![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 | |
Natalie K
Industry Role:
Join Date: Apr 2010
Location: Spain
Posts: 19,072
|
Russian hackers spreading malware "litterdrifter"
careful to all...
Quote:
while this should not effect us in the adult industry, who knows how far infection can be passed ![]()
__________________
My official site NatalieK.xxx ![]() ![]() ![]() Skype: gspotproductions - "Converting traffic into income since 2005" |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
SEO Connoisseur
Industry Role:
Join Date: Apr 2003
Location: Brantford, Ontario
Posts: 16,362
|
Pretty soon every USB will require a condom
![]()
__________________
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Natalie K
Industry Role:
Join Date: Apr 2010
Location: Spain
Posts: 19,072
|
problem we thought, once the infection was from the USB is in, isnīt the malware able to be spread through email or contact?
It seems like itīs created for intel or screwing between the war, but this sounds serious when reading the publication ![]()
__________________
My official site NatalieK.xxx ![]() ![]() ![]() Skype: gspotproductions - "Converting traffic into income since 2005" |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Natalie K
Industry Role:
Join Date: Apr 2010
Location: Spain
Posts: 19,072
|
another huge attack on the security authorization system developed by South Korea, used by companies in the UK...
https://www.bleepingcomputer.com/new...-chain-attack/ how much information is being stolen every day & we may never know ![]()
__________________
My official site NatalieK.xxx ![]() ![]() ![]() Skype: gspotproductions - "Converting traffic into income since 2005" |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
I help you SUCCEED
Industry Role:
Join Date: Nov 2003
Location: The Pearl of the Orient Seas
Posts: 32,195
|
I wonder how they compare to Chinese hackers
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 |
bored
Industry Role:
Join Date: Aug 2003
Location: Metaverse
Posts: 4,675
|
another day another hacker. i watch them all day.
the real problem is slaved devices. i've battled many attacks that used thousands of end user slaved IPs. routers, phones, fridges, some PCs but mostly not.. the USB was only the first hop. you can send a gb of data in seconds now.. bitdefender has top level ransomware and malware protection if you are worried: https://www.bitdefender.com/solution...-security.html the hacker news is a pub to follow if u are bored and want to be more paranoid: https://thehackernews.com/ #
__________________
# ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
Natalie K
Industry Role:
Join Date: Apr 2010
Location: Spain
Posts: 19,072
|
this is true, with the speed of the net now, within a second, you could download huge files of shit & not have time to pull that cable or get off the site or email...
thanks for the links ![]()
__________________
My official site NatalieK.xxx ![]() ![]() ![]() Skype: gspotproductions - "Converting traffic into income since 2005" |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
Too lazy to wipe my ass
Industry Role:
Join Date: Aug 2002
Location: A Public Bathroom
Posts: 38,491
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 |
Confirmed User
Industry Role:
Join Date: Feb 2005
Location: Southern California
Posts: 3,733
|
what exactly do "hackers" do? the software is already made before they touch it.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() |
|||||||
|
|||||||
Bookmarks |
Thread Tools | |