Different types of USB charger attacks that work on Android phones

I’m wondering about different types of malicious USB charger attacks that work on Android devices when USB debugging option is disabled and if the USB option is set to "charge only".
I’m not talking about Badpower attacks that ai… Continue reading Different types of USB charger attacks that work on Android phones

Someone can still access my emails despite me signing out of all devices and turning on 2FA [closed]

This is seriously bugging me. Starting from yesterday, someone has been signing up to many different temp jobs (Uber, Doordash, etc) using one of my email accounts (gmail). Initially, I thought it was a spam attempt to obscure important em… Continue reading Someone can still access my emails despite me signing out of all devices and turning on 2FA [closed]

What "indicators of compromise" are there that end users can diagnose themselves?

I’m responsible for the IT security of a small (~5 users) office, and I’m preparing training materials for our users.
Obviously, the first step my users should do if anything seems suspicious is to keep calm and contact me. However, if I’m… Continue reading What "indicators of compromise" are there that end users can diagnose themselves?

I’m getting hacked, can’t do a thing to stop it. my iphone, my personal computer [closed]

iphone11 and my personal pc have been hacked. I’d like to know the basics of how they did it and how i can stop it.
is it done by remotely, or does someone need to be within distance of my wifi and hack it that way? or by contact with my p… Continue reading I’m getting hacked, can’t do a thing to stop it. my iphone, my personal computer [closed]