Computers and Internet

How to Questions and Answers About Computers and Internet

Strange files on iPhone

I’m on iPhone and I recently checked my files and I saw I had around 4 files downloaded. I never download anything on my iPhone that’s not from the AppStore, and my phone isn’t jail broken. The files where in a folder called Aeries portal which is an app that I use for school for…

Can someone track photo iMessages?

Hey I really need some help! A scammer was messaging me earlier, ( Through iPhone iMessages ) I knew it was a romance scammer but I thought it would be funny to respond and send funny edited pictures back to them of my friend. I edited these through procreate and ibis paint. I realized after…

A friend in cyber claims he’s making $600k a year?

I have a friend in cyber that was making $300k in 4 years as a consultant. He worked his way up. He worked about 60-100 hours a week. Now he’s making $600k working 50 hours a week. How is this possible!!?? BS?? He says it’s common & he knows people making more than that…

VPN Suspiciously Malfunctioning After Virus Removal- Please Help

VPN Suspiciously Malfunctioning After Virus Removal- Please Help

Another CompTIA resource question

Checking out the Amazon reviews for various Sec+ books and they’re quite mixed. Whats the front runner book for passing Sec+ 601? Also been thinking of checking out CBT Nuggets, A Cloud Guru etc… but they’re all sooo expensive (paying on my personal dime). What online materials do you use if you want to become…

Could we open source the software that runs our energy grid?

With news of recent cyber attacks, I got to thinking – what if we made the software that runs our energy grid open source? I was thinking about Linux, and how it’s generally seen as the most reliable and safest operating system because it’s open source. There are something like 15,000 contributors to the Linux…

Malicious NPM Package Steals Passwords via Chrome’s Account-Recovery Tool

Malicious NPM Package Steals Passwords via Chrome’s Account-Recovery Tool

Twitter Account Security Transparency Report – 2.3% of active Twitter accounts use any form of 2FA, and the majority of 2FA users depend partially or wholly on SMS 2FA

Twitter Account Security Transparency Report – 2.3% of active Twitter accounts use any form of 2FA, and the majority of 2FA users depend partially or wholly on SMS 2FA

Discord attachment virus

so recently I clicked on a picture in a discord server and it was one of those false av flag pictures that have been going around. While going to my appdata to clear my cache, i noticed a download called bugtrace01.dll this was downloaded on the same time i opened the picture on discord, so…

HAPI joins Solbridge – HAPI is a protocol to track cryptocurrency scammers, and Solbridge connects HAPI to cross chain to track them down wherever they send funds.

HAPI joins Solbridge – HAPI is a protocol to track cryptocurrency scammers, and Solbridge connects HAPI to cross chain to track them down wherever they send funds.