What's important is that you don't have cameras inside your house. Any hacker can use them to see what's worth stealing.
I live on the corner. People sit in their cars on the side of my house and steal my wi fi. There's cheap apps you can load on your phone that will find your password. It works faster than you can type in the password yourself.
I live on the corner. People sit in their cars on the side of my house and steal my wi fi. There's cheap apps you can load on your phone that will find your password. It works faster than you can type in the password yourself.
@PRR:
The fake Flipkart site even had the same logo, it was only when you tried to go deeper that you realized it was a fake site. Even had a track your order feature. I even got the cancel order password from that.
So it was clearly an effort by a large group of people, not a small programmer.
Some years back we had 'update your bank details, or else' messages, the suffix on the site linked was .de, not the expected .com or .in.....Another phishing scam.
And now the scammers got a little bit smarty pants, saying if they wanted ransom payment in crypto-currency.
Said I had been watching porn, if not paid they would tell all my contacts.
Thankfully GMail put it in spam.
The fake Flipkart site even had the same logo, it was only when you tried to go deeper that you realized it was a fake site. Even had a track your order feature. I even got the cancel order password from that.
So it was clearly an effort by a large group of people, not a small programmer.
Some years back we had 'update your bank details, or else' messages, the suffix on the site linked was .de, not the expected .com or .in.....Another phishing scam.
And now the scammers got a little bit smarty pants, saying if they wanted ransom payment in crypto-currency.
Said I had been watching porn, if not paid they would tell all my contacts.
Thankfully GMail put it in spam.
I live on the corner. People sit in their cars on the side of my house and steal my wi fi. There's cheap apps you can load on your phone that will find your password. It works faster than you can type in the password yourself.
You probably have WPS (Wi-Fi Protected Setup) enabled on your wifi router, its only an 8 digit number. You need to disable this function asap, its a major security vulnerability. Since strangers have had access to your wifi router you also need to change the WPA/WPA2 password. These changes will prevent them from stealing your internet access in the future.
Last edited:
@PRR:
The fake Flipkart site even had the same logo, it was only when you tried to go deeper that you realized it was a fake site. Even had a track your order feature. I even got the cancel order password from that.
So it was clearly an effort by a large group of people, not a small programmer.
Some years back we had 'update your bank details, or else' messages, the suffix on the site linked was .de, not the expected .com or .in.....Another phishing scam.
And now the scammers got a little bit smarty pants, saying if they wanted ransom payment in crypto-currency.
Said I had been watching porn, if not paid they would tell all my contacts.
Thankfully GMail put it in spam.
I got a spam threat saying that they were going to send all my contacts a video from my camera while I was watching porn if I didn't send them my bank account details. My computer never had a camera.
I've been getting notices from "paypal" warning me to update my info because someone has been using my account. I haven't had a paypal account in 15 years, and my one and only experience with paypal was as bad as any scammer experience; I lost thousands, never received my order, and was flagged as "no pay" even though I paid immediately on ordering. Who's the real scammer?
You probably have WPS (Wi-Fi Protected Setup) enabled on your wifi router, its only an 8 digit number. You need to disable this function asap, its a major security vulnerability. Since strangers have had access to your wifi router you also need to change the WPA/WPA2 password. These changes will prevent them from stealing your internet access in the future.
I actually care little that people steal my wi fi, as long as they're not using it for illegal activities.
Changing password won't help. They use an app that finds any password in a matter of seconds.
I have a friend (in Jamaica) that never gets internet or cell phone service. She lives in a busy section of Kingston and just steals wi fi with her app.
I wonder what kinds of security risks that APP actually poses. To you, and perhaps even more to the USER. “Free apps” are never free - they always open back doors for whoever made them (or paid to have them made) so they can data mine. That’s how they get paid.
Hornresp may be about the only exception. It doesn‘t care if JavaScript is enabled, or even installed. At least the version I’m still running.
Hornresp may be about the only exception. It doesn‘t care if JavaScript is enabled, or even installed. At least the version I’m still running.
You are correct in your observation that some free apps may pose security risks to both the user and the developer. Here are some potential security risks that free apps may pose:
Helenix specializes in distribution of cryptographic hardware and development of top-tier cybersecurity solutions based on Hardware Security Modules (HSMs) as a root of trust.
- Data Collection: Many free apps collect user data and sell it to third-party advertisers. This data may include sensitive information such as personal identification, location data, browsing habits, and more.
- Malware: Free apps can be a breeding ground for malware. Malware can take various forms, including viruses, trojans, spyware, and adware, among others. Malware can potentially damage your device, steal your data, and compromise your security.
- Phishing: Some free apps may trick users into revealing their personal information, such as usernames, passwords, and credit card details. These apps may look legitimate but are designed to steal user information.
- Insecure Connections: Some free apps may use insecure connections, which means that the user's data is transmitted in plaintext, making it easy for hackers to intercept and steal the information.
- Exploits: Free apps may contain vulnerabilities that can be exploited by hackers to gain access to your device or data. These exploits can be used to install malware, steal data, or take control of your device.
Helenix specializes in distribution of cryptographic hardware and development of top-tier cybersecurity solutions based on Hardware Security Modules (HSMs) as a root of trust.
I’m pretty sure Hornresp isn’t explicitly sending credit card information to China or Russia, and it doesn’t even need Java an the system to run. A lot of other free stuff requires it - but even if the app itself is innocuous, it enables all the garbage from the rest of the underworld to get through. As much as I’d like to play, I don’t dare go download Forge of Empires. Somebody’s gotta pay for all that airtime, and the last thing I need to do is go cancelling my dedicated E-commerce credit card at a bad time. Like in the middle of a Parts Express Black Friday sale (it has happened, cost me a year wait on ordering $1500 worth of PA drivers, and PISSED ME OFF).
Regarding Hornresp, I cannot comment on its security as it is outside my area of expertise. However, it is always a good practice to exercise caution and ensure that any software you install on your device is from a reputable source and has a good track record for security.
If the Hornresp Setup.exe file is downloaded shortly after a new update is released, antivirus software may sometimes flag a false positive. This is because the security software sees that only a few copies of the latest file have been downloaded, and for that reason assumes that the file may be suspect, or that the download site itself is suspect.
Rest assured though, Hornresp is perfectly safe (unless of course there is some way that the master copy on the file server can be remotely hacked, which seems highly unlikely).
In addition to what David wrote:
Windows own scanners often "overshoot" on files they don´t know. Also the heurisitic mechanisms are quite strict, leading to false psoitives...
Hacking the server: Quite unlickely - there is no CMS, no hackable database... Its striped down to the bare minimum needed and all security updates are always implemented as soon as they are published.
Downloading hornresp probably is as safe as it gets 🙂 But of course its always good to be skeptical and double check.
If one is unsure, uploading the hornresp setup.exe to virustotal is an easy and fast to cross-check.
Windows own scanners often "overshoot" on files they don´t know. Also the heurisitic mechanisms are quite strict, leading to false psoitives...
Hacking the server: Quite unlickely - there is no CMS, no hackable database... Its striped down to the bare minimum needed and all security updates are always implemented as soon as they are published.
Downloading hornresp probably is as safe as it gets 🙂 But of course its always good to be skeptical and double check.
If one is unsure, uploading the hornresp setup.exe to virustotal is an easy and fast to cross-check.
(By way of further explanation - Sabbelbacke controls the server that hosts Hornresp).
- Home
- Member Areas
- The Lounge
- Ransomware