News: What Does Britney Spears Have to Do with Russian Hackers? More Than You Think
My message to Russian hackers is this: LEAVE BRITNEY ALONE!Russian hacking collective Turla has been targeting governments and military operations in the United States, Europe, Asia, and the Middle East for the past decade. Now, it appears that the group is targeting everyday citizens — specifically Britney Spears fans.In the comments section of Spears' Instagram page, Turla posted strings of malware-activating code that looked like innocent comments. One comment in particular — as reported by security firm ESET — read "#2hot make loved to her, uupss HHot #X."Fortunately, the malware was only effective through Firefox's full desktop web browser and if malicious extension "HTML5 Encoding 0.3.7" had previously been downloaded. The malicious comments have been removed, so Spears' Instagram should be safe again.ESET reported that little damage was inflicted by the attack.There were only 17 hits recorded on this link in February, right around the time the comment was posted. However, this is quite a low number and might indicate that it was only a test run … the next version of the extension – if there is one – is likely to be very different. There are several components that are used by the extension that will disappear in future versions of Firefox.
— ESETWe asked our resident Instagram expert — Bettina Mangiaracina — for her take on the attack. She explained to Gadget Hacks that it didn't really surprise her. In fact, she thinks we should expect more just like it.Britney's IG account gets thousands of comments per post. When you post a comment under one of Spears' posts, it's like an avalanche. Your post will be hidden under hundreds of other users. This makes Spears' and other celebrity accounts the perfect place to hide a comment full of malware-activating code. I wouldn't be surprised if we start seeing a lot more hackers using celebrity Instagram accounts to communicate between each other.
— Bettina MangiaracinaTo avoid falling victim to a sophisticated attack like this, it is advised that you avoid installing software or opening files from unknown authors. If something seems sketchy, don't hesitate to search online to see if there's any information about its credibility. These guidelines should be followed on desktops and smartphones, as millions of people are affected by mobile attacks.The question that's still on everyone's mind is: why Britney? Are the Russian hackers still upset about the tumultuous end to her relationship with Justin Timberlake? Did they attend her Vegas show and leave underwhelmed? Whatever the reason is, let's hope these hackers give Britney a break.Don't Miss: Malware Targets Mac Users Through Well-Played Phishing AttackFollow Gadget Hacks on Facebook, Twitter, Google+, and YouTube Follow Apple Hacks on Facebook, Twitter, and Pinterest Follow Android Hacks on Facebook, Twitter, and Pinterest Follow WonderHowTo on Facebook, Twitter, Pinterest, and Google+
Cover photo via Youtube
I think with all the WiFi tethering apps there is nothing you need to install on your computer. I installed "Wireless Tether" it works easily. Activate the App, go to your wireless network setting on your pc and connect to the phone.
Root app for mobile hotspot? - Motorola Droid | Android Forums
Apple Releases Second Developer Beta for iOS 12.4 Posted by Dennis D. Bednarz on May 20, 2019 in Apple News , iPhone News Apple released the first developer betas of their next operating systems a few days ago, that being iOS 12.4, watchOS 5.3, tvOS 12.4 and macOS Mojave 10.14.6.
How to download iOS 12.4 developer beta 3 to your iPhone or
Samsung Health: The ultimate guide to getting fit with Samsung's app This will show you how all Samsung Health users are doing in their step count, broken down by your age group, all users and
Samsung Health | Apps | Samsung Australia
In this video tutorial, viewers learn how to reveal hidden MySpace profile content using Mozilla Firefox. Begin by clicking on View, go to Page Style and select No Style. This will take out all the styles that are applied on the page, and reveal all of it's data.
How to Contact MySpace « Internet :: Gadget Hacks
Disclaimer: This post was sponsored and this iFLY Indoor Skydiving experience was provided at no cost to me. However all opinions expressed are my own. I was so excited to get the chance to try the skydiving experience at iFLY Indoor Skydiving! If you're thinking about it for yourself, family member, or group, read on!
19 Best Let's Party - Skydiving images | Birthday party ideas
Getting to know your SMART Board with iQ technology: Screen Share, part 1 (2018)
Garmin Connect IQ app store guide - The Best apps for your
In order to trace the current position of a ip address of any internet device such as computer , laptop . or mobile which acess internet , every device which connect to internet assign a unique ip
How to Trace Any IP Address « Internet :: Gadget Hacks
Hound can use follow-up questions and commands to filter, sort, or add more information to the original request. Give this a shot: "OK Hound… Find Asian restaurants rated 4 stars or more within walking distance of Times Square and exclude Chinese, Korean, and Thai" But Hound isn't limited to restaurants and coffee shops.
[GUIDE] Using android WITHOUT google account is possible
How to Use Pinterest & Tumblr to Find Your Next Great Job
I don't know about you, but when I shoot a slow-mo video on my iPhone, I'd also like to have a regular speed copy of it, just in case slow motion doesn't fit the video right. Traditionally, converting slow-motion video required manually speeding the video back up in editing apps such as iMovie, but it turns out that iOS has a secret way to do
How to Convert Slow Motion Video to Normal Video on iPhone/iPad
How to Store Vinyl Records. Vinyl records are a wonderful way to experience both retro and modern music. Typically preferred by audiophiles for their lossless analog sound, these records provide large, beautiful versions of albums from all
The best way to package vinyl records for shipping - a step
0 comments:
Post a Comment