• Jessica Lyons - Truck-to-truck worm could infect – and disrupt – entire US commercial fleet:

    https://www.theregister.com/2024/03/22/boffins_tucktotruck_worm

    #CommercialTransportation #ElectronicLoggingDevice #ELD #Malware #ComputerWorm #RemoteAccess #RemoteMonitoring #RemoteManagement #RMM #OverTheAirUpdate #OTA #WiFi #Bluetooth #Cybersecurity #NetworkSecurity #InfrastructureSecurity #ComputerScience
    Jessica Lyons - Truck-to-truck worm could infect – and disrupt – entire US commercial fleet: https://www.theregister.com/2024/03/22/boffins_tucktotruck_worm #CommercialTransportation #ElectronicLoggingDevice #ELD #Malware #ComputerWorm #RemoteAccess #RemoteMonitoring #RemoteManagement #RMM #OverTheAirUpdate #OTA #WiFi #Bluetooth #Cybersecurity #NetworkSecurity #InfrastructureSecurity #ComputerScience
    WWW.THEREGISTER.COM
    Truck-to-truck worm could infect entire US fleet
    The device that makes it possible is required in all American big rigs, and has poor security
    0 Comments 0 Shares 1487 Views
  • Types of cryptocurrency wallets

    Cryptocurrency wallets are essential tools for managing and storing digital assets securely. There are several types of cryptocurrency wallets, each with its own set of features, security levels, and use cases. Here are the main types of cryptocurrency wallets:

    Hardware Wallets:
    Description: Hardware wallets are physical devices that securely store the user's private keys offline. They are considered one of the most secure options.
    Pros: High security, protection against online threats, user-friendly for non-technical users.
    Cons: Cost (they are usually not free), can be misplaced or damaged.

    Software Wallets:
    Description: Software wallets are applications or programs that run on your computer or mobile device. They can be further divided into desktop wallets, mobile wallets, and online wallets.
    Pros: Convenient, easy to use, various options available.
    Cons: Security depends on the device's security; online wallets can be vulnerable to hacking.

    Desktop Wallets:
    Description: Desktop wallets are software applications installed on a computer or laptop. They offer more security compared to online wallets as the private keys are stored on the local device.
    Pros: More secure than online wallets, user has control over private keys.
    Cons: Vulnerable to malware and viruses on the computer.

    Mobile Wallets:
    Description: Mobile wallets are apps designed for smartphones and tablets. They provide accessibility and are suitable for everyday transactions.
    Pros: Convenient for on-the-go transactions, user-friendly.
    Cons: Security depends on the device's security, can be susceptible to mobile-specific threats.

    Online Wallets (Web Wallets):
    Description: Online wallets operate on the cloud and can be accessed from any device with an internet connection. They are convenient but come with security concerns.
    Pros: Accessibility from any device, easy to use.
    Cons: Security risks, as private keys are stored online.

    Paper Wallets:
    Description: Paper wallets involve printing or writing down your private and public keys on a physical document. They are completely offline, offering enhanced security.
    Pros: Cold storage, immune to online hacking.
    Cons: Vulnerable to physical damage, such as fire or water.

    Multisignature Wallets:
    Description: Multisignature (multisig) wallets require multiple private keys to authorize a transaction. This adds an extra layer of security and is often used for corporate accounts.
    Pros: Enhanced security, multiple authorizations required.
    Cons: Complexity, potential for loss if multiple keys are not securely managed.

    Custodial Wallets:
    Description: Custodial wallets are provided by third-party services where the private keys are held by the service provider. Exchanges often offer custodial wallets.
    Pros: User-friendly, easy account recovery.
    Cons: Lack of control over private keys, security depends on the service provider.

    It's crucial to choose a wallet type based on your preferences, security requirements, and the level of control you want over your private keys. Always prioritize security and consider the specific use case for which you need a wallet.
    Types of cryptocurrency wallets Cryptocurrency wallets are essential tools for managing and storing digital assets securely. There are several types of cryptocurrency wallets, each with its own set of features, security levels, and use cases. Here are the main types of cryptocurrency wallets: Hardware Wallets: Description: Hardware wallets are physical devices that securely store the user's private keys offline. They are considered one of the most secure options. Pros: High security, protection against online threats, user-friendly for non-technical users. Cons: Cost (they are usually not free), can be misplaced or damaged. Software Wallets: Description: Software wallets are applications or programs that run on your computer or mobile device. They can be further divided into desktop wallets, mobile wallets, and online wallets. Pros: Convenient, easy to use, various options available. Cons: Security depends on the device's security; online wallets can be vulnerable to hacking. Desktop Wallets: Description: Desktop wallets are software applications installed on a computer or laptop. They offer more security compared to online wallets as the private keys are stored on the local device. Pros: More secure than online wallets, user has control over private keys. Cons: Vulnerable to malware and viruses on the computer. Mobile Wallets: Description: Mobile wallets are apps designed for smartphones and tablets. They provide accessibility and are suitable for everyday transactions. Pros: Convenient for on-the-go transactions, user-friendly. Cons: Security depends on the device's security, can be susceptible to mobile-specific threats. Online Wallets (Web Wallets): Description: Online wallets operate on the cloud and can be accessed from any device with an internet connection. They are convenient but come with security concerns. Pros: Accessibility from any device, easy to use. Cons: Security risks, as private keys are stored online. Paper Wallets: Description: Paper wallets involve printing or writing down your private and public keys on a physical document. They are completely offline, offering enhanced security. Pros: Cold storage, immune to online hacking. Cons: Vulnerable to physical damage, such as fire or water. Multisignature Wallets: Description: Multisignature (multisig) wallets require multiple private keys to authorize a transaction. This adds an extra layer of security and is often used for corporate accounts. Pros: Enhanced security, multiple authorizations required. Cons: Complexity, potential for loss if multiple keys are not securely managed. Custodial Wallets: Description: Custodial wallets are provided by third-party services where the private keys are held by the service provider. Exchanges often offer custodial wallets. Pros: User-friendly, easy account recovery. Cons: Lack of control over private keys, security depends on the service provider. It's crucial to choose a wallet type based on your preferences, security requirements, and the level of control you want over your private keys. Always prioritize security and consider the specific use case for which you need a wallet.
    0 Comments 0 Shares 4125 Views
  • How not to get caught by scammers? ????
    â €
    On the first part of the safety guide you put a lot of reactions. We heard you and prepared the second part. If you have any questions, feel free to ask them in the comments. We will answer all of them.

    1️⃣ Personal messages
    When you fill out forms to get into Whitelist, or even just following the project, you join official Telegram and Discord groups (other social networks are also possible) and then suddenly you get a personal message that "you won" or "you were selected" or shortly before the token is put on the market, you may receive a message with a token contract.

    100% it will be scammers. They monitor users who joined groups and start sending personal messages.

    Never follow links from private messages, don't reply to them and delete/block the chat immediately so as not to lose your funds.

    You can minimize the appearance of such messages through the security settings in the app:

    • In Telegram, we recommend banning them from adding you to groups.
    • Discord has a feature to prohibit private messages.

    Don't be afraid to close and delete private messages from unknown contacts, because administrators of the projects you follow will never write to you first.

    2️⃣ Email
    Sometimes you may get a message about a prize or some other information from the project to your email.

    The first thing you should do is to check the sender of the message. In 99% of cases they will say through their official media that they send out a mail to the users and they will say which e-mail it should come from.

    Also we want to warn you against downloading any files from e-mails of unknown senders, even text ones, as it can cause installation of malware.

    3️⃣ Fishing
    Phishing sites are quite common.

    These are copies of project sites, games or entire exchanges, by connecting to them or by signing a contract you can lose your funds. Don't be a "fish".

    You may be wondering, how do you know the official channel of a project?

    • First, when publishing information on the channel, we always attach links to the site/channel or other official source.
    • Second, you may also find the links you need on aggregator sites like CoinMarketCap or CoinGecko (if the project is already launched, the token contract address is also available there).

    4️⃣ OTC
    When you got in the whitelist of any project (or not), you may want to sell your purse or buy another one. To do this, we all use a kind of "markets" - OTC. But, as in any market, here too we will be expected by amateurs of profit. Guarantor can be in collusion with the seller, or the seller can write off your money from the purse purchased. There are many other situations that can arise and bring you a loss. We recommend using only verified OTC and always refer to guarantors and check if the guarantor mentioned in OTC matches with the person you are dealing with.

    If you try to combine all of the above in one sentence in this section - check the sources of information very carefully. This will help you save your money.
    #somee
    #scamalert
    #cryptocurrency
    #bitcoin
    How not to get caught by scammers? ???? â € On the first part of the safety guide you put a lot of reactions. We heard you and prepared the second part. If you have any questions, feel free to ask them in the comments. We will answer all of them. 1️⃣ Personal messages When you fill out forms to get into Whitelist, or even just following the project, you join official Telegram and Discord groups (other social networks are also possible) and then suddenly you get a personal message that "you won" or "you were selected" or shortly before the token is put on the market, you may receive a message with a token contract. 100% it will be scammers. They monitor users who joined groups and start sending personal messages. Never follow links from private messages, don't reply to them and delete/block the chat immediately so as not to lose your funds. You can minimize the appearance of such messages through the security settings in the app: • In Telegram, we recommend banning them from adding you to groups. • Discord has a feature to prohibit private messages. Don't be afraid to close and delete private messages from unknown contacts, because administrators of the projects you follow will never write to you first. 2️⃣ Email Sometimes you may get a message about a prize or some other information from the project to your email. The first thing you should do is to check the sender of the message. In 99% of cases they will say through their official media that they send out a mail to the users and they will say which e-mail it should come from. Also we want to warn you against downloading any files from e-mails of unknown senders, even text ones, as it can cause installation of malware. 3️⃣ Fishing Phishing sites are quite common. These are copies of project sites, games or entire exchanges, by connecting to them or by signing a contract you can lose your funds. Don't be a "fish". You may be wondering, how do you know the official channel of a project? • First, when publishing information on the channel, we always attach links to the site/channel or other official source. • Second, you may also find the links you need on aggregator sites like CoinMarketCap or CoinGecko (if the project is already launched, the token contract address is also available there). 4️⃣ OTC When you got in the whitelist of any project (or not), you may want to sell your purse or buy another one. To do this, we all use a kind of "markets" - OTC. But, as in any market, here too we will be expected by amateurs of profit. Guarantor can be in collusion with the seller, or the seller can write off your money from the purse purchased. There are many other situations that can arise and bring you a loss. We recommend using only verified OTC and always refer to guarantors and check if the guarantor mentioned in OTC matches with the person you are dealing with. If you try to combine all of the above in one sentence in this section - check the sources of information very carefully. This will help you save your money. #somee #scamalert #cryptocurrency #bitcoin
    Like
    1
    0 Comments 0 Shares 2847 Views
  • We have to be vigilant against these two names. MortalKombat ransomware and Laplas Clipper malware are created to steal cryptocurrencies.

    https://cointelegraph.com/news/crypto-investors-under-attack-by-two-new-malware-reveals-cisco-talos

    #someeofficial
    We have to be vigilant against these two names. MortalKombat ransomware and Laplas Clipper malware are created to steal cryptocurrencies. https://cointelegraph.com/news/crypto-investors-under-attack-by-two-new-malware-reveals-cisco-talos #someeofficial
    COINTELEGRAPH.COM
    Crypto investors under attack by new malware, reveals Cisco Talos
    Since December 2022, MortalKombat ransomware and Laplas Clipper malware have stolen crypto from unwary investors.
    Like
    5
    3 Comments 0 Shares 624 Views
  • ☠️☠️????????
    Fake Google Translate app installs cryptocurrency miner on 112,000 PCs
    Pretending to be the legitimate desktop software, this sneaky malware infected thousands of machines in 11 countries, forcing them to mine Monero (XMR) unknowingly.
    (fonte da imagem) https://www.criptofacil.com/relatorio-aponta-que-malware-de-mineracao-de-criptomoedas-tornou-se-mais-popular-que-ransomwares/
    ☠️☠️???????? Fake Google Translate app installs cryptocurrency miner on 112,000 PCs Pretending to be the legitimate desktop software, this sneaky malware infected thousands of machines in 11 countries, forcing them to mine Monero (XMR) unknowingly. (fonte da imagem) https://www.criptofacil.com/relatorio-aponta-que-malware-de-mineracao-de-criptomoedas-tornou-se-mais-popular-que-ransomwares/
    0 Comments 0 Shares 456 Views
  • Breaking FTX exchange got hacked, users are advised to uninstall FTX app from phone, according to report a trojan malware is used to tap into users information.

    BlockFi a lending platform halts withdrawal for users citing it's exposed to FTX exchange unpaid loan.

    #somee #sme #weekend

    [image source](https://twitter.com/Bitcoin/status/1590945438659923968?s=20&t=PgP4HgsGQ00ft82nb7LUYA)

    Breaking FTX exchange got hacked, users are advised to uninstall FTX app from phone, according to report a trojan malware is used to tap into users information. BlockFi a lending platform halts withdrawal for users citing it's exposed to FTX exchange unpaid loan. #somee #sme #weekend [image source](https://twitter.com/Bitcoin/status/1590945438659923968?s=20&t=PgP4HgsGQ00ft82nb7LUYA)
    Like
    5
    0 Comments 0 Shares 1115 Views