News: What Does Britney Spears Have to Do with Russian Hackers? More Than You Think

News: What Does Britney Spears Have to Do with Russian Hackers? More Than You Think
My message to Russian hackers is this: LEAVE BRITNEY ALONE!Russian hacking collective Turla has been targeting governments and military operations in the United States, Europe, Asia, and the Middle East for the past decade. Now, it appears that the group is targeting everyday citizens — specifically Britney Spears fans.In the comments section of Spears' Instagram page, Turla posted strings of malware-activating code that looked like innocent comments. One comment in particular — as reported by security firm ESET — read "#2hot make loved to her, uupss HHot #X."Fortunately, the malware was only effective through Firefox's full desktop web browser and if malicious extension "HTML5 Encoding 0.3.7" had previously been downloaded. The malicious comments have been removed, so Spears' Instagram should be safe again.ESET reported that little damage was inflicted by the attack.There were only 17 hits recorded on this link in February, right around the time the comment was posted. However, this is quite a low number and might indicate that it was only a test run … the next version of the extension – if there is one – is likely to be very different. There are several components that are used by the extension that will disappear in future versions of Firefox.
— ESETWe asked our resident Instagram expert — Bettina Mangiaracina — for her take on the attack. She explained to Gadget Hacks that it didn't really surprise her. In fact, she thinks we should expect more just like it.Britney's IG account gets thousands of comments per post. When you post a comment under one of Spears' posts, it's like an avalanche. Your post will be hidden under hundreds of other users. This makes Spears' and other celebrity accounts the perfect place to hide a comment full of malware-activating code. I wouldn't be surprised if we start seeing a lot more hackers using celebrity Instagram accounts to communicate between each other.
— Bettina MangiaracinaTo avoid falling victim to a sophisticated attack like this, it is advised that you avoid installing software or opening files from unknown authors. If something seems sketchy, don't hesitate to search online to see if there's any information about its credibility. These guidelines should be followed on desktops and smartphones, as millions of people are affected by mobile attacks.The question that's still on everyone's mind is: why Britney? Are the Russian hackers still upset about the tumultuous end to her relationship with Justin Timberlake? Did they attend her Vegas show and leave underwhelmed? Whatever the reason is, let's hope these hackers give Britney a break.Don't Miss: Malware Targets Mac Users Through Well-Played Phishing AttackFollow Gadget Hacks on Facebook, Twitter, Google+, and YouTube Follow Apple Hacks on Facebook, Twitter, and Pinterest Follow Android Hacks on Facebook, Twitter, and Pinterest Follow WonderHowTo on Facebook, Twitter, Pinterest, and Google+
Cover photo via Youtube



Android news, reviews, tips, and discussions about rooting, tutorials, and apps. HTC U11 Review:A Return to Glory Better cameras. The edge sense is nice but
G+ first thoughts and annoyances/likes. « Google+ Insider


In this tutorial, learn how to root your HTC smartphone for super user access. With a rooted phone, you will be able to tether for free, install and create new ROMS, alter the CPU and much more. Follow along with this instructional video and get started with you new "jailbroken" EVO 4G. How To
How to Root a Sprint HTC Evo 4G Google Android smartphone


This also improves recharging efficiency and the battery use duration. Method 2: Bring a dead battery back to life by freezing. Lithium reactions in batteries work using a charge-discharge process in which positive and negative electric charges collide with each other.
How to Revive a dead cellphone battery (Any Brand) - YouTube


For Samsung phones with a physical home button, you can use the home + power button combo to take screenshots. Just press the two buttons simultaneously until the sides of the screen flash and you
How To Take Screenshot Without Buttons On Android, iPhone


If you love to have customized shortcuts on the home screen of your Android device, then here are the 2 best apps to help you accomplish just that.


Report Ad
Free 2-day Shipping On Millions of Items. No Membership Fee. Shop Now!


Appual's has a few great guides on Android development, such as How to Build a Custom ROM from Android Open Source Project - but these guides are usually geared towards a pure Linux build environment. In this guide, we are going to show you how to build an Android kernel on Windows 10 - yes
Android Basics: How to Find Your Phone's Screen Density Value

Fox News - Breaking News Updates | Latest News Headlines


How To: Protect a touchscreen device against rain (cheaply) How To: Protect your blog by trademarking your domain name How To: Secure a new Microsoft Windows PC to protect it against malware How To: Protect your iPhone or iPod Touch from theft with the Cylay app
How to Seal and waterproof the belt - ATV :: WonderHowTo


If you temporarily want your number to appear when you have a permanent line block in place, dial *82 before the number. For example, allowing your number to appear in this case would look like *82 555 555 5555. Some people automatically decline calls from phones that block Caller ID.
How To: Block Your Phone Number from Appearing on Any Caller ID


How To Add Links To Instagram Stories In The Latest App Update Want your followers to be able to explore your story on a more in depth level? Adding a link directs users to related content
How to Add Links in Instagram Story - YouTube


Welcome to SheetMusicFox! Download hundreds of thousands of free public domain sheet music titles. SheetMusicFox.com News Septemeber 28th, 2012 - Our iPhone/iPad app is out! Now you can access your sheet music wherever you are! August 6th, 2012 - Complete redesign of SheetMusicFox with over 200,000 sheet music titles!
Free Sheet Music Downloads at Musicnotes.com


Due to the sheer amount of -nix systems, including Apple's OSX Operating System, that utilize some version of the Bash shell, this vulnerability is highly-regarded as one of the biggest security vulnerabilities in history. What exactly is a "Bash"?
Security Update: Bash "Shellshock" Vulnerability - Jamf

0 comments:

Post a Comment