bitcoin

Fri
09
Nov
Dennis Faas's picture

How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam)

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my ... phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 USD. How can they hack my phone like this? Can they hack my PC too? Should I be worried? " My response: This is yet another version of the same scam that is currently going around the Internet. Related: How to Fix: Hackers ... (view more)

Thu
08
Nov
John Lister's picture

Hackers Sell Stolen Facebook Messenger Messages

Facebook messages are being sold online for the equivalent of 10 cents per user. It comes as the company unveils an "unsend" feature for messages sent in haste. The message for sale follows a breach of Facebook last year when hackers were able to ... take advantage of a security flaw to gain access to 50 million accounts. Ironically the hack took advantage of a 'View As' feature that's meant to protect privacy by allowing users check which parts of their account and data are publicly viewable. 81,000 Users Hit By Message Leak The offer on a hacker forum claims to include details of some ... (view more)

Thu
25
Oct
Dennis Faas's picture

How to Fix: Hackers Hacked My Email, Demand Bitcoin (Scam)

Infopackets Reader Sam G. writes: " Dear Dennis, I get emails from hackers a few times a week saying that they have cracked my email account. As proof, they have supplied me with the correct password for the account. The message goes on to say that ... they have planted a Trojan on my computer which allows them to spy on me. Here's where it gets interesting. The hackers say I have been visiting websites of people in the buff. They are demanding I pay them bitcoin (worth $831) to keep this quiet, otherwise they will send images from the purported site I've visited and also a picture of me on my ... (view more)

Mon
15
Oct
Dennis Faas's picture

Being Blackmailed for Money on Facebook? Here's What to Do

Infopackets Reader Peter T. writes: " Dear Dennis, I have a friend who recently met someone on Facebook. What started out as simple flirting soon became a romantic relationship online, though they have never met in person. For sake of argument I'll ... refer to my friend as Bob and his romantic interest as Tina. In a moment of weakness, Bob sent a video of himself in a compromising way, and is now being blackmailed by Tina. She is demanding a lump sum of cash, or says she will send the compromising video to all of Bob's friends on Facebook. You are the first person I thought of who may be able to ... (view more)

Thu
06
Sep
John Lister's picture

New Firefox to Block Unwanted Tracking, Cryptojacking

Firefox is getting a series of updates to boost performance, privacy and usability. Unwanted tracking tools and browser hijackers are among the targets of security updates. Two of the biggest measures deal with websites that track user activity ... online, potentially to make site content more relevant, but more commonly to deliver targeted advertising. Version 63 of Firefox, due in September, will by default block ad trackers if they take a particularly long time to load, in turn making pages slow to appear. This setting is purely to do with the load time of the tracker rather than what it ... (view more)

Mon
20
Aug
Dennis Faas's picture

Samsung: Smartphones Most Secure for Cryptocurrencies

Samsung Provokes Debate with Claims that Smartphones Are The Most Secure for Cryptocurrencies Last month, leading Samsung author Joel Snyder penned a blog post in which he made the bold assertion that smartphones encompass the best security for ... owning, trading and managing cryptocurrency. He put this down to the Trusted Execution Environments (TEEs) in which smartphones, and particularly those developed by Samsung, operate. A trusted execution environment (TEE) is a secure area of a processor found on smartphones (not PCs), originally developed in 2010 by Open Mobile Terminal Platform ... (view more)

Wed
01
Aug
John Lister's picture

Google Bans Apps That Hijack Device Resources

Google is to ban several categories of apps from its app store. They include so-called "cryptomining" apps that can suck up a resources from a device for somebody else's financial benefits. The changes come in the latest update of the Play Store ... Developer Policy. The relevant apps will no longer be available through the official Play Store, meaning that although users can still install them, they'll get much less prominence and exposure. The ban is specifically on apps that use a device's processor for mining cryptocurrencies. In very simple terms, mining involves computers racing to solve a ... (view more)

Tue
03
Apr
John Lister's picture

Google Cracks Down On Cryptomining Scams

Google is banning Chrome browser tools that harness a computer's power to 'mine' virtual online currencies for a third party. It seems Google gave up trying to distinguish between different levels of legitimacy in such set-ups. The whole concept of ... "cryptomining" using a web browser may seem baffling to many users. In the simplest terms, the cryptomining program could automatically load when visiting a particular web page or would always remain active (if it was through a browser extension). The users' computer would then "mine" (using mathematical equations) until a ... (view more)

Thu
15
Feb
John Lister's picture

Thousands of Sites Hit By 'Cryptojacking' Scam

Visitors to more than 5,000 websites had their computers hijacked to earn money for scammers. But the attack would have earned them less than $25 - and they aren't getting paid anyway. The attack involved compromising screen reader software called ... BrowseAloud. Websites can add the software to their site to make it easier for visitors with vision problems to browse the pages. Because the software is so widely used, compromising it was an effective way to reach a large number of computers - regardless of whether the owners needed to use a screen reader. The software is particularly popular ... (view more)

Wed
23
Aug
John Lister's picture

New Malware uses PC Power to Make Cash

Hackers could use your computer to literally make money. That's thanks to an unusual malware attack that doesn't involve any files, making it harder to detect. The "Coinminer malware" takes advantage of a Windows and browser bug nicknamed Eternal ... Blue. That's the same bug that was exploited in several high-profile ransomware attacks recently . While Microsoft has issued updates, it seems some users haven't installed the security patches. Malware Runs Inside Memory One big problem with the Coinminer malware is that it works in the computer's memory, rather than as ... (view more)

Pages

Subscribe to RSS - bitcoin