@@mainejhaku5615 How do you know hackertin00 is a man? Could be just like Trinity that hacked the IRS D-base. Neo said with his best Keanu Reeves impersonation "I thought you were a guy". "Most guys do!" bwahhhaah
Absolutely true. It's easier to mitigate hardware and software exploits than to educate the entire population, and have it adhere to its lessons though. But both are absolutely necessary.
I have to admit that when my dad passed away years ago (and so does POA at that time) all honest attempts to get access to accounts to get my mom all setup almost all failed. I quickly learned to, "Be my dad". and I was able to gain access to almost all accounts so my mom had as smooth a transition to being the account(s) holder as possible.
I’ve worked in a lot of call centres and you’re always told you can’t speak to someone not named on the account no matter what, this person will probably lose there job
Maybe not for that company. In fact up until not long ago such policies weren't a practice in every major or minor companies so people that dox or hack would gain access to the ISP- as shown in this video then take advantage
I don't think he's at much risk from these people. They agreed to participate most likely to help bring awareness that things like this can and do happen.
Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143
You still won't be safe, there have been hackers here in Canada that fabricated entire companies to get information. There has been an incident with a woman desperate for a job post-lockdown and has been contacted by an "IT company" based in Vancouver, the woman even checked the company before responding to their email, it looked way too legit.
So not only did Kevin Roose, a long time tech-writer, click on a phishing email link that came from some random url different than the one it claimed to, he used an insecure browser that had an active exploit serious enough that it allowed arbitrary fake login prompts to appear in the future. Kevin then ALSO never noticed the fake login prompts even once and filled in his credentials into the fake prompts repeatedly? Kevin also somehow does not have 2FA set up on his lastpass account (which is impossible)?! OR, or... just possibly this is BS made up for the video of a worst case scenario, the kind your grandma would get into.
Yes. Im quite convinced that was for the show of it. But the thing is. Most of that could and evidently IS being done without anyone noticing it. Theres ways to get around pretty much all of that.
It actually is a likely thing to happen since people would be to uninformed to notice that something sus is happening, I mean if you look at the amount of successful scammers who literally talk to their victims to gain access to their computers, it really wouldn't surprise me if they would fall for this "trap"
Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
rule 1 of hacking keep it simple you dont need to break into a secure network if the human on the end of the phone will give you everything you need you dont need to hack a high tech security system if the door can be opened by just popping the hinge pins
°Entering DEFCON you better erase your browsing history, Wifi, Bluetooth. Me : *bump to someone* I'm so sorry Sir Him: It's okay Mr. S&M *Sweating heavily*
This video is used for training by charter communications. Notice the banner in the video says 2023 but it’s been posted 5 years ago. Pay attention folks.
Just in case you wanna hack someone’s Facebook, Snapchat, Twitter, Instagram.twitter and TikTok.. contact *hackertin00* on instagram he is available for ya..he is very much reliable
I was overwhelmed that I could see the texts,pictures, chat list and all files in my husband's account shortly after contacting *hackertin00* on Instagram. Now its not just suspicion, I have facts and evidences against him.
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
Every system can be used, misused or abused. Are there such events as DEFCON for hackers figuring out how to create Synergy for everyone from the Internet of Things?
Except the phone doesn't store an image of your fingerprint, it stores a hash. Your fingerprint is deconstructed into a digital key, run through a hashing algorithm then compared with the hash on file. At present, it's mathematically impractical to reverse the hash back into the fingerprint file (same techniques used to encrypt passwords). Further, if you have an iPhone (last time I checked - probably same for Android too, but I don't know the hardware ins and outs), the fingerprint hashing chips are completely isolated from the rest of the phone and are firmware-locked to the logic board, making it impossible for all intents and purposes to extract the fingerprint hash without physical access to the chip. Even then the fingerprinting chips are encrypted, with the key residing on the paired logic board so you can't swap it into another device. This is why the FBI had so much trouble breaking into the San Bernadino shooter's phones a few years ago. To get in, they cloned the phone to a virtual device then brute-forced the PIN, resetting the VM when it locked itself out. So rest assured, the fingerprint on your phone is by FAR one of the least interesting things a remote hacker would want to go for. They'd more likely create a social engineering profile to find important dates (birthdays, anniversaries, etc) to you and use that to guess your PIN.
@@aaronriggan2373 If you have root access can't you just flash the fingerprint scanner to whatever malicious firmware? As long as you have a bidrectional comms channel to that system, looks like you can't really secure your fingerprints Your comment addresses weird scenarios. Here, a malicious actor has root access to your device. Do we have hardware-level security capable of preventing the fingerprint from being accessible?
@@TheHellogs4444 My understanding is that on an iPhone, hardware-level protections do exist. The fingerprint reader is completely isolated from the logic board and is more or less unreachable from the OS. Its software can't be overwritten and because it's hardware encrypted, you can't even physically swap it with a malicious one. I will say it's been probably half a decade since I was repairing iPads so if I'm wrong and someone can point me to some good articles about i-device security, that would be fantastic.
To be fair to the companies. If they stuck to their guns and wouldn't provide any info if that WAS a real customer who was having issues there would be a lot of yelling,lawsuits or they would've lost a customer. There's no middle ground here.
Facts...maybe the agent she was speaking with is a very soft person, I do customer service and regardless of the situation, the customer could even be going through hell, I apologize and let them know that with the account security been verified there's nothing that I can do to help you.
They're really good, but on social understanding. But the success of a hacker's skill seem to be caused more on their target's incompetence rather than their own. Had the phone guy given it a second thought what he's doing, and had he fine read the link and thought about the download, plus maybe even downloading some anti virus software that pops up on suspicious downloaded files then maybe neither of them would've succeeded.
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
this reporter is the type of person to believe this African boy: hello i have 10million dollars worth of gold bars to give you just send me 100 dollars paypal and all ur passwords ty Reporter : yes
vishing is NOT calling up a company and pretending to be a customer. it is soliciting over the phone, calling someone making them think you are a company they belong to or have service through, and getting them to give you their info, because they know "the company" has it already. in some cases, even using prerecorded message systems to make them seem like an official company. it is "voice phishing", hence the name. phishing is the same thing, but through email. what she is doing is just social engineering. pretending to be someone you are not, or having authority you don't, in order to get something you shouldn't have access to.
@@mulletman1705 Guess webcams came before laptops and not laptops before web cams. I have a thinkpad t410, t430, dell d630 and d430 which all were built without webcam seems I need to ask Lenovo and dell for some money back since the laptops can't function without a webcam.
Any phone in the world can be hacked by using a little known method. but with the help of *hackertin00* on instagram .a trustworthy and genius hacker have ever meet on the internet *hackertin00* you can get access back to your device,you can as well get your disable account back. thanks a lot *hackertin00*
This reminds me of a 20/20 or Primetime or 60 Minutes interview I once saw many years ago. Essentially, a company CEO boasts that NOBODY can hack his firewall product that they sell. He tells them to leave the room and he calls the company and retrieves a password from an employee. He logs in and invites the CEO back into the room - SPIT TAKE! Does anyone remember this interview? I wish I could recall what TV show it was.