Monthly Archives: November 2019


Tech Tools For Beginners

Package Contents: 2 x Plastic Opening Tools 3 x ESD Tweezers 1 x Utility Knife 1 x Anti-Static Wrist Strap 1 x SIM Card Ejector Pin and LCD Suction Cup 4 x Triangle Plectrums  2 x Plastic Spudgers 3 x Metal Spudgers 1 x Tin Scraper 1 x Large Plastic Double Headed Opening Tool 1 x cleaning Cloth 1 x Magnetizing and Demagnetizing Tool 3 x SIM Card Shells 2 x Magnetic Protect Mats 1 x 60 in 1 Screwdriver Kit

Tech Tools For Beginners

  • Multi-Magnetic Screwdriver Set : 86 in 1 Precision Screwdriver Set have more tools, which includes utility knife, Anti-Static tweezers, Anti-Static Wrist Strap, SIM card ejector pin and LCD Suction Cup, Triangle plectrum, plastic spudgers, metal spudgers, SIM card shells, Magnetizing and demagnetizing tool, etc.
  • High Quality & Well Perform : These durable screwdriver bits are made of CRV steel, whose hardness can reach to HRC52-56,
Read the rest

Signs your Android phone may have a Virus or other Malware

Here are some signs your Android phone may have a virus or malware. Remember while the external damage is usually visible, internal damage is usually hidden from view.

Android Malware like virus is known to perform repeated tasks that can take up resources on your devices. Signs of Android malware may show up in these ways.

  1. Your phone is too slow.
  2. Apps take longer to load.
  3. The battery drains faster than expected.
  4. There is an abundance of pop-up ads.
  5. Your phone has apps you don’t remember downloading.
  6. Unexplained data usage occurs.
  7. Higher phone bills arrive.

How to remove viruses and other malware from your Android device

  1. Power off the phone and reboot in safe mode. Press the power button to access the Power Off options. Most Android phones come with the option to restart in Safe Mode. Here’s how, according to Google, although Safe Mode can vary by phone: Press
Read the rest
Windows Tutorials

How To Transfer Active Directory FSMO Roles

How to transfer the 5 FSMO (Flexible Single Master Operations) roles and GUI tools that can be used to move these roles between Active Directory Domain Controllers.

  • Schema Master – controls all updates and modifications to the Active Directory schema.
    This role can transferred using Active Directory Schema snap-in.
    If Active Directory Schema snap-in is not available you need to register required DLL using following command: regsvr32 schmmgmt.dll. On Windows Server 2008 and later this needs to be done in an elevated command prompt.
  • Domain Naming Master – controls the addition or removal of domains in the forest.
    This role can transferred using Active Directory Domains and Trusts snap-in.
     
  • Infrastructure Master – responsible for updating references from objects in its domain to objects in other domains.
    This role can transferred using Active Directory Users and Computers snap-in.
  • Relative ID (RID) Master – responsible for processing RID
Read the rest

Hackers Use Fake Windows Update Emails to Inject Cyborg Ransomware

Hackers are using a Fake Windows Update email to inject cyborg ransomware. The email campaign has been found during the latest Windows 10 November 2019 update that was release. Users are getting fake emails regarding this update Windows update and it states that you should download the update attached. This attachment is not a Windows 10 update, it actually installs “Cyborg Ransomware” in your PC.

 

How it Happens

Users will first receive an email regarding urging them to download the updates like “Critical Microsoft Windows Update!” or “Install Latest Microsoft Windows Update Now”. With this fake email will contain an attachment which has a “.jpeg” file which is not a picture; it’s an executable file.

Once you run this file it will download another executable file called bitcoingenerator.exe, which is programmed to deliver malware in your system. This file contains the Cyborg … Read the rest


Many Critical Vulnerabilities In VNC

Many critical vulnerabilities found in Virtual Network Computing (VNC). The VNC software was found to have 37 different memory corruption vulnerabilities and many of these could result in remote code execution. The researchers at Kaspersky said around 600,000 web-accessible servers use the code.

Kaspersky researchers wrote in an analysis of the bugs for ICS CERT, released Friday.

“The prevalence of such systems in general, and particularly ones that are vulnerable, is a significant issue for the industrial sector as potential damages can bring significant losses through disruption of complex production processes,” 

Kaspersky found many critical vulnerabilities in VNC client , but also on the server-side of the system which can be exploited after password authentication. Kaspersky said there are two main attack vectors:

“An attacker is on the same network with the VNC server and attacks it to gain the ability to execute code on the server with the

Read the rest

Disney+ Accounts Hacked And Ready For Sale

During the first week Disney+ Accounts have been Hacked and now ready for sale on the dark web. Users were complaining and reporting losing access to their accounts and unable to stream on twitter when the flags were raised. It was reported that the hackers were logging them out of all devices, and then changing the account’s email and password, effectively taking over the account and locking the previous owner out.

As is turns out many of these hackers gained access to accounts by using email and password combos leaked at other sites, while in other cases the Disney+ credentials might have been obtained from users infected with keylogging or info-stealing malware.

Check Here For Compromised Passwords From Other Sites

 

Disney+ Accounts Are Up for sale!

I cannot belive how quick Disney+ Accounts were compromised and hacked, they definitaly mobilized quickly to monetize on vulnerable Disney+ Accounts. These accounts were … Read the rest


Webcam Blackmail or Sextortion Emails

It’s unbelievable how frequent people fall for the Webcam Blackmail or Sextortion emails. I have received a few and it’s quite hilarious and also rude on how they go about writing these emails. I’ll show you how fake Webcam Blackmail or Sextortion emails are. But first did you know hundreds of Millions of similar emails have been sent over and over all these years, but there seems to have been a flood of them over the past few months because more people and companies are succumbing to Data Breaches.

 

Do I Have To Be Worried?

These Scammers understand that we are all human and do human acts, simple as that. However because of these Data Breaches these hackers can obtain your email address and a password that you have used recently or in the past and this can make these Webcam Blackmail or Sextortion emails  very believable for people and … Read the rest


Web.com Breach Exposed Account Information

Web.com suffered a breach and exposed account information. The recent data breach impacts user account information and customers within Network Solutions and register.com the company explained in an online notification.

What Happened?

The web.com breach occurred in August 2019, the hacker illegally accessed some data.

“On October 16, 2019, Web.com determined that a third-party gained unauthorized access to a limited number of our computer systems in late August 2019, and as a result, account information may have been accessed. No credit card data was compromised as a result of this incident.”

 

What Was Exposed?

Customer names, addresses, phone numbers, email addresses and information regarding services offered to a given account holder. “We encrypt credit card numbers and no credit card data was compromised as a result of this incident”.

 

Other Details

Web.com notification does not explicitly reference Network Solutions or Register.com, however the security expert Brian Krebs reported on Read the rest


Amazon Survey Phishing Emails Ramping Up

It’s time to be careful during the holidays, Amazon Survey Phishing Emails Ramping Up. If they are hard to belive stay away. Most of these survey phishing, emails are trying to scam you from your Personal Identifiable Information or Amazon Logins.

 

Some common tip-offs that an email is phony are typos, grammatical mistakes, awkward language, missing words, extra spaces, and other signs that the email was written unprofessionally. Such emails might also ask you to look at an attachment or click a link and then give your personal information on a Web page or in a form. Or the sender’s email address might look suspicious. If you hover over the links you can even see that it would not direct you to legit URL. Here Are A Few Email TIPS

 

Read the rest

Free Dark Web Monitoring From Firefox

Firefox is now offering free Dark Web Monitoring and you can sign up with 2 simple steps.

Step 1 – Visit monitor.firefox.com to see if your email has been part of a data breach

Visit monitor.firefox.com for the Free Dark Web Monitoring From Firefox and type in your email address. Firefox has obtained a partnership with Troy Hunt’s “Have I Been Pwned,” your email address will be scanned against a database that serves as a library of data breaches. Afterwards Firefox will let you know if your email address and/or personal info was involved in a publicly known past data breach. Once you know where your email address was compromised you should change your password and any other place where you’ve used that password.

 

Visit monitor.firefox.com and type in your email address

Step 2 – Learn about future data breaches

Sign up for Firefox Monitor using your any and multiple … Read the rest

Stay Informed

Receive instant notifications when new content is released.