Tag: Yahoo

(PORTFOLIO) Seminal Inventions: Social Networks…Before Google, Facebook, Yahoo, MySpace, Et al …

Scott designed, engineered, built, ran on the internet, patented and delivered the exact thing that Google and Facebook, later, COPIED to make their companies… It is a “big deal” because they took billions of dollars out of Scott’s pocket.

 

California Secretary of State and other government records show that Scott’s social network, which Zuckerberg and Yahoo copied verbatim, was up and running on March 1, 1987. – FOUNDER: “TECHMATE” AND “UNIFREE” – THE FIRST WEB SOCIAL MEDIA NETWORKS.

Facebook, Yahoo, Google and other, later, social networks have spent millions of dollars to blockade Scott from getting a jury trial against them for tort-based interference, RICO, infringment, theft and other causes of action. They even went so far as to have big lawyers come to Scott and offer “to help him with his patent prodecutions”, when, in fact, those lawyers, covertly were actually working for Google and Facebook. Google even paid to get Google’s own lawyer made the boss of the U.S. Patent Office and Facebook paid to put Facebook’s lawyer on the United States Patent Office Board… Bribery and Conflict-of-Interest Quid-Pro-Quo?  … Looks like it!

It turned out that Scott’s own Senator’s, Congress-people and Governor OWN Facebook and Google!!!! This helped create THE AMERICAN STOCK ACT, now moving through Congress.

Scott Douglas Redmond delivered some of the first online digital social network companies before Facebook, Google, MySpace and other 2nd generation social networks even existed as companies. The U.S. Patent office ruled that he had produced social media e-commerce decades before Mark Zuckerberg or Yahoo engineers had. State, Federal, City and County filings prove Scott’s social media companies were first-on-the-web. Emails, contracts and NDA’s further verify that fact.

 

 

 

LARRY PAGE AND ERIC SCHMIDT COPIED THIS TECHNOLOGY TO FORM GOOGLE.

MARK ZUCKERBERG COPIED THIS TECHNOLOGY TO FORM FACEBOOK.

THE U.S. PATENT OFFICE RULED THAT SCOTT DID IT FIRST BUT FACEBOOK AND GOOGLE SPENT TENS OF MILLIONS OF DOLLARS ON LAWYERS TO BLOCKADES SCOTT’S IP.

 

 

 

Thanks to COVID, stalkers, high-crime and urban blight, there is no longer any way to meet people in the “real world”. You have to use the internet to connect. Corporations, though, use this fact to explot citizens on the web. That is NOT acceptable. You can file complaints with Congress and over 120 government agencies to make them stop abusing the public. You can use PR Newswire, and other media services, to spread the word. Let’s fix this!

Did you know that social media sites like Google and Facebook, and most corporate ‘dating sites, exist to harvest your private data, cull your private info for political parties, and use you like ‘data cattle’ on their abusive digital data farms?

You can help Congess, the FTC, The DOJ and public inerest groups sue these bad actors into oblivion.

You should never, ever, use an online meeting/dating/networking site unless you have read all of the user comments and postings about these sites at:

https://www.reddit.com/r/OnlineDating

Read the facts and then help launch, and testify, in the ongoing lawsuits and CBS News 60 Minutes-type video documentaries that are helping to put these bad guys out of business. Google, Facebook and the dating sites have not been shut down yet because they pay the largest dollar number of bribes to politicians.

Read and share the following facts, court records and government reports with all of your friends:

 

DATING SITES HAVE NOW BEEN CAUGHT USING HUGE NUMBERS OF FAKE PROFILE WRITERS

 

Every person on a dating site is now probably fake

 

Truth-Lies-and-Online-Dating-Secrets-t

 

Corporate Internet Dating Site Scams 1.10

 

SILICON VALLEY___S SOCIAL INFECTION IS DESTROYING THE WORLD

 

SOCIAL-MEDIA-GIANTS-CENSOR-IDEOLOGY

 

WHY FACEBOOK IS THE MOST SOCIALLY DESTRUCTIVE

 

March 25, 2022 at 9:22 AM PDT Match Group Inc. won’t have to pay $844 million sought by federal regulators who accused the world’s biggest online dating-app of defrauding customers by failing to…

Over 36 months — 3 years — at $6 million per month, that would get you to $216 million. So, even by conservative estimates, Match’s settlement with Google seems to be a deal that netted the …
(Reuters) – The online dating company Match Group Inc really, really does not want anyone to know that it’s in a big fight with the U.S. Federal Trade Commission over the FTC’s investigation of…

US online dating giant Match Group has agreed to pay the founders of Tinder $441m (£331.4m) to settle a legal battle over the dating app’s worth. Tinder’s founders first sued Match and its former …

Report: Match.com sued for $10 million

03:00
Report: Match.com sued for $10 million
Fox News

“…A company like ( or that is) ‘Fusion GPS’ and/or ‘Black Cube’ hires people to pretend to be girls on dating sites to bug industry leaders and other Congressional advisors. Meeting someone at a Peets Coffee in-person would solve all of your security concerns but most people will not take the time to drive to a coffee shop. Online you have had to deal with hundreds of deepfakes, scammers, Russian guys pretending to be dates, ai bots, Fusion GPS and Black Cube attackers and other fakes on these dating sites. Black Cube and Fusion GPS have cost well known people millions of dollars in losses via web hacking and harvesting. Nobody should believe a single person on these date sites until they have met them in person. Most of the profiles have turned out to be computerized data harvesters and foreign scammers.  Every text message on a dating site is text harvested every few minutes by scanning software from many third parties.

Don’t relay any personal data across third-party dating servers because they sell your text to Google and collection agencies and political parties and let hackers in. You can see how bad it is by all of the news headlines about web dangers. Most of the profiles on these sites are bots, Eastern Bloc scammers or hired shills pretending to be real people. The only way to prove they are not a bad guy is to meet in person…”

Woman sues Match.com after attack

02:37
Woman sues Match.com after attack
YouTube

Match.com Complaints | ABC News

03:29
Match.com Complaints | ABC News
YouTube

Woman Attacked by Date Sues Match.com

00:24
Woman Attacked by Date Sues Match.com
ABC News

FTC sues dating site company Match.com

00:29
FTC sues dating site company Match.com
ABC News
“…Corrupt political families conspire to give government funds, contracts, tax waivers, buildings, stock market profits and other insider perks to themselves and their friends. They also conspire to blockade, harm, sabotage and black-list those who compete with them and their friends. These corrupt politicians are never prosecuted for their crimes, and can laugh in the face of those who point out their crimes, because they control the prosecution system. Their Quid Pro Quo criminal corruption is the single largest cause of the taxpayer hatred of Congress.
Shoshana Zuboff’s, The Age of Surveillance Capitalism – Why Twitter, Google, Facebook, Instagram, YouTube, Alphabet are the SAME Thing, The SAME SICKO tech elites and the same kinds of social privacy RAPE against citizens!
https://www.contagious.com/news-and-views/shoshana-zuboff-on-the-age-of-surveillance-capitalismTHE MEDIA ASSASSINS: POLITICAL KILL ORDERS AND STATE-SPONSORED CHARACTER ASSASSINATIONS – How A Modern Character Assassination and Political “Kill Order” Is Executed By the Silicon Valley Oligarchs and their total control of propaganda media. Patrick George At Jalopnik attacks outsiders under contract with Elon Musk and the DNC. Silicon Valley campaign finance oligarchs hire him to run hatchet jobs on innocent outsiders and then Gawker-Gizmodo-Jalopnik uses their financial partnership with the DNC’s Google to push the character assassination articles to the top of Google web products and searches.—- Patrick George, Adrian Covert, John Hermann and Nick Cook are the sexually degenerate cabin boys that report to boy-loving sleaze-tabloid oligarch Nick Denton. They created the Fake News crisis in the media by flooding the internet with defamation posts and reprisal hatchet job articles designed to damage political enemies of the Socialists. They coordinate a large number of the character assassination efforts at Gawker, Gizmodo, Jalopnik, CNN, New York Times and other propaganda outlets. These Millennial boys are “Media Rapists” and should be treated as abusers.– How and why did a Donald Trump stripper-date named “Stormy” or an Elon Musk sex party or a Kavanaugh drinking incident or the Moonves and Weinstein indiscretions suddenly hit the news at about the same time in news history?– In addition to actual murder, Politicians and Silicon Valley Oligarchs hire operatives to end people’s lives in other creative ways.–— It is all part of the modern trend in vendetta, revenge and political payback when a Senator or a tech oligarch issues a “kill order” on an opponent. – The client does not like to get their hands dirty so the actual social hit job is performed by companies such as: IN-Q-Tel –; Gawker Media – ; Jalopnik – ; Gizmodo Media – ; K2 Intelligence – ; WikiStrat – ; Podesta Group – ; Fusion GPS – ; Google – ; YouTube – ; Alphabet – ; Facebook – ; Twitter – ; Think Progress – ; Media Matters – ; Black Cube – ; Mossad – ; Correct The Record – ; Sand Line – ; Blackwater – ; Undercover Global Ltd -;  Stratfor – ; ShareBlue – ; Wikileaks ; Cambridge Analytica – ; Sid Blumenthal- ; David Brock – ; PR Firm Sunshine Sachs ; Covington and Burling – ; Buzzfeed – ; Perkins Coie – ; Wilson Sonsini – ; and hundreds of others…These are the people and companies that except cash, revolving door jobs, political appointments, insider trading stock in Silicon Valley tech companies, prostitutes and real estate in exchange for destroying the lives of others….”

Dating Scam | Match.com | Eharmony.com and Can't stop them [Does the below sound familiar to you?]

05:50
Dating Scam | Match.com | Eharmony.com and Can’t stop them [Does the below sound familiar to you?]
YouTube

FTC: Match.com used phony profiles to lure subscribers seeking love

01:48
FTC: Match.com used phony profiles to lure subscribers seeking love
Fox Business

Official Match.com Commercial | Match Real Montage 30

00:31
Official Match.com Commercial | Match Real Montage 30
YouTube

Official Match.com Commercial | Right Now - Events

00:33
Official Match.com Commercial | Right Now – Events
YouTube

FTC defends $5 billion fine on Facebook

01:28
FTC defends $5 billion fine on Facebook
CNN
Match settles lawsuit with Tinder co-founders for $441 million Sarah Perez @ sarahpereztc / 9:00 AM PST • December 1, 2021 Comment Image Credits: Tinder Dating app giant Match has settled its…
BOCA RATON, Fla., July 7, 2021 /PRNewswire/ — Corwin Law, a consumer advocacy law firm based in Boca Raton, has filed a class action lawsuit against Match Group (“Match”) on behalf of…
Washington CNN Business — The dating-app company behind Tinder, OkCupid and Match.comsued Google on Monday, alleging that the technology giant runs an illegal monopoly in the Google Play Store…
Washington, DC CNN — Online dating giant Match Group has dropped a closely watched antitrust lawsuit against Google’s app store, the two companies said Tuesday, days before a trial set to begin…
Match Group, Inc. (NASDAQ: MTCH) companies, including those that operate the dating apps Tinder®, Match®, OkCupid®, and several others (collectively, “Match Group”), today sued Google over its strategic manipulation of markets, broken promises, and abuse of power in requiring Match Group to use Google’s billing system to remain in the Google Play Store. Google’s requirement will eliminate …
September 25, 2019 / 4:09 PM EDT / MoneyWatch The federal government is accusing dating website Match.com of catfishing its own users. The Federal Trade Commission is suing Match Group, which…
According to the 27-page lawsuit, Zoosk and parent company Spark Networks SE, also a defendant, took the biggest hit during the incident, with a group of hackers calling itself the “ ShinyHunters ” making off with the sensitive data of 30 million users.
Juan Flores-Mendez and Tracy Greenamyer sued the online dating site following a massive breach in January 2020 in which a group called the “ShinyHunters” stole data from 30 million Zoosk users. Zoosk waited 22 days to notify its users of the breach, according to the complaint.
A California man has filed a class action lawsuit against online dating service Zoosk following a data breach in which 30 million user records were allegedly compromised. Plaintiff Juan Flores-Mendez and others say Zoosk was hacked by a group that calls itself the “ShinyHunters.”

Plaintiffs suedZoosk and Spark in July, saying their data was accessed by a group known as ShinyHunters, which claims to have stolen millions of user records from at least 13 companies. ShinyHunters allegedly hacked Zoosk in January 2020 and put information for sale on the dark web. On Nov. 30, 2020, Spark argued …
Feb. 1, 2021, 7:42 PM UTC Zoosk Faces Negligence Suit in California Over User Data Hack Porter Wells Reporter Hackers breached, stole dating profile information in 2020 Zoosk had duty to protect sensitive personal info, judge says
Dominic Whitlock 27th July 2020 A group of Zoosk users have filed a lawsuit against the dating platform and Spark Networks in response to a massive data breach earlier this year. It was discovered in May that the private information of 30 million Zoosk members, approximately 85% of its entire community, was up for sale on the dark web.
Zoosk has defeated efforts for class certification in data breach litigation against the dating app, with a US judge in San Francisco ruling today that the class-action waiver signed by the named plaintiff suing the company remains a valid contract
United States takes on Google in biggest tech monopoly trial of 21st century. September 12, 20235:00 AM ET. Dara Kerr. Enlarge this image. Google is headed to trial in Washington D.C., where it …
Last month, Google separately settled a similar location tracking lawsuit with Arizona for $85 million. Google faces additional lawsuits brought by Washington, D.C., Indiana and Texas for …

Google sued for tracking you even in Incognito mode

04:03
Google sued for tracking you even in Incognito mode
YouTube

Why Google Is Being Sued by the Justice Department | WSJ

06:16
Why Google Is Being Sued by the Justice Department | WSJ
YouTube

Google facing new lawsuit claiming Google Maps led to man's death | ABCNL

02:17
Google facing new lawsuit claiming Google Maps led to man’s death | ABCNL
YouTube

Justice Department files lawsuit against Google over digital advertising

03:16
Justice Department files lawsuit against Google over digital advertising
YouTube

DOJ takes on Google in historic antitrust lawsuit over search dominance

02:01
DOJ takes on Google in historic antitrust lawsuit over search dominance
YouTube

Google faces the biggest antitrust trial in more than 20 years

04:00
Google faces the biggest antitrust trial in more than 20 years
YouTube

Google to pay $23 million class action settlement

00:43
Google to pay $23 million class action settlement
YouTube

You may be entitled to a portion of a $23 million Google settlement

00:58
You may be entitled to a portion of a $23 million Google settlement
USATODAY

Why the DOJ is suing Google over antitrust allegations

02:20
Why the DOJ is suing Google over antitrust allegations
YouTube

Lawsuit filed for NC man who died following Google Maps directions

01:57
Lawsuit filed for NC man who died following Google Maps directions
YouTube
Google’s search business provides more than half of the $283 billion in revenue and $76 billion in net income Google’s parent company, Alphabet, recorded in 2022. … At the time the lawsuit …
The government’s lawsuit, filed in 2020 in federal court, alleges these deals were intended by Google to be “exclusionary,” denying rivals access to search queries and clicks, and allowing Google …
In 2021, dozens of state attorneys general suedGoogle on similar grounds. Google reached a tentative settlement with the group in September. On Tuesday, Google also announced a settlement with …
The Justice Department and eight states suedGoogle on Tuesday, accusing the company of harming competition with its dominance in the online advertising market and calling for it to be broken up.
U.S. files second antitrust suit against Google‘s ad empire, seeks to break it up. A worker walks along a path at Googles Bay View campus in Mountain View, Calif., on June 27, 2022. The Justice …

By Orlando Mayorquin. June 14, 2023. Anyone who clicked on a Google search result link from October 2006 to September 2013 is entitled to a piece — however small — of a $23 million settlement …

Jan. 24, 2022. The District of Columbia and three states suedGoogle on Monday, claiming that the tech giant deceived consumers to gain access to their location data. In separate lawsuits, the …

In 2020, the Justice Department filed a civil antitrust suit against Google for monopolizing search and search advertising, which are different markets from the digital advertising technology markets at issue in the lawsuit filed today. The Google search litigation is scheduled for trial in September 2023.

Do You Want To Learn More About How You Can Help With Consumer Protection And Consumer Rights?

Here are some books that can teach you more about it:  ANTI-CORRUPTION BOOKS AND RESEARCH 2.1

HOW TO REPORT CORRUPTION

When you report a political corruption crime, know that each government staffer you talk to has their own agenda.

At least one, or more, of the public officials you report the matter to will try to stonewall or harm your efforts in order to protect their crony associates. To avoid cover-ups, never report a crime incident to only one source, always cc: as many related entities as possible. If a person listed is no longer with that organization, go to the press contact at that organizations website and request a new contact.

You have a large number of people who will support you. The only people who try to shut-down whistle-blowers are those who are engaged in crimes. In a typical report, there are usually many third party BCC or CC’s like this, for example:

Marcel Reid, Pacifica Whistleblower Liaison

Michael McCray, ACORN 8

Zena Crenshaw-Logal, Executive Director, National Judicial Conduct & Disability Law Project

Tom Devine, Legal Director, Government Accountability Project (GAP)

Lawrence Lucas, President, USDA Coalition of Minority Employees

Tanya Ward Jordan, Founder, Coalition for Change (C4C)

Jason Zuckerman, Partner Zuckerman Law Firm; Former Senior Counsel, for the U.S. Office of Special Counsel

Dan Meyer, Executive Director of Intelligence Community Whistleblowing and Source Protection; Office of the Intelligence Community Inspector General.

Gloria Minott, Public Affairs Director WPFW

William Bergman, 9/11 Whistleblower, Truth in Accounting

Zena Crenshaw-Logal, Executive Director, National Judicial Conduct & Disability Law Project

Danielle Brian, Executive Director, Project on Government Oversight (POGO)

Michael McCray, FEW/LEW

Tanya Ward Jordan, Founder, Coalition for Change (C4C)

Andrew Kreig, Executive Director, Justice Integrity Project

David Grogen, U.S. Marshal Service, Justice Department

Arthuretta Holms Martin, Coalition for Change

Paulette Taylor, Civil Rights Chair, Coalition for Change

Arlene Englehardt, Former Pacifica Executive Director

Glenn Greenwald, Journalist

Marcel Reid, Pacifica Whistleblower Liaison

Sharyl Attkisson – Former CBS Investigative Reporter

Andy Lee Roth, Director, Project Censored

Micky Huff, Director, Project Censored

Kristina Borjesson, Freelance Journalist (ABC, CBS, NBC)

Matt Tabbii, Investigative Reporter

Cathy Ball, Legislative Representative, National Treasury Employees Union

Shahid Buttar, Executive Director, Bill of Rights Defense Committee

Keith Wrightson, Worker Safety and Health Advocate, Public Citizen

Marcel Reid, ACORN 8

Zena Crenshaw-Logal, Exploring the Vitality of Stare Decisis in America

Editors- ProPublica Journal

Michael McCray, General Counsel, FEW/LEF

Krista Boyd, Counsel, House Oversight and Government Reform Committee

Charity Wilson, Legislative Representative, American Federation of Government Employees

Robert MacLean, U.S. Air Marshal Whistleblower

Tristan Leavitt, Investigative Counsel, Senate Judiciary Committee

Larry Criscione, NRC Whistleblower

Amanda Hitt, Director, Food Integrity Campaign

Pete Sepp, Executive Vice President, National Taxpayers Union

Zena Crenshaw-Logal, Executive Director, National Judicial Conduct & Disability Law Project

Tony Norman, Vice Chair, Pacifica Foundation

Stephen Kohn, National Whistleblower Center

Zena Crenshaw-Logal, National Judicial Conduct and Disability Law Project

Andy Shallal, Mayoral Candidate (Community Activism)

Joseph Nacchio- CEO Quest Media Former (Corporate Responsibility)

Brad Birkenfeld – UBS Whistleblower (Frank Wills Award)

Jason Zuckerman, Partner Zuckerman Law Firm; Former Senior Counsel, for the U.S. Office of Special Counsel.

Jordan Thomas, Chairman of Whistleblower Practice, Labaton Sucharow

Eric Ben-Artzi, Deutsche Bank financial whistleblower

Lisa Donner, Executive Director, Americans for Financial Reform

Robert MacLean, landmark whistleblowing case on the WPEA

Shirine Moazed, Chief, Investigation and Prosecution Division, U.S. Office of Special Counsel (OSC)

Mick Anderson, OSC Public Servant Award Winner

Senator Elizabeth Warren (D-MA)

Senator John Boozman (R-AR)

The Honorable Blake Farenthold (R-TX)

The Honorable Jackie Speier (D-CA)

Special Counsel Carolyn Lerner (OSC)

Patricia St. Clair, Assistant Director; Training and Outreach Division, EEOC, Office of Federal Sector

Dr. David Tharp, Veterans Administration Whistleblower

Daniel Brennin, Project on Government Oversight

Lydia Dennett, Investigator on behalf of Danielle Brian, Executive Director, Project on Government Oversight (POGO)

Paulette Taylor, Civil Rights Chair, Coalition for Change

David Grogan, U.S. Marshal Service, Justice Department

Zena Crenshaw-Logal, Executive Director, National Judicial Conduct & Disability Law Project

Organizations to carbon-copy Contact:

The FBI

The GAO

The U.S. Senate Ethics Committee

Edward Snowden

Julian Assange

Wikipedia

Etc…

Professional hacker reveals the five mistakes that allow anybody to crack into your smartphone within SECONDS  – It is very DUMB to own a ‘SMART’ phone! Your iPhone, Android phone or ‘Smart’ device is ruining your life

Keiran Burge, a legal hacker, tells MailOnline what five common mistakes people make that let cybercriminals access their private data and take control of their devices.

Many of us would feel lost without our smartphones in hand – but what if that same device became a tool for criminals?

Kieran Burge, a security consultant at Prism Infosec, has revealed the five common mistakes that could let him crack into your smartphone within seconds.

As a penetration tester – a legal hacker who tests companies’ cybersecurity to find weaknesses before criminals do – Kieran knows what he’s talking about. 

And he says that simple mistakes such as reusing passwords, clicking on dodgy links and sharing too much information on social media could land you in hot water. 

So, are you guilty of these security blunders? Read on to find out.  

Kieran Burge, a security consultant at Prism Infosec, has revealed the five common mistakes that could let him crack into your smartphone within seconds

Kieran Burge, a security consultant at Prism Infosec, has revealed the five common mistakes that could let him crack into your smartphone within seconds

As a penetration tester - a legal hacker who tests companies' cybersecurity to find weaknesses before criminals do - Kieran knows what he's talking about

As a penetration tester – a legal hacker who tests companies’ cybersecurity to find weaknesses before criminals do – Kieran knows what he’s talking about

1. Using out-of-date software

Keiran told MailOnline that one of the first things he and other hackers look for when preparing an attack is out-of-date software.

‘Out-of-date software is a really big issue because, if the software has been updated, it’s probably because there is a security issue’, he explained.

Software, whether it is the operating system of your iPhone or the control system for a factory, often has some sort of vulnerability.

While these can quickly fixed by developers, they are also often shared online through forums and hacker communities.

If you haven’t updated your software to include the fix, Keiran explains, ‘people can get in and steal really sensitive information and even sometimes take control of the software.’

Keiran told MailOnline that one of the first things he and other hackers look for when preparing an attack is out-of-date software

Keiran told MailOnline that one of the first things he and other hackers look for when preparing an attack is out-of-date software

What are some of the most commonly hacked passwords? 

Research by Specops Software has found that easily predicted passwords are still commonly used.

Some of the most frequently compromised are:

  • research
  • GGGGGGGG
  • Cleopatra
  • Sym_cskill
  • mcafeeptfcorp
  • minecraft.A.S
  • sym_newhireOEIE
  • password

The vulnerabilities can take many different forms and allow criminals to cause serious disruption for companies and individuals.

These attacks are often opportunistic as criminal groups scan online archives for out-of-date versions of software.

Keiran says the recent crippling hack on the British Library was likely to have been an opportunistic attack of this kind

To keep safe online, Keiran says you should ‘always ensure that your software is up to date.’

2. Reusing passwords

Another common way that hackers get hold of your personal data, according to Keiran, is by exploiting reused passwords.

Keiran told MailOnline: ‘No matter what site you’re giving information to you, you don’t know what they’re going to do with that information or how they’re going to protect it.’

He says that the big risk of re-using passwords is that if even one site you use is compromised, it can give hackers access to all of your accounts.

‘As soon as a company is breached there’s usually a big database dump that gets put on the darkweb,’ Keiran said. 

The dark web is an encrypted part of the internet not accessible with normal search engines which is often used to host criminal marketplaces.

In April this year, an international raid brought down a hacker bazaar called Genesis Market which the FBI claims offered access to over 80 million account access credentials.

Keiran said: ‘There are going to be databases out there with user name and password combinations for your accounts.’

‘If you’re reusing passwords then any hacker can take that combination and use it to take control of another company.’

Reusing passwords puts you at risk because your account credentials can be stolen and resold on marketplaces like Genesis Market which the AI took down earlier this year

Reusing passwords puts you at risk because your account credentials can be stolen and resold on marketplaces like Genesis Market which the AI took down earlier this year

3. Giving out too much information online

‘On a personal level, for someone in their day-to-day activities one of the most important things that people need to think about is how much information they’re sharing online,’ Keiran said.

In ‘red teaming’ – a cybersecurity term for testing the defences of a company – one of the first places Keiran and his team look is social media.

‘We can do almost anything to get into a company, but one of the tools we use is harvesting data from social media,’ Keiran explained.

‘We scour social media sites like LinkedIn to see what we can find.’

Not only might this reveal usernames which can be linked to stolen account credentials, but it also opens the door to a whole range of other attacks.

One of the most insidious attacks that this exposes you to is a technique called ‘sim swapping’ or ‘sim-jacking’.

Keiran explains that hackers will search the web for information such as your date of birth, address, and even the answers to common security questions like your mother’s maiden name.

‘Once you have all that information you can use social engineering techniques to ring up their mobile provider and convince them to transfer the mobile number to a new sim,’ he said.

Now, whenever a text or call would go to the victim’s phone it instead goes straight to the attackers.

‘Once they have that you suddenly have access to all the multi-factor authentication sites that the person is signed up to,’ he added.

This could include work email accounts, online shopping accounts, and even online banking.

‘Everything you put up online you no longer have control over, and if you’re unlucky and all that information links up then you can get your identity partly stolen,’ Keiran warned.

Giving away too much information online can leave you at risk of Sim-Jacking attacks in which hackers transfer your phone number to a new sim to intercept your calls and messages (stock image)

Giving away too much information online can leave you at risk of Sim-Jacking attacks in which hackers transfer your phone number to a new sim to intercept your calls and messages (stock image)

READ MORE: I’m a hacker who was jailed for a decade for heading up a cybercriminal organization 

Jesse William McGraw, 39, spent a decade in prison for heading up one of the first cybercriminal groups in America

Jesse William McGraw, 39, spent a decade in prison for heading up one of the first cybercriminal groups in America

4. Connecting to unprotected public networks

‘In the last few years something that’s become a lot more important is remote working,’ Keiran said.

‘A big part of that involves people going to cafes like Starbucks and connecting to their public WiFi.’

The problem is that these kinds of public networks use a type of system called ‘open authentication’ to connect your device to the web without having to use identity verification.

While this makes it easy for you to quickly jump onto the coffee shop WiFi to send a few e

Professional hacker reveals the five mistakes that allow anybody to crack into your smartphone within SECONDS

Keiran Burge, a legal hacker, tells MailOnline what five common mistakes people make that let cybercriminals access their private data and take control of their devices.

Many of us would feel lost without our smartphones in hand – but what if that same device became a tool for criminals?

Kieran Burge, a security consultant at Prism Infosec, has revealed the five common mistakes that could let him crack into your smartphone within seconds.

As a penetration tester – a legal hacker who tests companies’ cybersecurity to find weaknesses before criminals do – Kieran knows what he’s talking about. 

And he says that simple mistakes such as reusing passwords, clicking on dodgy links and sharing too much information on social media could land you in hot water. 

So, are you guilty of these security blunders? Read on to find out.  

Kieran Burge, a security consultant at Prism Infosec, has revealed the five common mistakes that could let him crack into your smartphone within seconds

Kieran Burge, a security consultant at Prism Infosec, has revealed the five common mistakes that could let him crack into your smartphone within seconds

As a penetration tester - a legal hacker who tests companies' cybersecurity to find weaknesses before criminals do - Kieran knows what he's talking about

As a penetration tester – a legal hacker who tests companies’ cybersecurity to find weaknesses before criminals do – Kieran knows what he’s talking about

1. Using out-of-date software

Keiran told MailOnline that one of the first things he and other hackers look for when preparing an attack is out-of-date software.

‘Out-of-date software is a really big issue because, if the software has been updated, it’s probably because there is a security issue’, he explained.

Software, whether it is the operating system of your iPhone or the control system for a factory, often has some sort of vulnerability.

While these can quickly fixed by developers, they are also often shared online through forums and hacker communities.

If you haven’t updated your software to include the fix, Keiran explains, ‘people can get in and steal really sensitive information and even sometimes take control of the software.’

Keiran told MailOnline that one of the first things he and other hackers look for when preparing an attack is out-of-date software

Keiran told MailOnline that one of the first things he and other hackers look for when preparing an attack is out-of-date software

What are some of the most commonly hacked passwords? 

Research by Specops Software has found that easily predicted passwords are still commonly used.

Some of the most frequently compromised are:

  • research
  • GGGGGGGG
  • Cleopatra
  • Sym_cskill
  • mcafeeptfcorp
  • minecraft.A.S
  • sym_newhireOEIE
  • password

The vulnerabilities can take many different forms and allow criminals to cause serious disruption for companies and individuals.

These attacks are often opportunistic as criminal groups scan online archives for out-of-date versions of software.

Keiran says the recent crippling hack on the British Library was likely to have been an opportunistic attack of this kind

To keep safe online, Keiran says you should ‘always ensure that your software is up to date.’

2. Reusing passwords

Another common way that hackers get hold of your personal data, according to Keiran, is by exploiting reused passwords.

Keiran told MailOnline: ‘No matter what site you’re giving information to you, you don’t know what they’re going to do with that information or how they’re going to protect it.’

He says that the big risk of re-using passwords is that if even one site you use is compromised, it can give hackers access to all of your accounts.

‘As soon as a company is breached there’s usually a big database dump that gets put on the darkweb,’ Keiran said. 

The dark web is an encrypted part of the internet not accessible with normal search engines which is often used to host criminal marketplaces.

In April this year, an international raid brought down a hacker bazaar called Genesis Market which the FBI claims offered access to over 80 million account access credentials.

Keiran said: ‘There are going to be databases out there with user name and password combinations for your accounts.’

‘If you’re reusing passwords then any hacker can take that combination and use it to take control of another company.’

Reusing passwords puts you at risk because your account credentials can be stolen and resold on marketplaces like Genesis Market which the AI took down earlier this year

Reusing passwords puts you at risk because your account credentials can be stolen and resold on marketplaces like Genesis Market which the AI took down earlier this year

3. Giving out too much information online

‘On a personal level, for someone in their day-to-day activities one of the most important things that people need to think about is how much information they’re sharing online,’ Keiran said.

In ‘red teaming’ – a cybersecurity term for testing the defences of a company – one of the first places Keiran and his team look is social media.

‘We can do almost anything to get into a company, but one of the tools we use is harvesting data from social media,’ Keiran explained.

‘We scour social media sites like LinkedIn to see what we can find.’

Not only might this reveal usernames which can be linked to stolen account credentials, but it also opens the door to a whole range of other attacks.

One of the most insidious attacks that this exposes you to is a technique called ‘sim swapping’ or ‘sim-jacking’.

Keiran explains that hackers will search the web for information such as your date of birth, address, and even the answers to common security questions like your mother’s maiden name.

‘Once you have all that information you can use social engineering techniques to ring up their mobile provider and convince them to transfer the mobile number to a new sim,’ he said.

Now, whenever a text or call would go to the victim’s phone it instead goes straight to the attackers.

‘Once they have that you suddenly have access to all the multi-factor authentication sites that the person is signed up to,’ he added.

This could include work email accounts, online shopping accounts, and even online banking.

‘Everything you put up online you no longer have control over, and if you’re unlucky and all that information links up then you can get your identity partly stolen,’ Keiran warned.

Giving away too much information online can leave you at risk of Sim-Jacking attacks in which hackers transfer your phone number to a new sim to intercept your calls and messages (stock image)

Giving away too much information online can leave you at risk of Sim-Jacking attacks in which hackers transfer your phone number to a new sim to intercept your calls and messages (stock image)

READ MORE: I’m a hacker who was jailed for a decade for heading up a cybercriminal organization 

Jesse William McGraw, 39, spent a decade in prison for heading up one of the first cybercriminal groups in America

Jesse William McGraw, 39, spent a decade in prison for heading up one of the first cybercriminal groups in America

4. Connecting to unprotected public networks

‘In the last few years something that’s become a lot more important is remote working,’ Keiran said.

‘A big part of that involves people going to cafes like Starbucks and connecting to their public WiFi.’

The problem is that these kinds of public networks use a type of system called ‘open authentication’ to connect your device to the web without having to use identity verification.

While this makes it easy for you to quickly jump onto the coffee shop WiFi to send a few emails, it also puts you at risk of attacks from cybercriminals.

Open authentication means that the data you send across the network is not encrypted and can be captured by anybody else on the network.

‘Someone could be sat outside a public WiFi network and just listening in on what’s being sent,’ Keiran warned.

‘They could be in the cafe or they could be using specialist hardware to increase the range at which they can listen in on the network.

‘They can be hidden a safe distance away then all they have to do is listen and wait.’

To avoid personal information like banking details being stolen from public WiFi, Keiran recommends that you always use a VPN when in public.

These services encrypt your data so that any eavesdroppers on the network won’t be able to read what your sending.

On public WiFi anyone could be listening in on the information you're sending, waiting to steal sensitive information such as bank details and passwords

On public WiFi anyone could be listening in on the information you’re sending, waiting to steal sensitive information such as bank details and passwords

5. Clicking dodgy links

Finally, Keiran says that sending dodgy links is still the most common way that people get hacked.

Phishing scams remain the most prevalent attack in the UK according to the UK’s National Cyber Security Centre (NCSC).

In 2022 alone, 7.1 million malicious emails and URLs were flagged to the NCSC – the equivalent of nearly 20,000 reports a day.

Keiran explains that hackers will send fake emails and text messages to targets containing links to malicious websites or instructions to download software.

Once one of these links has been clicked, it gives criminals a window to install malware on their victim’s device which can steal data and even take control.

But as sophisticated as a computer virus might be, hackers still need someone to follow a link

Biden And Obama Govt Use Silicon Valley To Put An Electronic Dog Leash On Every Citizen
– Never sign-in to any web site and always hide anything that could identify you on-line.

Want to help end the tech oligarch’s rape of society? Never, EVER: use, read, quote, link to, paste from, or refer to; anything on corrupt and contrived: Twitter, Google – Alphabet – Facebook – Meta – Instagram – Netflix or YouTube! Don’t expand their reach! Don’t be their digital bitch! Stop being an addict to Silicon Valley’s social media scam! Keep the battery out of your phone so Big Tech can’t continue to spy on you. Did you know you CAN’T turn an iPhone off. Apple iPhone’s pretend to be “off” but still monitor you with reserve power. Congress should shut these companies down, but they don’t because these companies pay the largest bribes on Earth to politicians! Demand that Congress shut down these big tech abusers that cause child suicides, bullying, sex trafficking, money laundering, tax evasion, political bribery, election manipulation and other social crimes.

to a compromised website or download files containing hidden malware.

‘You need to be vigilant of anyone that is sending you something when you don’t expect it,’ Kieran concluded.

‘Don’t click on dodgy links, don’t download dodgy files, don’t fall into their trap.’

EVERY DEVICE that SILICON VALLEY SELLS YOU, OR CONNECTS TO YOU, WILL HURT YOU AND YOUR FAMILY!

All Electronics that you have log-in to will ALWAYS eventually be hacked and spy on you and manipulate you and report you to government and political bosses.

“AI” = Spying on you, data rape, monopolistic control & political information manipulation
“Google” = Spying on you, data rape, monopolistic control & political information manipulation
“Amazon” = Spying on you, data rape, monopolistic control & political information manipulation
“Meta” = Spying on you, data rape, monopolistic control & political information manipulation
“The Cloud” = Spying on you, data rape, monopolistic control & political information manipulation

NEVER trust ANY of these things and never connect to them!

Biden And Obama Govt Use Silicon Valley To Put An Electronic Dog Leash On Every Citizen
– Never sign-in to any web site and always hide anything that could identify you on-line.

Want to help end the tech oligarch’s rape of society? Never, EVER: use, read, quote, link to, paste from, or refer to; anything on corrupt and contrived: Twitter, Google – Alphabet – Facebook – Meta – Instagram – Netflix or YouTube! Don’t expand their reach! Don’t be their digital bitch! Stop being an addict to Silicon Valley’s social media scam! Keep the battery out of your phone so Big Tech can’t continue to spy on you. Did you know you CAN’T turn an iPhone off. Apple iPhone’s pretend to be “off” but still monitor you with reserve power. Congress should shut these companies down, but they don’t because these companies pay the largest bribes on Earth to politicians! Demand that Congress shut down these big tech abusers that cause child suicides, bullying, sex trafficking, money laundering, tax evasion, political bribery, election manipulation and other social crimes.

You use your cell phone on a daily basis, sending emails and text messages, making calls, listening to voicemail messages, taking and sharing videos and photos, using social media, and so much more. What if someone was able to access all of that personal data? That could be a disaster. Why Would Someone Spy On My Cell Phone?
Videos from your phone spies on you

Edward Snowden: How Your Cell Phone Spies on You

24:16
Edward Snowden: How Your Cell Phone Spies on You
YouTube

Is your phone spying on you?

02:01
Is your phone spying on you?
YouTube

How Your Phone Is Spying On You | Edward Snowden

05:24
How Your Phone Is Spying On You | Edward Snowden
YouTube

Stop Your Android From SPYING On You!

16:26
Stop Your Android From SPYING On You!
YouTube

How-To Detect If Someone's Spying on Your Phone [HACKED]

04:04
How-To Detect If Someone’s Spying on Your Phone [HACKED]
YouTube

4 Smartphone Spy Hacks YOU CAN DO RIGHT NOW (Awesome Spy Apps)

11:44
4 Smartphone Spy Hacks YOU CAN DO RIGHT NOW (Awesome Spy Apps)
YouTube

Secret phone codes can spy on you without your knowledge!

05:25
Secret phone codes can spy on you without your knowledge!
YouTube

DON'T USE MOBILE SPY APPS! (there's a good reason why)

04:32
DON’T USE MOBILE SPY APPS! (there’s a good reason why)
YouTube

Is there a free app to spy on someones phone without touching it?

03:44
Is there a free app to spy on someones phone without touching it?
YouTube

How hackers could use smart home devices to spy on you (Marketplace)

22:12
How hackers could use smart home devices to spy on you (Marketplace)
YouTube
See more videos from your phone spies on you.
Apps could be secretly accessing your smartphone‘s microphone and camera to spy on you, or collect data to serve you targeted ads. To protect yourself, you can download an app that lets…

If your phone is constantly slowing down or lagging, this could be caused by malware. Spyware (which is a specific type of malware) operates in the background of your device and uploads your data, photos, and documents to an external server. These tasks are resource-intensive, resulting in slow performance.
CamScanner Ana Bera is a cybersecurity expert with Safe at Last. She identified CamScanner, an app meant to imitate a scanner with your phone, as one of the apps consumers should be concerned…

If the keyphrase isn’t heard, nothing happens. Once the keyphrase is detected, the device will send a snippet to Google’s servers to double-check if it was a false positive. If everything …

March 23, 2023 Ioana Patringenaru, UC San Diego Credit: David Baillot/University of California San Diego Smartphone spyware apps that allow people to spy on each other are not only hard to notice and detect, they also will easily leak the sensitive personal information they collect, says a team of computer scientists from New York and San Diego.

You can have more than one face, and set of fingerprints enrolled in your iPhone. To check if someone has added their face to Face ID, tap Settings > Face ID & Passcode and enter your passcode. If …
It is easy to test if your phone is spying on you — simply select an unrelated topic and talk about it a few times within earshot of your phoneYou can follow these steps to find out if your phone has been listening and logging your conversations: Select a good topic.

What Happens When Your Phone Spies on You? By Damir Mujezinovic Published May 4, 2023 Do you think someone is tracking your smartphone? Is it infected with spyware? Here are some red flags that indicate someone might be spying on you. Readers like you help support MUO.
Spyware apps surreptitiously run on a device, most often without the device owner’s awareness. They collect a range of sensitive information such as location, texts and calls, as well as audio and video. Some apps can even stream live audio and video. All this information is delivered to an abuser via an online spyware portal.

mails, it also puts you at risk of attacks from cybercriminals.

Open authentication means that the data you send across the network is not encrypted and can be captured by anybody else on the network.

‘Someone could be sat outside a public WiFi network and just listening in on what’s being sent,’ Keiran warned.

‘They could be in the cafe or they could be using specialist hardware to increase the range at which they can listen in on the network.

‘They can be hidden a safe distance away then all they have to do is listen and wait.’

To avoid personal information like banking details being stolen from public WiFi, Keiran recommends that you always use a VPN when in public.

These services encrypt your data so that any eavesdroppers on the network won’t be able to read what your sending.

On public WiFi anyone could be listening in on the information you're sending, waiting to steal sensitive information such as bank details and passwords

On public WiFi anyone could be listening in on the information you’re sending, waiting to steal sensitive information such as bank details and passwords

5. Clicking dodgy links

Finally, Keiran says that sending dodgy links is still the most common way that people get hacked.

Phishing scams remain the most prevalent attack in the UK according to the UK’s National Cyber Security Centre (NCSC).

In 2022 alone, 7.1 million malicious emails and URLs were flagged to the NCSC – the equivalent of nearly 20,000 reports a day.

Keiran explains that hackers will send fake emails and text messages to targets containing links to malicious websites or instructions to download software.

Once one of these links has been clicked, it gives criminals a window to install malware on their victim’s device which can steal data and even take control.

But as sophisticated as a computer virus might be, hackers still need someone to follow a link

Biden And Obama Govt Use Silicon Valley To Put An Electronic Dog Leash On Every Citizen
– Never sign-in to any web site and always hide anything that could identify you on-line.

Want to help end the tech oligarch’s rape of society? Never, EVER: use, read, quote, link to, paste from, or refer to; anything on corrupt and contrived: Twitter, Google – Alphabet – Facebook – Meta – Instagram – Netflix or YouTube! Don’t expand their reach! Don’t be their digital bitch! Stop being an addict to Silicon Valley’s social media scam! Keep the battery out of your phone so Big Tech can’t continue to spy on you. Did you know you CAN’T turn an iPhone off. Apple iPhone’s pretend to be “off” but still monitor you with reserve power. Congress should shut these companies down, but they don’t because these companies pay the largest bribes on Earth to politicians! Demand that Congress shut down these big tech abusers that cause child suicides, bullying, sex trafficking, money laundering, tax evasion, political bribery, election manipulation and other social crimes.

to a compromised website or download files containing hidden malware.

‘You need to be vigilant of anyone that is sending you something when you don’t expect it,’ Kieran concluded.

‘Don’t click on dodgy links, don’t download dodgy files, don’t fall into their trap.’

EVERY DEVICE that SILICON VALLEY SELLS YOU, OR CONNECTS TO YOU, WILL HURT YOU AND YOUR FAMILY!

All Electronics that you have log-in to will ALWAYS eventually be hacked and spy on you and manipulate you and report you to government and political bosses.

“AI” = Spying on you, data rape, monopolistic control & political information manipulation
“Google” = Spying on you, data rape, monopolistic control & political information manipulation
“Amazon” = Spying on you, data rape, monopolistic control & political information manipulation
“Meta” = Spying on you, data rape, monopolistic control & political information manipulation
“The Cloud” = Spying on you, data rape, monopolistic control & political information manipulation

NEVER trust ANY of these things and never connect to them!

Biden And Obama Govt Use Silicon Valley To Put An Electronic Dog Leash On Every Citizen
– Never sign-in to any web site and always hide anything that could identify you on-line.

Want to help end the tech oligarch’s rape of society? Never, EVER: use, read, quote, link to, paste from, or refer to; anything on corrupt and contrived: Twitter, Google – Alphabet – Facebook – Meta – Instagram – Netflix or YouTube! Don’t expand their reach! Don’t be their digital bitch! Stop being an addict to Silicon Valley’s social media scam! Keep the battery out of your phone so Big Tech can’t continue to spy on you. Did you know you CAN’T turn an iPhone off. Apple iPhone’s pretend to be “off” but still monitor you with reserve power. Congress should shut these companies down, but they don’t because these companies pay the largest bribes on Earth to politicians! Demand that Congress shut down these big tech abusers that cause child suicides, bullying, sex trafficking, money laundering, tax evasion, political bribery, election manipulation and other social crimes.

You use your cell phone on a daily basis, sending emails and text messages, making calls, listening to voicemail messages, taking and sharing videos and photos, using social media, and so much more. What if someone was able to access all of that personal data? That could be a disaster. Why Would Someone Spy On My Cell Phone?
Videos from your phone spies on you

Edward Snowden: How Your Cell Phone Spies on You

24:16
Edward Snowden: How Your Cell Phone Spies on You
YouTube

Is your phone spying on you?

02:01
Is your phone spying on you?
YouTube

How Your Phone Is Spying On You | Edward Snowden

05:24
How Your Phone Is Spying On You | Edward Snowden
YouTube

Stop Your Android From SPYING On You!

16:26
Stop Your Android From SPYING On You!
YouTube

How-To Detect If Someone's Spying on Your Phone [HACKED]

04:04
How-To Detect If Someone’s Spying on Your Phone [HACKED]
YouTube

4 Smartphone Spy Hacks YOU CAN DO RIGHT NOW (Awesome Spy Apps)

11:44
4 Smartphone Spy Hacks YOU CAN DO RIGHT NOW (Awesome Spy Apps)
YouTube

Secret phone codes can spy on you without your knowledge!

05:25
Secret phone codes can spy on you without your knowledge!
YouTube

DON'T USE MOBILE SPY APPS! (there's a good reason why)

04:32
DON’T USE MOBILE SPY APPS! (there’s a good reason why)
YouTube

Is there a free app to spy on someones phone without touching it?

03:44
Is there a free app to spy on someones phone without touching it?
YouTube

How hackers could use smart home devices to spy on you (Marketplace)

22:12
How hackers could use smart home devices to spy on you (Marketplace)
YouTube
See more videos from your phone spies on you.
Apps could be secretly accessing your smartphone‘s microphone and camera to spy on you, or collect data to serve you targeted ads. To protect yourself, you can download an app that lets…

If your phone is constantly slowing down or lagging, this could be caused by malware. Spyware (which is a specific type of malware) operates in the background of your device and uploads your data, photos, and documents to an external server. These tasks are resource-intensive, resulting in slow performance.
CamScanner Ana Bera is a cybersecurity expert with Safe at Last. She identified CamScanner, an app meant to imitate a scanner with your phone, as one of the apps consumers should be concerned…

If the keyphrase isn’t heard, nothing happens. Once the keyphrase is detected, the device will send a snippet to Google’s servers to double-check if it was a false positive. If everything …

March 23, 2023 Ioana Patringenaru, UC San Diego Credit: David Baillot/University of California San Diego Smartphone spyware apps that allow people to spy on each other are not only hard to notice and detect, they also will easily leak the sensitive personal information they collect, says a team of computer scientists from New York and San Diego.

You can have more than one face, and set of fingerprints enrolled in your iPhone. To check if someone has added their face to Face ID, tap Settings > Face ID & Passcode and enter your passcode. If …
It is easy to test if your phone is spying on you — simply select an unrelated topic and talk about it a few times within earshot of your phoneYou can follow these steps to find out if your phone has been listening and logging your conversations: Select a good topic.

What Happens When Your Phone Spies on You? By Damir Mujezinovic Published May 4, 2023 Do you think someone is tracking your smartphone? Is it infected with spyware? Here are some red flags that indicate someone might be spying on you. Readers like you help support MUO.
Spyware apps surreptitiously run on a device, most often without the device owner’s awareness. They collect a range of sensitive information such as location, texts and calls, as well as audio and video. Some apps can even stream live audio and video. All this information is delivered to an abuser via an online spyware portal.