name.) -The Databloc -JSAUX USB Data Blocker
O.MG even made one themselves, because (this may make you chuckle) the wife of the guy who made the O.MG Cables got tired of trying to figure out which cables they had in their home were O.MG Cables, and which ones were genuine charger cords. According to the webpage on Hak5 and O.MG’s instruction manual for the product, this not only blocks data, but also there’s an LED indicator to alert the user that the Cable is attempting to connect to Wi-Fi or perform actions other than charging, so good thing they made such a product:
https://shop.hak5.org/products/malicious-cable-detector-by-o-mg
If you’re wondering whether or not your cable may be malicious, and for some reason you cannot get ahold of a device or software that can help you find out, here are some things and some signs to know if your phone is hacked, especially by one of these:
  1. You may already know this one, but one of the first well known obvious signs is that your battery is draining fast. This is because your phone or device is being forced to do extra work so that the hacker maintains access to your phone.
  2. Another well known and obvious sign is that your device is heating up even without you using it. This ties in with #1, where the device is doing extra work to keep the hacker connected.
  3. Your web browser suddenly opens a web page you didn’t even intend to open. The keyboard is also acting on its own to make this happen.
  4. Your device suddenly installs an app that you don’t even remember installing.
  5. Probably the scariest one, is that your device suddenly sends texts or messages to others you don’t remember sending or the phone suddenly takes a photo from the camera or screenshot of what’s currently on the screen and immediately sends it to an unknown contact.
  6. If you’re using an iPhone, it should be un-jailbroken. Being jailbroken means that your iPhone can download unauthorized apps and run files that are not approved by Apple and published in the AppStore. Apple keeps the iPhone un-jailbroken and sandboxed to ensure the safety of the user and to make sure iOS is as secure as possible, and the only software that you can download to your iPhone are the ones approved by Apple. If you find that your iPhone is jailbroken and you did not intend for this to happen, this means a hacker had somehow tapped into your phone and uploaded malicious code to jailbreak itself, so that the hacker could do more damage to it by making it download unauthorized files.
Note: 3,4, and 5 are signs that payloads were executed onto your device. As mentioned before, these are scripts or at least, pieces of code that were unknowingly sent by the hacker and executed so that the device performs actions that were not intended by the user and could most definitely be an indication that something you plugged into your phone is malicious.
These are some of the more well known signs of malware or hacks present on your device, and it may be best to check and see if your cable or whatever you may connect to it may be responsible. But what should you do if you believe the cable you currently hold is malicious? Here’s some steps I came up with:
  1. Throw it away, or if possible, turn it in to police department. Throwing it away may sometimes or most times be the better, time saving option because oftentimes, a malicious cable has a self-destruct feature. Don’t worry, I do not mean it’ll blow up and cause physical harm to you. What this means is that the hacker can put in a command that’ll tell the cable’s computer components to delete everything it may have stored onto itself and fry the electronics, turning it into a normal charging cable and leaving no traces in the code as to who was hacking you. The hacker no longer has access to your device or can control the cable afterwards, but you should still throw what’s left in the cable away even if they could or did self-destruct it. So, when throwing it away, and I recommend wearing rubbenon-conductive gloves if you feel the need to do this, cut the wire in half or in pieces with a pair of scissors, flush cutter, or a knife and dismantle the connectors on both ends, the USB connector and the lightning/USB-C connector; this can be done by either crushing the shell and pulling the components apart with some strong pliers, or, and a bit of a dangerous method, smash it with a hammer. I don’t recommend the latter though, as the internal pieces could go scattering and end up somewhere you can’t find or get to them. If you can and it’s recommended anyway, dispose of the now dismantled cable in an e-waste bin. The reason we want to tear it up like this is so nobody else falls victim to the cable.
  2. Replace your wire with an official wire from retail, such as Best Buy, Walmart, or even an Apple Store, or a phone service store like T-Mobile, Verizon, etc. Don’t buy a cable off of eBay, since most of the times, those are just random sellers who are not affiliated with a business and there’s a chance they might have tampered with it in some way and secretly turned it into a malicious cable (unless of course for whatever reason, you have a really old iPhone model that requires the old bulky connector). If you intend to buy a third-party cable online, especially from Amazon, do research first, see what people say about the particular cable you are about to buy whether it’s YouTube reviews or reviews on Amazon. I don’t know anything about Android cables unfortunately since I’ve never owned an Android phone, but for iPhones, definitely look for a cable that’s MFI Certified. MFI Certified means that the cable/product was checked and verified by Apple themselves and they confirmed it safe to use.
  3. Factory Reset or download an AV app for your device if the hacks and possible malware continue to persist, even with the cable gone. If you have an Android phone, it’s definitely possible to download an AV off of the Google Store. Definitely find one with good detection rates and a firewall. I usually recommend the following for computer users and they could be just as good on Android if they are available: Bitdefender, Kaspersky, ESET, Malwarebytes, and Sophos. For iPhone users, I hate to say it, but you’re most likely going to have to backup and factory reset your iPhone. Because of the nature of the iPhone and Apple’s strict policy and sandboxing doesn’t allow true antivirus software onto iPhone. You’ll see many AV companies make apps for iPhone, but these are mostly jailbreak checkers and VPNs. Factory resetting is usually the way most iPhone users go to remove malware, hacks, payloads, and even reverse jailbreaks on an iPhone. Even then, Apple usually does great job at patching security exploits, so if you don’t want to do the factory reset, try checking for updates for iOS or simply turning off and on your iPhone again to see if that removes any problems first.
  4. Lastly, and very simple. Keep your device’s OS and apps up to date. Especially if there’s a major update, download and install it. Consider a VPN for extra security if you feel the need.
If the steps above don’t work, it’s probably best to go see a cybersecurity or computer expert. At the very least, you should definitely change any the passwords and set up 2-Factor Authenticators for any and all accounts that were logged in onto your device through a non-compromised one.
That’s all I have to say for this post. I simply wanted to bring attention to malicious USB charging cables and give out some tips on whenever and if ever you came across one and you may have infected your smartphone device with one of these. I’m sure Hak5 and O.MG mean well, since their products are mainly done to pentest security systems and seek out vulnerabilities to help companies and people patch up their systems. The O.MG Cables have been around for some time, about four years now, they even come in different models that aren’t smartphone replicas, such as a USB to USB-C adapter, though the smartphone replicas are much more prevelent. While it is a bit rare to see a hardware based attack these days with tight security amongst corporations, and people being more weary of their surroundings, I still felt it necessary to make this post, and I hope it does potentially help someone in the future.
submitted by ErikCoolness to cybersecurity [link] [comments]


2024.06.07 09:05 Sea_Rise7828 Trafficking or stalker?

For some context I’m a 21yo girl w a gothic style and I drive a hot pink car. I also frequent this one shopping center with a Walmart and Burlington. - about two weeks ago I had finished my Walmart shopping and was walking back to my car I got in and a man approached my passenger window asking me to roll it down I said no but he asked again so I cracked it since I’m afraid if I make a man angry they will retaliate. He said “I don’t usually do this but I really like your style and your car I was wondering if I could get your name and number” I got a weird gut feeling but men do approach me a lot for either my looks or car. To play it safe I said I’m too young I’m still in high school no you can’t have my info have a nice day and closed the window. Today I went to the Burlington and after parking in the lot a man walked to my car and asked me to roll down my passenger window I said no he asked again and I cracked it. He then repeated the same line above when I realized this is the same man from 2 weeks ago. I told him he already asked me he said he knows and how old am I I said I’m still in high school and too young he then asked why I did my car pink and what I do for work I said I don’t work I’m in highschool and the car was a gift from my parents. He then said he was curious because when I was in Walmart he saw me pay in all ones (I’m an exotic dancer and I did pay in ones that day ~$20) that was weird to me because he didn’t approach me until I was in my car after shopping. The whole situation raised red flags and I’m not sure if this is a trafficking ring or if this sounds more like I am being targeted directly in more of a stalker situation. Either way I will not be returning to this shopping center again which is sad because it’s my favorite :( I’m also considering getting rid of my car for generic colored one because I live in the same area as the center.
submitted by Sea_Rise7828 to TwoXChromosomes [link] [comments]


2024.06.07 00:06 Bagelman263 Do nutrition labels include condiment packets that come with the food?

For example, there’s a generic Walmart brand sandwich that comes packaged with a packet of Heinz mustard and mayonnaise, and the nutrition label says it’s 440 calories. Does that include the mayonnaise and mustard, or is that separate?
submitted by Bagelman263 to NoStupidQuestions [link] [comments]


2024.06.06 17:46 FloggingMcMurry Is Walmart no longer carrying McFarlane/DC Multiverse?

I have noticed over the past few weeks or month(s) all but 1 of the Walmart near me have completely cleared out their DC Multiverse and pegs no longer show them. The only DC items in the shelf are those more generic kids ones and over sized limited articulation ones like Flash or Aquaman.
The one store that still has them currently have multiple of the vampire Nightwing.
I have checked the electronics area but they aren't there, just NECA and the other oddities and many FUNKO Pop
Is anyone else noticing fewer and fewer or none at all in their store?
submitted by FloggingMcMurry to McFarlaneFigures [link] [comments]


2024.06.06 08:45 SnowLemmings Chi-fi earbuds?

We've all heard of chi-fi headphones and IEMs, but has anyone owned those so-called chi-fi earbuds, as in super cheap earbuds that were brand-less/generic, off-brand (such as fake Airpods), or from obscure brands (Aiwa, Enacfire, DT Audio, Scosche, MPOW, Foxxray etc.)? Most likely bought either from a general store such as the 7-11 attached to a gas station and Walmart or a budget-oriented online marketplaces in the likes of Alibaba and Temu. If so, what was the experience like? Were there any hidden gems that managed to punch above their weight? Or were they all disappointing e-waste that felt like a waste of money?
submitted by SnowLemmings to headphones [link] [comments]


2024.06.06 08:42 SnowLemmings Chi-fi earbuds?

We've all heard of chi-fi headphones and IEMs, but has anyone owned those so-called chi-fi earbuds, as in super cheap earbuds that were brand-less/generic, off-brand (such as fake Airpods), or from obscure brands (Aiwa, Enacfire, DT Audio, Scosche, MPOW, Foxxray etc.)? Most likely bought either from a general store such as the 7-11 attached to a gas station and Walmart or a budget-oriented online marketplaces in the likes of Alibaba and Temu. If so, what was the experience like? Were there any hidden gems that managed to punch above their weight? Or were they all disappointing e-waste that felt like a waste of money?
submitted by SnowLemmings to Earbuds [link] [comments]


2024.06.05 11:11 j910 Finding Generic Vyvanse

So recently I've had more luck finding Pharmacies to fill my Generic Vyvanse script and I wanted to share how I've been able to accomplish this.
Firstly I'm in NC and it has been very difficult to find 30mg generic all year. What I started doing was making a list of what brands of generic certain pharmacies stocked and cross-referenced that with the FDA shortage list for said generics.
This has dramatically cut down on how many pharmacies I have to call to fill my script every month.
Down below I'll post who I've found stocks what in my area and I'll also post a link to the FDA website. I'm on mobile so sorry if this format sucks but it is what it is. 
•Alvogen: Walmart
• Amneal: CVS
•Lannett: NA
•Mylan: Walgreens
•Sun: Publix
https://www.accessdata.fda.gov/scripts/drugshortages/dsp_ActiveIngredientDetails.cfm?AI=Lisdexamfetamine%20Dimesylate%20Capsule&st=c
Those are all the ones I've been able to figure out as of now. I'll say Walgreens and Mylan have been my go to so far for easiest to find and by that I mean I only have to call 10 locations on average to find one to fill it. I got the alvogen ones once from Walmart and it felt like I was taking sugar pills so I've stayed away from them but it's different for everyone so take that with a grain of salt.
Lastly I'll say this month it seems like the Mylan is working better. Not sure if they tweaked their formula but it definitely seems better. If anyone has figured out where to find other generics please share in the comments and I'll try to update the list.
submitted by j910 to ADHD [link] [comments]


2024.06.05 04:30 SnapesFemboyHusband How do you make good bracelet designs?

How do you make good bracelet designs?
Im just starting to get into making bracelets with some generic shit i got at walmart, i think the Kate one ended up good but the other ones just look weird- (theyre based on characters) any tips on how to make them look better???
submitted by SnapesFemboyHusband to braceletcraft [link] [comments]


http://swiebodzin.info