Search results

  1. Plotu

    A little bit about bank accounts

    Most BA's (Bank Accounts) are sold without online access: the password, login, number account and routing number are known. Despite the well-known login and pass, you will not be able to log in online. The bank will ask secret questions. Accordingly, the second type of AD on sale is with online...
  2. Plotu

    ANTIFRAUD: WHAT IT IS AND HOW IT WORKS IN THE BANKING SECTOR

    Antifraud and conversion rates As you can see, the system for monitoring fraudulent transactions requires fine-tuning in order to maintain a high level of security, while not losing most of the profit. In our company, we have identified several main ways to solve this problem: Individual...
  3. Plotu

    ANTIFRAUD: WHAT IT IS AND HOW IT WORKS IN THE BANKING SECTOR

    How antifraud works It is generally accepted that buyers-owners of these same cards – suffer from online fraud with plastic cards. But in fact, online stores get no less. Fraudulent transactions, such as fraud, threaten the seller with loss of money, customers, and reputation. What is a fraud...
  4. Plotu

    How to find out who uploaded your documents or photos to the network

    Imagine a situation: you send someone or upload to some service a document containing personal information, and then you find that it has leaked onto the network. How do you find the source of the leak? As they say, trust, but verify. LeaksID (https://leaksid.com/) is a service that allows you...
  5. Plotu

    Free selfie & passports using SE

    What you'll need to get started: Account of a cute boy 21-25 years old with a photo (preferably with a car, iPhone, girl and other accessories of "successful success"), as well as a Tor browser and Vpn. The essence of the scheme is simple. Buy acc vk or regay but the left sim. We fly into...
  6. Plotu

    How to find out who uploaded your documents or photos to the network

    Imagine a situation: you send someone or upload to some service a document containing personal information, and then you find that it has leaked onto the network. How do you find the source of the leak? As they say, trust, but verify. LeaksID (https://leaksid.com/) is a service that allows you...
  7. Plotu

    Basic aspects of rendering

    Sooner or later, everyone faces an urgent need for high-quality rendering, but runs into a lack of money (for constant payment to renderers), or low-quality services. This article is for those who are learning to draw / paint themselves. Main questions: - What to draw from? Trying to Photoshop...
  8. Plotu

    New Multi VPN account checker by MrRoot

    New Multi VPN account checker by MrRoot, fast and stable (All Configs Bassed On Mobile Api) Supports: Proton VPN Nord VPN Express VPN CyberGhost VPN Ipvanish Tunnel Bear Windscribe Hide My Ass (HMA) Features: Auto Save (Permiums, Expireds, Bads, Customs, Frees, Hits) Fast & Stable (All...
  9. Plotu

    Advertising Android malware from the Play Store penetrated 2 million devices

    Several malicious Android apps hosted on the Google Play Store have made their way to more than two million mobile devices. Their task is to display intrusive advertising, hiding their presence in the system. Dr. Web specialists told Advara about the latest kit. According to them, these apps...
  10. Plotu

    Just one pixel can cost your business millions

    The story of a clinic that forgot that there was a little spy lurking in its website. One of the largest European clinics narrowly avoided a multimillion-dollar fine due to one small pixel and inattention of IT specialists. A few years ago, a large international network of medical clinics ran...
  11. Plotu

    Brazil confronts the global drug threat: a vaccine that can save generations

    A scientific breakthrough in the treatment of addiction. Scientists in Brazil, the world's second - largest cocaine user, have announced the development of a groundbreaking treatment for addiction to the drug and its powerful crack derivative: a vaccine. The experimental vaccine, dubbed...
  12. Plotu

    Russia needs to replace 10% of foreign IT solutions with its own developments

    Forward contracts and 220 billion rubles of investment: how does the country help its IT companies? At the RBC Tech Forum "Technological Breakthroughs in New conditions: first results" the Minister of Digital Development of the Russian Federation Maksut Shadaev said that Russian companies have...
  13. Plotu

    Navigation on the verge of change: China's BeiDou is ready to replace the gold standard of GPS

    The US must accept defeat or outrun a competitor. For the first time in 50 years since it was founded by the US Department of Defense (DOD), the global Positioning System (GPS) is in danger of losing its status as a global benchmark in the field of location determination, reports The Wall...
  14. Plotu

    Government and defense structures in India fell victim to Sidecopy hackers

    In their attacks, attackers use the now popular WinRAR vulnerability. Experts of the Chinese cybersecurity company Hunting Shadow Lab recorded a new cyberattack by the Indian hacker group Sidecopy, which has been operating since 2019. The main targets of the group are traditionally government...
  15. Plotu

    Cyberattack paralyzed the work of Internet service providers in Crimea

    A DDoS attack from abroad caused massive Internet outages in the region. On October 27, a large-scale external DDoS attack occurred in Crimea, which affected local Internet service providers. This was announced by Oleg Kryuchkov, adviser to the head of the region on information policy. Digital...
  16. Plotu

    One of the most important features in the iOS security system has not worked for years

    Are Apple's promises of enhanced privacy just words? Three years ago, Apple developed a mechanism for its devices that promised to strengthen the privacy of users when connecting to Wi-Fi. However, recent research has shown that this feature has almost never worked properly. A MAC address is a...
  17. Plotu

    Spinaron Effect: When a cobalt atom becomes a rugby ball

    There is a new player in the quantum physics arena. Experimental physicists from the Würzburg-Dresden ct.qmat Cluster have demonstrated for the first time a new quantum effect, which they call a "spinaron". In the course of research, it was found that the cobalt atom on the copper surface takes...
  18. Plotu

    iLeakage - a method for exploiting a vulnerability in the Apple CPU via browsers based on the WebKit engine

    Researchers from the Georgia Institute of Technology, the University of Michigan, and the Ruhr University have developed an iLeakage attack technique that exploits a vulnerability in Apple's "A" and "M" series ARM processors by opening a specially designed page in the browser. The prototype...
  19. Plotu

    How Tor Browser passed the strength test: security audit results

    Audit results of Tor Browser and Tor infrastructure components Developers of the anonymous Tor network have published the results of an audit of the Tor Browser and the OONI Probe, rdsys, BridgeDB, and Conjure tools developed by the project, which are used for anonymous network connections that...
  20. Plotu

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
Top