What I tell people OVER & OVER & OVER again! It should firefox and google chrome! LOL
"stealing data from misconfigured browsers is like taking candy from a baby"
Engineered Arts, a robot maker based in the U.K., is showing off its latest creation at this year's CES 2022. Called Ameca, the robot is able to display what appears to be the most human-like facial expressions ...
LOL Yes it's true people still use iphones! LOL And the government thinking they love iphones because they are so easy to spy on. But being dumb enough to think they wouldn't get hacked on a IPHONE! LOL
Wireless, Bluetooth - ANYTHING WIRELESS WILL GET YOU HACKED. You know that nice little bluetooth mouse? Yeah a great way to give hackers access to all your stuff.
A set of new security vulnerabilities has been disclosed in commercial Bluetooth stacks... moreWireless, Bluetooth - ANYTHING WIRELESS WILL GET YOU HACKED. You know that nice little bluetooth mouse? Yeah a great way to give hackers access to all your stuff.
A set of new security vulnerabilities has been disclosed in commercial Bluetooth stacks that could enable an adversary to execute arbitrary code and, worse, crash the devices via denial-of-service (DoS) attacks.
Collectively dubbed "BrakTooth" (referring to the Norwegian word "Brak" which translates to "crash", the 16 security weaknesses span across 13 Bluetooth chipsets from 11 vendors such as Intel, Qualcomm, Zhuhai Jieli Technology, and Texas Instruments, covering an estimated 1,400 or more commercial products, including laptops, smartphones, programmable logic controllers, and IoT devices. less
beast-usa (Admin)You how many wireless things I use? ZERO you know many viruses or pieces of spyware I have EVER had? Yep ZERO
If it's an attachment DELETE IT.
If it's wireless DISABLE IT.
Stay off Google, Facebook, Apple and you will live a virus and spyware free... moreYou how many wireless things I use? ZERO you know many viruses or pieces of spyware I have EVER had? Yep ZERO
If it's an attachment DELETE IT.
If it's wireless DISABLE IT.
Stay off Google, Facebook, Apple and you will live a virus and spyware free life just like me.
beast-usa (Admin)They are trying to figure out how to scare more people into obeying. Next it will be you can get COVID Delta Force 2700 by not using Twitter. LOL I can't believe they DUPE so many people into their BS and get them that take a DNA (MS 10 years ago "THEY... moreThey are trying to figure out how to scare more people into obeying. Next it will be you can get COVID Delta Force 2700 by not using Twitter. LOL I can't believe they DUPE so many people into their BS and get them that take a DNA (MS 10 years ago "THEY NEVER WORK) vaccine. I feel like I'm one of the last people on earth that EVER CHECKS ANY FACTS BEFORE jumping off the cliff. I guess I can hold everyone's wallet and when they jump I get rich.
spinny VIP
mmmhhh in the middle ages -those who survived the plaque got very rich !!! but i guess this time the survivors would even die of hunger if money would be all they would have to eat lolololol
IT'S NOT THE PRINTERS - IT'S WINDOWS 10!
If you are using any model "Kyocera" printer and that crap in the hat Windows 10 you will get blue screens.
You can try updating the drivers that will fix it once in a very great while. Here is just one... moreIT'S NOT THE PRINTERS - IT'S WINDOWS 10!
If you are using any model "Kyocera" printer and that crap in the hat Windows 10 you will get blue screens.
You can try updating the drivers that will fix it once in a very great while. Here is just one post online out of thousands.
Hey MICROSUX when it's thousands of people and ONLY happening ON WINBLOWS 10 - IT'S NOT THE PRINTER, IT'S YOUR GARBAGE OS!!! less
On 3 win 10 pcs now, fully updated, I got 3 BsODs from printing certain .doc and .pdf docs to certain kyocera/copystar copy machines. Win 7 prints them fine to the copiers and Win 10 prints them fine
beast-usa (Admin)The fix:
MicroSUX admits one of their FORCED updates broke the printers. BUT IT MUST BE DOWNLOADED AND INSTALLED MANUALLY.
You need update "KB4567523"
You can get it here:
... moreThe fix:
MicroSUX admits one of their FORCED updates broke the printers. BUT IT MUST BE DOWNLOADED AND INSTALLED MANUALLY.
beast-usa (Admin)
It is MICROSUX!
So the update ONLY works if you down-grade to the newest version of Windows 10 20H4 (It says 1903 but will not install on anything below 20h4). Just MS trying to force you into more spyware. PEOPLE PLEASE JUST UPGRADE TO LINUX DUMP MICROSOFT!
March 25, 2021
beast-usa (Admin)
LOL If the update does not fix the printer. It DOESN'T fix it on most systems on 20+ that I have tried it ONLY worked ONCE!
Microsoft's fix #2 LOL "Method 2: Reinstall your Windows operating system, but do not apply this update." Yep RE-INSTALL WINDOWS!!!
Still using Internet Explorer? First WHY???
Having MEMORY problems on your computer, server, tablet? STOP USING INTERNET EXPLORER!!!
On March 9, 2021, Microsoft patched a zero-day security vulnerability related to memory corruption in its browser,... moreStill using Internet Explorer? First WHY???
Having MEMORY problems on your computer, server, tablet? STOP USING INTERNET EXPLORER!!!
On March 9, 2021, Microsoft patched a zero-day security vulnerability related to memory corruption in its browser, Internet Explorer.
Labeled CVE-2021-26411, this vulnerability allowed an attacker to deceive a user into visiting a uniquely crafted, malicious website hosted on Internet Explorer. Additionally, an attacker could compromise existing websites by posting malicious advertisements on webpages allowing user-hosted content. While the attacker would first have to use email or instant message to convince the user to engage with these advertisements and websites in order to compromise the victim, malicious actors from across potentially the entire Internet could take advantage of this exploit. less
Researchers at UCL have solved a major piece of the puzzle that makes up the ancient Greek astronomical calculator known as the Antikythera Mechanism, a hand-powered mechanical device that was used to predict astronomical events.
Researchers at UCL have solved a major piece of the puzzle that makes up the ancient Greek astronomical calculator known as the Antikythera Mechanism, a hand-powered mechanical device that was used to predict astronomical events.
Known to many as the world's first analogue computer, the Antikythera Mechanism is the most complex piece of engineering to have survived from the ancient world. The 2,000-year-old device was used to predict the positions of the Sun, Moon and the planets as well as lunar and solar eclipses. less
Researchers at UCL have solved a major piece of the puzzle that makes up the ancient Greek astronomical calculator known as the Antikythera Mechanism, a hand-powered mechanical device that was used to ...
Just another reason TO NEVER SIGN INTO WINDOWS 10. CREATE A LOCAL ACCOUNT!!! (Never set winblows 10 up online - ALWAYS SETUP OFFLINE)
Microsoft has awarded an independent security researcher $50,000 as part of its bug bounty program for reporting a... moreJust another reason TO NEVER SIGN INTO WINDOWS 10. CREATE A LOCAL ACCOUNT!!! (Never set winblows 10 up online - ALWAYS SETUP OFFLINE)
Microsoft has awarded an independent security researcher $50,000 as part of its bug bounty program for reporting a flaw that could have allowed a malicious actor to hijack users' accounts without their knowledge.
Reported by Laxman Muthiyah, the vulnerability aims to brute-force the seven-digit security code that's sent to a user's email address or mobile number to corroborate his (or her) identity before resetting the password in order to recover access to the account. less
Wait it's Apple isn't Apple already MALWARE?
Oh wait Apple's not malware it's dino-ware! Pay TOP DOLLAR for the SLOWEST HARDWARE MADE! LOL
Days after the first malware targeting Apple M1 chips was discovered in the wild, researchers have disclosed yet... moreWait it's Apple isn't Apple already MALWARE?
Oh wait Apple's not malware it's dino-ware! Pay TOP DOLLAR for the SLOWEST HARDWARE MADE! LOL
Days after the first malware targeting Apple M1 chips was discovered in the wild, researchers have disclosed yet another previously undetected piece of malicious software that was found in about 30,000 Macs running Intel x86_64 and the iPhone maker's M1 processors.
However, the ultimate goal of the operation remains something of a conundrum, what with the lack of a next-stage or final payload leaving researchers unsure of its distribution timeline and whether the threat is just under active development. less
What do I ALWAYS say DO NOT USE? ANYTHING ADOBE! ".pdf" LOL
Or just UPGRADE to Linux no more worries.
Researchers have demonstrated a novel class of attacks that could allow a bad actor to potentially circumvent existing countermeasures and break the... moreWhat do I ALWAYS say DO NOT USE? ANYTHING ADOBE! ".pdf" LOL
Or just UPGRADE to Linux no more worries.
Researchers have demonstrated a novel class of attacks that could allow a bad actor to potentially circumvent existing countermeasures and break the integrity protection of digitally signed PDF documents.
Called "Shadow attacks" by academics from Ruhr-University Bochum, the technique uses the "enormous flexibility provided by the PDF specification so that shadow documents remain standard-compliant." less
NO THANKS they are not attaching anything to me, not giving me any poison DOPE, I'm a firm believer IF IT'S NOT BROKEN DON'T FIX IT!
Until I get sick someday maybe lol I will stay far away from any of this stuff. And that has been working for me over 40... moreNO THANKS they are not attaching anything to me, not giving me any poison DOPE, I'm a firm believer IF IT'S NOT BROKEN DON'T FIX IT!
Until I get sick someday maybe lol I will stay far away from any of this stuff. And that has been working for me over 40 years and not one doctor visit!
This soft, stretchy patch can monitor the wearer's blood pressure and biochemical levels at the same time. Credit: Wang lab/UC San Diego
Engineers at the University of California San Diego have developed a soft, stretchy skin patch that can be worn on the neck to continuously track blood pressure and heart rate while measuring the wearer's levels of glucose as well as lactate, alcohol or caffeine. It is the first wearable device that monitors cardiovascular signals and multiple biochemical levels in the human body at the same time. less
Engineers at the University of California San Diego have developed a soft, stretchy skin patch that can be worn on the neck to continuously track blood pressure and heart rate while measuring the wearer's ...
LOL Apple getting mad that google is selling everyone's personal info! Cuttin in on Apple's profits! But wait what about idrive? Idrive is stored on gooogle-drive!
There is no idrive Apple RENTS server space from the super secure google-drive. (You know... moreLOL Apple getting mad that google is selling everyone's personal info! Cuttin in on Apple's profits! But wait what about idrive? Idrive is stored on gooogle-drive!
There is no idrive Apple RENTS server space from the super secure google-drive. (You know where they stored all the election ballots on GOOGLE-DRIVE)
I love it when two big SPYWARE companies go to battle on who gets to sell who's PERSONAL DATA.
Apple's upcoming iOS 14.5 update will come with a new feature that will redirect all fraudulent website checks through its own proxy servers as a workaround to preserve user privacy and prevent leaking IP addresses to Google.
A built-in security-focused feature in the Safari browser, "Fraudulent Website Warning," alerts users about dangerous websites that have been reported as deceptive, malicious, or harmful. less
Autos today warn us of potential collisions, park themselves in tight spots, drive up to us from the parking lot to where we exit from a store on a rainy day, and they steer and change lanes for us as we coast along major highways. When it... more(VIDEO)
Autos today warn us of potential collisions, park themselves in tight spots, drive up to us from the parking lot to where we exit from a store on a rainy day, and they steer and change lanes for us as we coast along major highways. When it seems there's not much left for a smart car to do for us, someone usually comes along and gets a leg up on the competition.
In Hyundai's case, make that four legs.
The South Korean automaker announced Tuesday a prototype vehicle that can not only smoothly roll over rugged terrain, but can actually 'walk' over obstacles as well.
The TIGER robot is equipped with extendable, omnidirectional wheel structures that can extend into legs that enable them to bypass obstacles such as walls, logs or crevices. less
Autos today warn us of potential collisions, park themselves in tight spots, drive up to us from the parking lot to where we exit from a store on a rainy day, and they steer and change lanes for us as ...
Apple has rolled out a fix for a critical sudo vulnerability in macOS Big Sur, Catalina, and Mojave that could allow unauthenticated local users to gain root-level privileges on the system.
"A local attacker may be able to elevate their... moreApple has rolled out a fix for a critical sudo vulnerability in macOS Big Sur, Catalina, and Mojave that could allow unauthenticated local users to gain root-level privileges on the system.
"A local attacker may be able to elevate their privileges," Apple said in a security advisory. "This issue was addressed by updating to sudo version 1.9.5p2."
Sudo is a common utility built into most Unix and Linux operating systems that lets a user without security privileges access and run a program with the credentials of another user.
Tracked as CVE-2021-3156 (also called "Baron Samedit", the vulnerability first came to light last month after security auditing firm Qualys disclosed the existence of a heap-based buffer overflow, which it said had been "hiding in plain sight" for almost 10 years. less
Microsoft on Tuesday issued fixes for 56 flaws, including a critical vulnerability that's known to be actively exploited in the wild.
In all, 11 are listed as Critical, 43 are listed as Important, and two are listed as... moreLOL Got to love Windows!
Microsoft on Tuesday issued fixes for 56 flaws, including a critical vulnerability that's known to be actively exploited in the wild.
In all, 11 are listed as Critical, 43 are listed as Important, and two are listed as Moderate in severity — six of which are previously disclosed vulnerabilities.
The updates cover .NET Framework, Azure IoT, Microsoft Dynamics, Microsoft Edge for Android, Microsoft Exchange Server, Microsoft Office, Microsoft Windows Codecs Library, Skype for Business, Visual Studio, Windows Defender, and other core components such as Kernel, TCP/IP, Print Spooler, and Remote Procedure Call (RPC). less
Next time some MORON tells you "You need to use GOOGLE Chrome" to use their website, app, anything. Tell them to SHOVE IT!
ALL CHROMIUM BASED BROWSERS DO EVERYTHING GOOGLE CHROME DOES BUT GET HACKED... moreThat would be GOOGLE CHROME not Chrome.
Next time some MORON tells you "You need to use GOOGLE Chrome" to use their website, app, anything. Tell them to SHOVE IT!
ALL CHROMIUM BASED BROWSERS DO EVERYTHING GOOGLE CHROME DOES BUT GET HACKED EVERY 5 SECONDS!
The Chromium (CHROME) browser is OPEN SOURCE anyone can have one! (Is your name Joe? Make a browsers Joe's Chrome)
1. Chromium the browser all CHROME browsers are built from. Linux, Mac & Winblows (Also the fastest over all browser - fastest in LInux)
2. MS Edge - CHROME. Fastest in Winblows (Winblows ONLY)
3. Brave - CHROME. the most secure and safest browser. Linux, Mac & Winblows
4. Slimjet - CHROME. The fastest for downloading anything up to 15 time faster. Linux, Mac & Winblows
5. Firefox - CHROME. The slowest chromium based browser but still CHROME. Linux, Mac & Winblows
Non-Chrome browsers:
Original MS Edge in Winblows 10 - NO ONE SHOULD BE USING THIS.
Internet Explorer all versions - NO ONE SHOULD BE USING ANY OF THESE.
When MICROSOFT tells you to stop using their browser because it's BAD? That should really tell you STOP USING IE!!!
Old Firefox versions - NO ONE SHOULD BE USING ANY OF THESE.
Safari (LOL) - NO ONE SHOULD BE USING ANY OF THESE. less
Everyone needs to read this!
Add to the list:
1. UPGRADE TO LINUX!!! (Dump Windows 10 99.99999999% of you DO NOT NEED WINDOWS 10)
2. GET OF ALL THING WIRELESS! (At least disable your wireless at night)
3. GET OF FACECRAP!
4. STOP USING GOOGLE!
Among... moreEveryone needs to read this!
Add to the list:
1. UPGRADE TO LINUX!!! (Dump Windows 10 99.99999999% of you DO NOT NEED WINDOWS 10)
2. GET OF ALL THING WIRELESS! (At least disable your wireless at night)
3. GET OF FACECRAP!
4. STOP USING GOOGLE!
Among the major cyber threats, the malware remains a significant danger. The 2017 WannaCry outbreak that cost businesses worldwide up to $4 billion is still in recent memory, and other new strains of malware are discovered on a daily basis.
Phishing has also seen a resurgence in the last few years, with many new scams being invented to take advantage of unsuspecting companies. Just one variation, the CEO Fraud email scam, cost UK businesses alone £14.8m in 2018.
Working From Home
Staff working from home are outside the direct oversight of IT support teams and often struggle to deal with cyber threats and appropriately protect company information.
Failing to update software and operating systems, sending data over insecure networks, and increasing reliance on email and online messaging has made employees far more susceptible to threats ranging from malware to phishing. less
Access to a database reportedly containing 500 million users’ private information is being sold on a cybercrime forum. Motherboard reports that the database, which hosts data pulled from Facebook more than two years... moreLOL people still use facecrap?
Access to a database reportedly containing 500 million users’ private information is being sold on a cybercrime forum. Motherboard reports that the database, which hosts data pulled from Facebook more than two years ago, contains people’s phone numbers. It added that would-be stalkers can then use an automated bot for (messaging app) Telegram which enables hackers to look up those numbers to tie them to an identity. Access is being sold on a per-search basis, with a single lookup costing $20, although you can bulk buy up to 10,000 search credits at a time.
The report says that it tested the bot for itself and found it could identify the number of a user who opted to keep their phone number private. less
spinny VIP
Gary lolol in german vve call it also FRATZEBbuch !
January 28, 2021
spinny VIP
i hate this cookie crap all over the net novv-i do not open any page using gookies - information has to be free and not fenced behind cookie vvalls-
Scientists at Tokyo Institute of Technology (Tokyo Tech), Tohoku University, National Institute of Advanced Industrial Science and Technology, and Nippon Institute of Technology have demonstrated by experiment that a clean electrolyte/electrode interface... moreScientists at Tokyo Institute of Technology (Tokyo Tech), Tohoku University, National Institute of Advanced Industrial Science and Technology, and Nippon Institute of Technology have demonstrated by experiment that a clean electrolyte/electrode interface is key to realizing high-capacity solid-state lithium batteries. Their findings could pave the way for improved battery designs with increased capacity, stability, and safety for both mobile devices and electric vehicles.
Liquid lithium-ion batteries are everywhere, being found in the majority of everyday mobile devices. While they possess a fair share of advantages, liquid-based batteries carry notable risks as well. This has become clear to the public in recent years after reports of smartphones bursting into flames due to design errors that caused the battery's liquid electrolyte to leak and catch fire.
Other disadvantages such as fabrication cost, durability, and capacity, led scientists to look into a different technology: solid-state lithium batteries (SSLBs). SSLBs comprise solid electrodes and a solid electrolyte that exchange lithium (Li) ions during charging and discharging. Their higher energy density and safety make SSLBs very powerful sources. less
Scientists at Tokyo Institute of Technology (Tokyo Tech), Tohoku University, National Institute of Advanced Industrial Science and Technology, and Nippon Institute of Technology have demonstrated by experiment ...
If you live in the US with Harris and Google in control the "Dark Web" is the only real web you have!
The dark web began as an anonymous communication channel for the US government but is now a term used by the media and in Hollywood movies... moreIf you live in the US with Harris and Google in control the "Dark Web" is the only real web you have!
The dark web began as an anonymous communication channel for the US government but is now a term used by the media and in Hollywood movies to refer to hidden online services where people primarily buy and sell items such as illegal drugs or distribute censored content.
However, the dark web is becoming increasingly popular with internet users who simply want to safeguard their privacy online.
Computer Security expert, Professor Sanjay Jha from UNSW School of Computer Science and Engineering, says that while there is the perception that the dark web is mainly a hub for criminal activity, there are many other reasons why someone may use it.
"The name, dark web, is usually painted with a negative image, but in fact there are uses of the dark web which allows you to maintain anonymity," says Prof Jha.
"Many journalists and political activists use the dark web as a safe place for free speech." less
The dark web began as an anonymous communication channel for the US government but is now a term used by the media and in Hollywood movies to refer to hidden online services where people primarily buy ...
Libre Office does everything and MORE then MS office does and it's 100% FREE of hackers and CHARGE! (NO SIGN-IN every five minutes)
A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365... moreLibre Office does everything and MORE then MS office does and it's 100% FREE of hackers and CHARGE! (NO SIGN-IN every five minutes)
A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and steal credentials belonging to over a thousand corporate employees.
The cyber offensive is said to have originated in August last year, with the attacks aimed specifically at energy and construction companies, said researchers from Check Point Research today in a joint analysis in partnership with industrial cybersecurity firm Otorio.
Although phishing campaigns engineered for credential theft are among the most prevalent reasons for data breaches, what makes this operation stand out is an operational security failure that led to the attackers unintentionally exposing the credentials they had stolen to the public Internet. less
LOL Facecrap, Apple, Google, Microsoft four things that you should never use! This post made using SAFE LINUX.
In January 2019, a critical flaw was reported in Apple's FaceTime group chats feature that made it possible for users to initiate a... moreLOL Facecrap, Apple, Google, Microsoft four things that you should never use! This post made using SAFE LINUX.
In January 2019, a critical flaw was reported in Apple's FaceTime group chats feature that made it possible for users to initiate a FaceTime video call and eavesdrop on targets by adding their own number as a third person in a group chat even before the person on the other end accepted the incoming call.
The vulnerability was deemed so severe that the iPhone maker removed the FaceTime group chats feature altogether before the issue was resolved in a subsequent iOS update.
Since then, a number of similar shortcomings have been discovered in multiple video chat apps such as Signal, JioChat, Mocha, Google Duo, and Facebook Messenger — all thanks to the work of Google Project Zero researcher Natalie Silvanovich. less
beast-usa (Admin)Under Harris/Biden I think google will be back in control of the US internet. Then they will do what they did under Obama, BLOCK ever IP they don't like, get ICANN to take away .com's they don't like and block other countries from seeing anything true... moreUnder Harris/Biden I think google will be back in control of the US internet. Then they will do what they did under Obama, BLOCK ever IP they don't like, get ICANN to take away .com's they don't like and block other countries from seeing anything true about them. THANK GOD FOR FORGIEN VPN'S!
BOB (Blok on Blok) is the world's first modular smartphone powered by blockchain and developed by Pundi X, which is one of the largest decentralized cryptocurrency sales networks. The phone was showcased during the Consumer Electronics Show (CES) 2019... moreBOB (Blok on Blok) is the world's first modular smartphone powered by blockchain and developed by Pundi X, which is one of the largest decentralized cryptocurrency sales networks. The phone was showcased during the Consumer Electronics Show (CES) 2019 and is also the CES 2020 Innovation Award Honoree.
The company has an XWallet cryptocurrency service as well as an XPOS (point-of-sale) device for buying, selling, and accepting digital currencies. However, the BOB, previously called the XPhone, offers an entirely decentralized ecosystem for users to have absolute control over their data.
BOB runs on Function X OS, which is an open-source operating system. As it uses the blockchain ecosystem, every task on the phone, be it sending texts, making calls, browsing the web, and file sharing, all happen on a decentralized network, making it highly encrypted and thus secure. Each unit of the BOB is a node that supports the entire Function X blockchain system. less
spinny VIP
SUPER !! i guess it costs more than my car lololol i ivvant one on vvheels of this -but i guess i vvould need years to figure out hovv to use it lolololol
Cyberattacks targeting healthcare organizations have spiked by 45% since November 2020 as COVID-19 cases continue to increase globally.
According to a new report published by Check Point Research today and shared with The Hacker News, this increase has... moreCyberattacks targeting healthcare organizations have spiked by 45% since November 2020 as COVID-19 cases continue to increase globally.
According to a new report published by Check Point Research today and shared with The Hacker News, this increase has made the sector the most targeted industry by cybercriminals when compared to an overall 22% increase in cyberattacks across all industry sectors worldwide seen during the same time period.
The average number of weekly attacks in the healthcare sector reached 626 per organization in November as opposed to 430 the previous month, with attack vectors ranging from ransomware, botnets, remote code execution, and distributed denial-of-service (DDoS) attacks. less
Description:Computer Help and News.
If you don't see what you're looking for just ask! Please check The Geek's Corner - Forum for Help, Downloads, Updates... https://happyasis.com/forums/category/36