Prilock’s Tip of the Month Your Phone is Worth More Than You Realize
Small, portable valuable electronic items such as gaming consoles, smart phones, tablets, and laptop computers can be attractive items to opportunistic thieves – but you can take steps to protect your property.
These items aren’t just valuable due to their cash value, but can also have information stored on them such as personal details and banking information.
Remember that if information of this nature falls into the wrong hands it can be used to commit further offences such as fraud or identity theft.
To prevent becoming a victim of theft with regard to computers, tablets and similar items, please consider the following crime prevention security tips found here.
|
Cool Software
SHAREit- Share with Devices Easily
These days, it is unlikely you are working from one device. You need to be able to sync and share files and data across multiple pieces of hardware. SHAREit allows you to do this- it lets you easily share files between Windows PCs and laptops, as well as Android phones and tablets, and iOS devices such as an iPhone or iPad.
Find Out More Here
|
Hacker's Tool of the Month
The Scary Truth About Rubber DuckyWhat could you do if you only had a few seconds or minutes at someone’s computer? Turns out a lot, if you have a Rubber Ducky USB drive and it works on Windows, Mac, Linux or Android systems. With pre-loaded scripts you can steal and crack windows system passwords, grab Wifi or network credentials, upload malware, keystroke loggers or just about anything else a skilled hacker could do if he had access to your computer, but in only seconds. It was recently used on Mr. Robot for just that purpose.
Available for under $45 a Rubber Ducky mimics an HID, Human Interface Device, such as a computer keyboard or smartphone keyboard. They’re a popular tool of pentesters and hackers because they come loaded with, or have available, firmware updates such as other languages, hacking and sniffing tools, and built-in mass storage so you can save the information you want to steal all in one quick moment.
The primary use is to run pre-defined hacking scripts at extreme speeds. It has a very simple to learn scripting language that can allow the tester, or hacker, to pre-load the entire attack on the ducky. All they need is a running computer and access to the USB drive. This is why everyone should remember to hit the windows and “L” key to lock your system when leaving your computer for even a second. The scripts can grab windows system passwords, Wifi credentials, logs, or specific files in seconds. Basically, while that contractor is bent over tying his shoe near the back of your computer, he can slip the ducky into an open USB and steal your password. |
Breaking News
Recent Breaches Outer Banks Hospital: Two flash drives containing patient information from 2004-2016 went missing. Steam: More than nine million keys used to redeem and activate games on the Steam, a popular games forum, have apparently been stolen by a hacker. Eddie Bauer: Credit and debit cards used at 350+ North American stores during the first six months of 2016 may have been compromised. Minecraft: The database includes records for 6,084,276 users that have signed up with Leet.cc.
Bon Secours: Personal information of more than 650,000 Bon Secours patients was left exposed on the internet for four days. Opera: 1.7 million Opera Synch users are affected.
Athens Orthopedic Clinic: Media reports indicated the records of more than 300,000 Athens Orthopedic Clinic patients have been compromised.
Kimpton: Kimpton Hotels confirmed that malware was found on payment terminals in over 60 of its hotels and restaurants, and that customers’ payment cards may have been compromised.
Scan: There were approximately 87,000 individuals affected. Of that number fewer than half are current SCAN members.
Last.fm: Music service Last.fm was hacked on March 22nd, 2012 for a total of 43,570,999 users.
Brazzers: Hacked in 2012 and openly accessible online now, the stolen data contains 790,724 unique email addresses along with usernames and passwords.
Idaho Fish and Game: Idaho Fish and Game today learned that personal information for license buyers who began purchasing hunting and fishing licenses and tags prior to 2008 was potentially accessed.
|
|