Skip Navigation
Jump
Android treats third-party launchers poorly, but this survey could help
  • One of the first major problems took place with Android 10, as it restricted navigation gestures to stock launchers.

    Note in 2019 in the beta release of Android 10, Google took away swipe gesture navigation and forced third party launchers to use the older 3 button navigation.

    9
  • Jump
    One car accident, endless spam calls
  • I don't know how all states operate but they have access to police reports that have your contact info. If it doesn't have your number then background reports.

    2
  • Jump
    One car accident, endless spam calls
  • These calls might be from lawyers. Check your mail and see if you are getting mail from lawyers. They are all trying to beat each other to get you to sign with them.

    27
  • Jump
    Is your phone really listening to you? Here's what we know
  • What makes this worse is Google insists Android phones' microphone indicator is accurate. Looks like they are lying about that too.

    -3
  • Jump
    Search Risk – How Google Almost Killed Proton Mail
  • Is piped or invidious working for you?

    The popular servers are down. Google put some kind of limit on them. I'm going to guess bandwidth limit.

    2
  • Jump
    SOLVED Total novice: unable to reach server
  • depends on what version of Android but it should be similar.

    Also do not delete or modify anything.

    Go to Settings -> Network & Internet -> Internet -> (You Network Name Here)

    Then click the down arrow for Advanced and under Network Details you will find IP Address.

    This Network Details information might be useful later. Remember how you got to it.

    1
  • Jump
    SOLVED Total novice: unable to reach server
  • ping is terminal or command line command.

    It works in Windows, MacOS, and Linux.

    Go open a terminal and type ping then a space, then the IP address of your Android device. If it connects it will give you a latency number. If it doesn't, it will tell you it is not reachable.

    Windows stops the command at 4 I believe. In Linux and MacOS use CTRL + C to stop the command.

    4
  • 0
    Jump
    SOLVED Total novice: unable to reach server
  • This was my first thought was the port number.

    OP, ping the IP address of your Android device from your server. If not, you have a networking issue. If you can ping it, probably a settings issue.

    Also, my Android phone was able to find my server automatically.

    2
  • Jump
    Payment gateway data breach affects 1.7 million credit card owners
  • The types of data that may have been accessed by the unauthorized part include:

    • Full name
    • Physical address
    • Credit card number
    • Payment card expiration date
    4
  • Transport for London staff faces systems disruptions after cyberattack

    >Transport for London, the city's public transportation agency, revealed today that its staff has limited access to systems and email due to measures implemented in response to a Sunday cyberattack.

    0
    thehackernews.com North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams

    North Korean hackers target developers via LinkedIn job scams, spreading malware to infiltrate Web3 and crypto firms.

    >"After an initial chat conversation, the attacker sent a ZIP file that contained COVERTCATCH malware disguised as a Python coding challenge," researchers Robert Wallace, Blas Kojusner, and Joseph Dobson said.

    >The malware functions as a launchpad to compromise the target's macOS system by downloading a second-stage payload that establishes persistence via Launch Agents and Launch Daemons.

    0

    >American car rental giant Avis disclosed a data breach after attackers breached one of its business applications last month and stole customer personal information.

    1
    www.darkreading.com Malvertising Campaign Phishes Lowe's Employees

    Retail employees are being duped into divulging their credentials by typosquatting malvertisements.

    0

    Apache fixes critical OFBiz remote code execution vulnerability

    Tracked as CVE-2024-45195 and discovered by Rapid7 security researchers, this remote code execution flaw is caused by a forced browsing weakness that exposes restricted paths to unauthenticated direct request attacks.

    0
    cyberscoop.com VMWare releases Fusion vulnerability with 8.8 rating

    The company issued a patch for the high-severity bug that allows arbitrary code execution.

    1
    thehackernews.com Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack

    Hackers are spoofing GlobalProtect VPN software using SEO poisoning to deliver WikiLoader malware in a new cyberattack.

    >The malvertising activity, observed in June 2024, is a departure from previously observed tactics wherein the malware has been propagated via traditional phishing emails, Unit 42 researchers Mark Lim and Tom Marsden said.

    Definitions:

    Malvertising - Internet advertising whose real intention is to deliver malware to the PC when the ad is clicked.

    -wordnik

    0

    FTC: Over $110 million lost to Bitcoin ATM scams in 2023

    >The U.S. Federal Trade Commission (FTC) has reported a massive increase in losses to Bitcoin ATM scams, nearly ten times the amount from 2020 and reaching over $110 million in 2023.

    >Bitcoin ATMs are typically located in convenience stores, gas stations, and other busy areas, but instead of dispensing cash like the traditional ATMs they resemble, they allow you to buy and sell cryptocurrency.

    7
    thehackernews.com New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

    Eight vulnerabilities in Microsoft macOS apps allow attackers to bypass permissions, gaining unauthorized access to sensitive data.

    1
    thehackernews.com New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

    Cicada3301 ransomware targets SMBs, shares code with BlackCat, exploits vulnerabilities in Windows, Linux, and ESXi systems.

    > Written in Rust and capable of targeting both Windows and Linux/ESXi hosts, Cicada3301 first emerged in June 2024, inviting potential affiliates to join their ransomware-as-a-service (RaaS) platform via an advertisement on the RAMP underground forum.

    2

    D-Link says it is not fixing four RCE flaws in DIR-846W routers

    >Though D-Link acknowledged the security problems and their severity, it noted that they fall under its standard end-of-life/end-of-support policies, meaning there will be no security updates to address them.

    0

    Docker-OSX image used for security research hit by Apple DMCA takedown

    >The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.

    1

    Researchers find SQL injection to bypass airport TSA security checks

    >Researchers Ian Carroll and Sam Curry discovered the vulnerability in FlyCASS, a third-party web-based service that some airlines use to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). KCM is a Transportation Security Administration (TSA) initiative that allows pilots and flight attendants to skip security screening, and CASS enables authorized pilots to use jumpseats in cockpits when traveling.

    Definitions:

    SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

    -Wikipedia

    8

    North Korean hackers exploit Chrome zero-day to deploy rootkit

    >North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM privileges using a Windows Kernel exploit.

    >Citrine Sleet targets financial institutions, focusing on cryptocurrency organizations and associated individuals, and has been previously linked to Bureau 121 of North Korea's Reconnaissance General Bureau.

    2
    www.darkreading.com Commercial Spyware Vendors Have a Copycat in Top Russian APT

    Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.

    >In the watering-hole attacks, threat actors infected two websites, cabinet.gov[.]mn and mfa.gov[.]mn, which belong to Mongolia's Cabinet and Ministry of Foreign Affairs. They then injected code to exploit known flaws in iOS and Chrome on Android, with the ultimate goal of hijacking website visitors' devices.

    Definitions:

    Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected.

    -Wikipedia

    Whereas zero-days are a class of vulnerability that is unknown to a software developer or hardware manufacturer, an N-day is a flaw that is already publicly known but may or may not have a security patch available.

    -Dark Reading

    0

    cross-posted from: https://infosec.pub/post/16863645

    > This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code. > > Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

    0

    FBI: RansomHub ransomware breached 210 victims since February

    This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

    Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

    0

    CISA Launches New Portal to Improve Cyber Reporting

    https:// www.cisa.gov /news-events/news/cisa-launches-new-portal-improve-cyber-reporting

    Today, the Cybersecurity and Infrastructure Security Agency (CISA) announces its cyber incident reporting form moved to the new CISA Services Portal as part of its ongoing effort to improve cyber incident reporting.

    CISA Services Portal

    0

    New Tickler malware used to backdoor US govt, defense orgs

    1