Jump to content

David H. Lipman

Experts
  • Content Count

    16,009
  • Joined

  • Days Won

    1

Everything posted by David H. Lipman

  1. Yes, It is a nice Software Skin. People asked for icing on their cake and Malwarebytes came through.
  2. https://en.wikipedia.org/wiki/GIF#Animated_GIF
  3. Its isn't about a VPN Exit node to a be in a specific location, it is about not emanating from your ISP GeoIP. Additionally it is for creating an encrypted pipe for when one hops onto a Public Network such as provided by a Restaurant or Hotel WiFi so you are not snooped-on by other patrons.
  4. VPN is a pipe much like the Point to Point Protocol over Ethernet (PPPoE) and introduces overhead. With PPPoE the overhead is 8 bytes while the VPN is 80 bytes reducing the MTU to 1420. This article from SonicWall gives some information and a comparison. https://www.sonicwall.com/support/knowledge-base/set-mtu-in-vpn-environment-in-case-of-throughput-issues/170705131319789/
  5. Just saw both of these very funny movies. What do they have in common ?
  6. GoDaddy Confirms Data Breach - 28,000 Customers Affected "GoDaddy, one of the world’s largest domain registrar and a web hosting company that provides services to roughly 19 million customers around the world, has confirmed a data breach. According to a BleepingComputer report, GoDaddy notified notified some of its customers that an unauthorized party used their web hosting account credentials to connect to their hosting account via SSH. GoDaddy claims the breach took place on October 19, 2019 and was discovered on April 23, 2020, after the company's security team discovered an altered SSH file in GoDaddy's hosting environment and suspicious activity on a subset of GoDaddy's servers. GoDaddy's Vice President for Corporate Communications later told BleepingComputer in an official statement that roughly 28,000 customers' hosting accounts were affected in the incident: "On April 23, 2020, we identified SSH usernames and passwords had been compromised through an altered SSH file in our hosting environment. This affected approximately 28,000 customers. We immediately reset these usernames and passwords, removed the offending SSH file from our platform, and have no indication the threat actor used our customers’ credentials or modified any customer hosting accounts. To be clear, the threat actor did not have access to customers’ main GoDaddy accounts."
  7. Nintendo Breach Affects 160,000 User Accounts "Nintendo has begun restricting log-ins and resetting affected passwords after admitting that as many as 160,000 accounts may have been illegally accessed by hackers. The Japanese gaming giant said it was disabling access to accounts via the legacy Nintendo Network ID (NNID), which was associated with its now-defunct Nintendo 3DS handsets and Wii U consoles. That’s because, since the beginning of April, hackers have been using NNIDs “obtained illegally by some means other than our service” to access user accounts and buy digital items using stored cards. Unauthorized third parties may also have been able to view personal information including name, date of birth, gender, country/region and email address. Aside from doing away with NNID log-ins to Nintendo accounts, Nintendo is resetting passwords that may have been used illegally."
  8. Welcome my fellow Atlantic Coast Yankee.
  9. YW The US FBI recently put out a Public Service Announcement (PSA) that the Extortion Email was in a new campaign due to the COVID Pandemic. https://www.ic3.gov/media/2020/200420.aspx
  10. Please Reference: FYI : Email Blackmail Scam still current
  11. How to live stream ‘Jersey 4 Jersey’ online The show will be live-streamed on the New Jersey Devils’ website, as well as Apple TV apps. Viewers who live in the New Jersey, New York and Philadelphia markets and want to watch the broadcast online via one of the network TV channels can sign up for streaming services Fubo TV, which offers a free trial, or Hulu Live TV.
  12. https://njprf.org/
  13. How can that be Trump ? It is a picture of a Camel not a Donkey !
  14. Please create a post in; Windows Malware Removal Help & Support and request to have your PC checked-out.
  15. Over 500,000 Zoom accounts sold on hacker forums, the dark web "Over 500,000 Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free. These credentials are gathered through credential stuffing attacks where threat actors attempt to login to Zoom using accounts leaked in older data breaches. The successful logins are then compiled into lists that are sold to other hackers. Some of these Zoom accounts are offered for free on hacker forums so that hackers can use them in zoom-bombing pranks and malicious activities. Others are sold for less than a penny each. Cybersecurity intelligence firm Cyble told BleepingComputer that around April 1st, 2020, they began to see free Zoom accounts being posted on hacker forums to gain an increased reputation in the hacker community."
  16. https://nvd.nist.gov/vuln/detail/CVE-2020-7982
  17. FBI Sees Rise in Fraud Schemes Related to the Coronavirus (COVID-19) Pandemic "Scammers are leveraging the COVID-19 pandemic to steal your money, your personal information, or both. Don’t let them. Protect yourself and do your research before clicking on links purporting to provide information on the virus; donating to a charity online or through social media; contributing to a crowdfunding campaign; purchasing products online; or giving up your personal information in order to receive money or other benefits. The FBI advises you to be on the lookout for the following: Fake CDC Emails. Watch out for emails claiming to be from the Centers for Disease Control and Prevention (CDC) or other organizations claiming to offer information on the virus. Do not click links or open attachments you do not recognize. Fraudsters can use links in emails to deliver malware to your computer to steal personal information or to lock your computer and demand payment. Be wary of websites and apps claiming to track COVID-19 cases worldwide. Criminals are using malicious websites to infect and lock devices until payment is received. Phishing Emails. Look out for phishing emails asking you to verify your personal information in order to receive an economic stimulus check from the government. While talk of economic stimulus checks has been in the news cycle, government agencies are not sending unsolicited emails seeking your private information in order to send you money. Phishing emails may also claim to be related to: Charitable contributions General financial relief Airline carrier refunds Fake cures and vaccines Fake testing kits Counterfeit Treatments or Equipment. Be cautious of anyone selling products that claim to prevent, treat, diagnose, or cure COVID-19. Be alert to counterfeit products such as sanitizing products and Personal Protective Equipment (PPE), including N95 respirator masks, goggles, full face shields, protective gowns, and gloves. More information on unapproved or counterfeit PPE can be found at www.cdc.gov/niosh. You can also find information on the U.S. Food and Drug Administration website, www.fda.gov, and the Environmental Protection Agency website, www.epa.gov. Report counterfeit products at www.ic3.gov and to the National Intellectual Property Rights Coordination Center at iprcenter.gov. If you are looking for accurate and up-to-date information on COVID-19, the CDC has posted extensive guidance and information that is updated frequently. The best sources for authoritative information on COVID-19 are www.cdc.gov and www.coronavirus.gov. You may also consult your primary care physician for guidance. The FBI is reminding you to always use good cyber hygiene and security measures. By remembering the following tips, you can protect yourself and help stop criminal activity: Do not open attachments or click links within emails from senders you don't recognize. Do not provide your username, password, date of birth, social security number, financial data, or other personal information in response to an email or robocall. Always verify the web address of legitimate websites and manually type them into your browser. Check for misspellings or wrong domains within a link (for example, an address that should end in a ".gov" ends in .com" instead). If you believe you are the victim of an Internet scam or cyber crime, or if you want to report suspicious activity, please visit the FBI’s Internet Crime Complaint Center at www.ic3.gov. "
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.