Get Mystery Box with random crypto!

Tech Byte™

Logo of telegram channel techbyte — Tech Byte™ T
Logo of telegram channel techbyte — Tech Byte™
Channel address: @techbyte
Categories: Technologies
Language: English
Subscribers: 5.58K
Description from channel

Tech tricks, news, hacking tutorials and dark web guides.
Group: @GEEKkernel

Ratings & Reviews

1.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

0

2 stars

0

1 stars

2


The latest Messages 6

2021-07-12 08:59:01 Ways to Protect Your Mobile Banking Trojans from Hackers

Bank users are fast moving over to internet banking, and this has motivated hackers to hunt for login details. And they will go to any length to be able to access your money.
1. hacker can create a perfect replica of a bank’s app and upload it to shady 3rd-party sites. Once you've downloaded the fake app and enter your username and password into it, it’ll be sent to the hacker.
2.3. They may also install a malware in an unrelated app. When you install this app, the Trojan begins to scan your phone for banking apps. Whenever it detects a banking app being launched, the malware quickly puts up a window that looks identical to the app you just booted up.
3. If this is done smoothly enough, the user won't notice the swap and will enter their details into the fake login page. These details are then uploaded to the hacker. Typically, these Trojans also need an SMS verification code to complete the hack...
4. To do this, they'll often ask for SMS read privileges during installation, with it, they will steal the codes as they come in.
5.Phishing

Hackers can hack email or chat accounts of your trusted contacts and send you emails or chats from there. They send links and trick people into clicking them. The sender address would be legitimate, and the hacker could even to talk to you on a first-name basis.
6. KEYLOGGERS
Keyloggers are a type of malware that records what you're typing and sends the information back to the hacker. So, imagine what would happen if you typed in your bank's web address, followed by your username and password in the presence of keyloggers,
7. Man-In-The-Middle Attacks

A hacker can target the communications between you and your bank's website in order to get your login details. These attacks are called Man-in-the-Middle (MITM) attacks. They monitor your activities when you're using an insecure server.
8."Sometimes, however, a hacker will use DNS cache poisoning to change what site you visit when you enter a URL. A poisoned DNS cache means that https://t.co/Hs1idpBWGQ will instead go to a clone site owned by the hacker."
9.Use secure connections such as your home Wi-Fi. Also, do not forget to always check for HTTPS in the address bar whenever you log into a sensitive website. If it's not there, there's a good chance you're looking at a fake site!
10.If you must perform baking transactions or other sensitive activities over a public Wi-Fi network, read up about VPN on the internet. With it, you can take control of your own privacy? A VPN service encrypts your data before your computer sends it over the network.
11.17.SIM Swapping

A hacker can contact your network provider, claiming to be you and complaining that they lost their phone. They'll then request that their old numbers be transferred to their new SIM card. With this,the network providers will then install your phone number on the hacker's SIM. Once they have your number on their SIM card, they can circumvent SMS codes easily. When they log into your bank account, the bank sends an SMS verification code to their phone rather than yours.
I'm aware that network providers typically ask confirmatory questions to check if the caller is who they claim to be. But some of them can be lax with checks for SIM transfers, which allowed hackers to easily perform this trick. KEEP YOUR PERSONAL DETAILS PRIVATE.

Credit:Suleiman Idris
391 views05:59
Open / Comment
2021-07-10 08:42:42 How to Prevent our account from been hacked

1. Choose a strong password
The first step to securing ur social media account it creating a strong password, and No, I don’t mean Password123456. Strong passwords typically contain symbols,numbers and letters mixed in uppercase and lower case but try using something not too complicated for you to remember.
2. Two-Factor Authentication

This is probably the best and most secure way to log in and protect your social media accounts. Think about this the same way you use a hard token or one-time-password (OTP) for your bank transactions.When someone tries to log in to your account, they have to input a PIN that will be sent to a phone number before they are granted access. Many social media platforms currently have and recommend this feature to help protect your account.
3. Change your password regularly

A strong password is not enough to keep your account secure, so it is advised that you change your password at least once in 3 months. This is to make sure any old or public devices you haveused in the past can no longer access your account.....
4. Be careful and only use trusted third-party applications

Before using a third-party app 2 manage any of ur social media accounts, u must first grant such app access to ur account. Third-party apps can often do different things on ur behalf including posting on your behalf
Hence it is VERY IMPORTANT that you research such app and only grant access to trusted third-party apps. It is also very important to READ and be sure what information you are giving such app access to.
Credit - @cwethein_(twitter)
264 views05:42
Open / Comment
2021-07-10 06:55:11 Hey dudes,the insane paypal vulnerability allows a money reversal possible for every payment to websites.(Your Digital Item + Your Money Back.)
It's not old school method,but a critical severity level Vulnerability.
Are you familiar with paypal?
Interested for this attack?
ib me @aelpa.
285 views03:55
Open / Comment
2021-06-17 20:40:02 Learn JavaScript by playing games:

1. JSRobot
2. JSdares
3. CodeCombat
4. CodinGame
5. Crunchzilla
6. Screeps
281 views17:40
Open / Comment
2021-06-16 20:26:36
418 views17:26
Open / Comment
2021-06-15 04:06:39
15July ,2020 Twitter Hack.
Thread by 'beaglesecure'

1, Multiple Twitter accounts posted the same message promoting a bitcoin wallet with the claim that the amount sent to the address will be sent back doubled.
2.2/ The issue quickly escalated with hacked accounts shifting to sharing multiple bitcoin wallet addresses making it all the more difficult to crack down.
3.3/ It is understood that hackers were able to gain access to internal systems and tools by successfully targeting some Twitter employees in a coordinated social engineering attack. This is according to a tweet from the official Twitter Support account.
4.4/ Even though hackers executed a well-known cryptocurrency hack technique, people fell prey due to the authenticity of the accounts that posted it.
5.5/ The bitcoin wallet promoted in the tweets is estimated to have received upwards of $100,000 in the short period the tweets were live.

This attack leaves Twitter in a very tough spot due to the number of high-profile accounts that were involved.
135 views01:06
Open / Comment
2021-06-13 21:07:07 10 DOM Open URL Parameter's #bugbountytips
1. Location
2. Location.hostname
3. Location.href
4. Location.pathname
5. Location.protocol
6. Location.assign()
7. Location.replace()
8. open()
9. domElem.srcdoc
10. jQuery.ajax()

src = riotsecteam
82 views18:07
Open / Comment
2021-06-11 08:43:23
Credit to Bugbounty hunter 'harshbothara_'
298 views05:43
Open / Comment
2021-06-06 13:06:47
This bot legit pays you real bitcoin.
Click here to join
https://t.me/Easybitcoins_bot?start=0273921030
335 views10:06
Open / Comment