News: What Does Britney Spears Have to Do with Russian Hackers? More Than You Think

News: What Does Britney Spears Have to Do with Russian Hackers? More Than You Think
My message to Russian hackers is this: LEAVE BRITNEY ALONE!Russian hacking collective Turla has been targeting governments and military operations in the United States, Europe, Asia, and the Middle East for the past decade. Now, it appears that the group is targeting everyday citizens — specifically Britney Spears fans.In the comments section of Spears' Instagram page, Turla posted strings of malware-activating code that looked like innocent comments. One comment in particular — as reported by security firm ESET — read "#2hot make loved to her, uupss HHot #X."Fortunately, the malware was only effective through Firefox's full desktop web browser and if malicious extension "HTML5 Encoding 0.3.7" had previously been downloaded. The malicious comments have been removed, so Spears' Instagram should be safe again.ESET reported that little damage was inflicted by the attack.There were only 17 hits recorded on this link in February, right around the time the comment was posted. However, this is quite a low number and might indicate that it was only a test run … the next version of the extension – if there is one – is likely to be very different. There are several components that are used by the extension that will disappear in future versions of Firefox.
— ESETWe asked our resident Instagram expert — Bettina Mangiaracina — for her take on the attack. She explained to Gadget Hacks that it didn't really surprise her. In fact, she thinks we should expect more just like it.Britney's IG account gets thousands of comments per post. When you post a comment under one of Spears' posts, it's like an avalanche. Your post will be hidden under hundreds of other users. This makes Spears' and other celebrity accounts the perfect place to hide a comment full of malware-activating code. I wouldn't be surprised if we start seeing a lot more hackers using celebrity Instagram accounts to communicate between each other.
— Bettina MangiaracinaTo avoid falling victim to a sophisticated attack like this, it is advised that you avoid installing software or opening files from unknown authors. If something seems sketchy, don't hesitate to search online to see if there's any information about its credibility. These guidelines should be followed on desktops and smartphones, as millions of people are affected by mobile attacks.The question that's still on everyone's mind is: why Britney? Are the Russian hackers still upset about the tumultuous end to her relationship with Justin Timberlake? Did they attend her Vegas show and leave underwhelmed? Whatever the reason is, let's hope these hackers give Britney a break.Don't Miss: Malware Targets Mac Users Through Well-Played Phishing AttackFollow Gadget Hacks on Facebook, Twitter, Google+, and YouTube Follow Apple Hacks on Facebook, Twitter, and Pinterest Follow Android Hacks on Facebook, Twitter, and Pinterest Follow WonderHowTo on Facebook, Twitter, Pinterest, and Google+
Cover photo via Youtube



Instale a animação de inicialização do LG G Watch no seu Nexus 5 e veja por si mesmo Quando olhamos para trás, 2014 pode ser lembrado como o Verão do Android Wear . Com dois novos smartwatches emblemáticos a serem lançados em breve, o Google vem preparando seu sistema operacional móvel para o setor de wearables.
[MOD] Android Wear Boot Animation For Other … | Wear OS

TapeACall Lets You Record Phone Conversations on Your iPhone


Download Free Video Downloader for Firefox. Help you download videos from web sites. it's free, safe, fast and easy to use.Help you download videos from web sites. it's free, safe, fast and easy to use.
Download Firefox — Free Web Browser — Mozilla


In this video, I'll show you how to remove Recommended apps on the Samsung Galaxy Note 3, also known as Recommended shortcuts, also known as Page Buddy on the Galaxy Note 2.
Permanently Delete Preloaded Android Apps (Bloatware) on Your


Palm Centro User Guide Sprint How to Use the Bluetooth device on a Palm Centro cell phone Bluetooth devices connect your mobile Click through to watch this video on
Palm Centro Bluetooth Headsets and Car Kits


How To: Access your linux desktop remotely from any computer How To: Access Files, Manage Apps, & Get Remote Camera Access to Your HTC One Wirelessly from Your Computer How To: Remotely Control Computers Over VNC Securely with SSH How To: Access Xampp Server Remotely
How to Control Your Computer Remotely from Your HTC - HTC One


Psy's viral hit "Gangnam Style" is no longer the most-watched video on YouTube. After its release in 2012, "Gangnam Style" became the first video on YouTube to reach 1 billion views

The phone number and website are operated by the major consumer reporting companies. To opt out permanently: You may begin the permanent Opt-Out process online at

In iPhone lingo, your favorites are the people you call most often. The iPhone lets you customize your own Favorites list. Then, you can simply tap the person's name in Favorites and your iPhone calls the person. You can set up as many favorites as you need for a person. So, for example, you may
How to Manage Favorite Contacts in the iPhone Phone App


Ever stumbled upon a cool boot animation on a friend's Android device or a presentation on the Web? It isn't hard to make your own. In fact, we are going to show you in this post, two ways to create a custom boot animation for your own device. Recommended Reading: 30 Must-Try Apps For Rooted
Galaxy Gear with LG G watch bootanimation - YouTube


HTC One M9 uses a nano SIM card. Use a standard nano SIM card only. Inserting a modified card that is thicker than the standard nano SIM card may cause the card to not fit properly or damage the card slot.
How to replace your SIM Card with a Micro SIM or Nano SIM


The Nokia 9 PureView could be the right smartphone for shutterbugs, but there are better options for everyone else. Google Pixel 3 XL. Nokia's flagship is the way to go if you want the
Nokia 9 PureView review: Page 2 | TechRadar

0 comments:

Post a Comment