Clinton Chideracryptoscripts.hashnode.dev·Nov 29, 2024Why Do Some Web3 Airdrops Feel Like Dating Apps?You give all your details, wait forever, and in the end, you get ghosted! If you’ve ever participated in a Web3 airdrop, you’ve probably felt a rollercoaster of emotions hope, excitement, anticipation, and, sometimes, sheer disappointment. Strangely,...DiscussBlockchain
Cyber Hack Whip Bloghackwhip.hashnode.dev·Nov 26, 2024How I Escaped a WhatsApp Scam: A Close Call with PhishingA few weeks ago, I received a call from an unfamiliar number. The caller introduced himself as a pastor and claimed to be a member of a Christian group on WhatsApp to which I belonged. His tone was warm and friendly, and he opened with the usual past...Discuss·10 likes·61 reads#cybersecurity
mohammad jorjandiscamminder.hashnode.dev·Sep 29, 2024ScamMinder: A Shield Against Online FraudIntroduction In an era where scams are growing more sophisticated and harder to detect, ScamMinder emerges as a critical tool for protecting vulnerable groups, such as the elderly and those less familiar with the digital world. With billions of dolla...DiscussScam
Vardan Hakobyanvardan.hashnode.dev·Sep 26, 2024Job Scams: How Developers Are Tricked into Running Data-Stealing Code, and How to Spot ItPhoto by Ariel on Unsplash I recently shared a story about a scam job posting on Codementor where the goal was to trick developers into running malicious code on their machines. Fortunately, I discovered the issue before executing the code, and the a...DiscussFreelancing
Vardan Hakobyanvardan.hashnode.dev·Sep 19, 2024Beware of Malicious Code: A Developer’s Experience with a Suspicious RequestPhoto by FlyD on Unsplash I’ve been doing mentoring and freelancing on Codementor for a while now. Recently, I applied for a project titled “Front-end Design Developer (React.js, Three.js)”. The client asked me to install their code locally and “fix ...Discusshacking
FIKARA BILALblog.fikara.io·Aug 27, 2024La Sécurité des Mots de Passe : Bonnes Pratiques et GestionProtéger ses informations en ligne est crucial pour éviter des conséquences désastreuses. Personne n'est à l'abri d'un vol d'identité, d'une perte ou fuite de données personnelles ou financières, ou encore d'accès non autorisé. Un moyen de diminuer l...Discuss·46 readsSecurity
Godspower Aseithedigitalinfohub.hashnode.dev·Jul 24, 2024What To Do If A Scammer Has Your Email AddressPhoto by Kenny Eliason on Unsplash Ever wondered what to do if a scammer has your email address? It’s a common concern in our digital age, but don’t panic — there are steps you can take to protect yourself. Let’s dive into some practical actions that...DiscussScamAwareness
Nguyễn Văn TrungforFIS Securityblog.fiscybersec.com·Jul 24, 2024Sự cố CrowdStrike bị lợi dụng: Cảnh báo về phishing và phát tán mã độc1. Thông tin chi tiết. Vào thứ Sáu vừa qua ngày 19 tháng 7, công ty bảo mật CrowdStrike đã phát hành một bản cập nhật cấu hình sensor định kỳ, nhưng không may đã gây ra lỗi logic và dẫn đến lỗi màn hình xanh chết chóc (BSOD) trên các hệ thống Windows...Discuss·67 readsNewsletterscrowdstrke
Anjalipeachycloudsecurity.hashnode.dev·Mar 13, 2024Analyzing Latest WhatsApp Scam Leaking AWS S3 BucketThis is a quick blog about an amazon scam going on WhatsApp. In search of data, I found the S3 bucket which is publicly available. Since these scammers use victims’ data for personal use, I will be using their data for personal research. Let’s begin ...DiscussAWS s3
Sytapsytapuwero.hashnode.dev·Jan 16, 2024Why have Freewallet released so many different builds of their apps?The official Freewallet blog constantly mentions various applications: “Operations with ALGO coins are now available in the multi-wallet wallet,” “We have released a new IGNIS Wallet,” etc. Do you know why scammers constantly release new builds? Th...DiscussScam