Lost24

The researchers at the King Abdullah University of Science and Technology (KAUST) in Saudi Arabia have developed a new technology that can reduce the theft of smartphone or laptops. The method, however, may seem a bit extreme because it leads to COMPLETE DESTRUCTION of the stolen device.


How dose it work?


The technology involves the usage of expandable polymers that can expand to seven-times its original size when heated to temperature above 80°C. The energy needed to generate that amount of heat comes from the battery of the device enabling the polymer to literally rip the device from the inside out.


What triggers the self-destruction mechanism?


The developers claim th

Lost24

If you own an older  Android operating system  (OS ver. 4 or 5) and you have downloaded the app from the unofficial, third-party app stores, you may be at risk of catching a new virus named Gooligan.


The maleware takes advantage of multiple Android 4 and 5 exploits. It first roots into the system and then downloads a new, malicious rootkits.


The installed malewares grant the hackers full control over your device, allowing them access to all the Google services related to the user, including Google Play, Gmail, Google Docs, Google Drive, and Google Photos.


The removal of the virus from the infected device is not easy. The software was designed to bury

Wednesday 8 March 2017, Safety Guide

Satan – a custom-made ransomware

Lost24

An unknown group of hackers has recently developed a new method for extorting money.


The hackers have created a user-friendly platform named Satan, which allows the wannabe cybercriminals to create their own ransomware. The users just need to register on the Satan's domain and connect their bitcoin wallet to the account. Moreover, they don't even have to pay an upfront fee.

The developers of the virus get paid by taking a 30% cut of victims' payments.


The platform provides the wannabe hackers with tips on how to customize their ransomware, i.e. how to specify the ransom amount or increase the amount of money to pay after a specific deadline.


The Satan virus encrypts stored data an

Sunday 5 March 2017, Safety Guide

City surveillance system hacked

Lost24

It seems that hackers are no longer satisfied with compromising the security of cell phones or computers and peeking just into private users' webcams. Most recently the unidentified group has successfully infiltrated and compromised police surveillance cameras in Washington, D.C.


According to the Technobuffalo portal, cyberattack took place a week before President Donald Trump’s inauguration.
The surveillance system was infected with ransomware, granting the hackers access to 123 out of 187 cameras spread around the city, briefly curbing police’s ability to record footages.


Fortunately, the problem was quickly resolved by deactivating the infected devices, removing all software and restarting the system. However,

Sunday 5 February 2017, Safety Guide

The fraud "for pipelines"

Lost24

The fraud "for the grandson" or "for police officer" is probably already well-known to everyone. Have you heard about a new method "for pipelines"? 

The swindlers make use of the lack of knowledge of the residents and impersonate the  employees of the Water and Sewerage Service. 


Thieves under the guise of controlling the meters or the breakdown of the network in the apartment block, enter the flats in groups consisting of two persons and loot. 

One of swindlers shifts away attention of residents e.g. by ordering to turn on and off water in the bathroom, and second thief at that time robs the flat from valuables. 

&l

Lost24

Probably everybody  heard about the common fraud "for the grandson". This time the swindlers clients of Social Insurance Institution (ZUS) by e-mail or phone. Clients can receive infected electronic correspondence or can be persuaded to use paid counselling. 


The e-mail message contains information about  the possibility to recalculate the retirement pensions due to the change of provisions of the Funded Pension Act. In order to authenticate the message which is supposed to be allegedly sent from ZUS, the e-mail contains contact address. Also phone calls are being made and clients get the offer to meet the representative of Social Insurance Institution to recalculate the retirement pensio

Lost24

According to the latest NIK report, the number of cats in pounds increased over a few years. 

 

Are cats owners aware of the threats to their animals, away from the safe territory which is our home? 


Above all, the road traffic, animals are very often victims of road accidents. Equip the cat with flashy collar, it can decrease the risk of being hit by the car, drivers will more quickly notice such animal after dark. 


Make sure that our cat has a collar with address and instilled chip. If the animal goes missing we increase the odds of tracking it down. 


Sunday 5 February 2017, Safety Guide

The leak of data from PESEL database

Lost24

District prosecutor's office in Warsaw informed on 26.08.2016 that employees of a few bailiff's offices downloaded a few hundred thousand of records from PESEL database. The investigation is conducted by the Internal Security Agency. It is known that this practice lasted from March 2015. Even a few hundred thousand citizens can face the consequences of the data leak. They can be unaware of the fact that the problem concerns them. 


What data are in PESEL database? 

Data contain, among others, date and place of birth, citizenship, but above all the name and the surname, series and the number of ID, PESEL number, name of parents and the current place of the registered residence. <

Sunday 5 February 2017, Safety Guide

Dangerous virus on Facebook

Lost24

The virus attacks insidiously, we receive ordinary looking notification that somebody marked us in the comment. After the click on the notification, we are moved to the content which "was put in Google documents ". By clicking this link we download malicious software. 


The virus works as spider web and can send malicious software on Facebook through previously  recalled marking of the friend in the comment, by sending links in the chat or publishing posts with the link on the board. 


What are we threatened with?

The virus can encrypt our files on the hard disk. After the click on such a file, we will get the message that dat

Lost24

Have you heard about Shuabang campaigns, widespread in China? 


The Google company has a series of securities which enable to detect and block fake users of the Google Play Store. 


However, the Trojan creators  effectively bypassed this protection, on the level of devices which have access to administrator rights (root). Trojan is trying to impersonate the behaviour of the real user in the Play store. 


Trojan gets to the device such as smartphone or tablet through the Leech tool, giving rights to the user's device. Thanks to that, cybercriminals have access to our passwords or authorizing certifica

Sunday 5 February 2017, Safety Guide

Watch out for spoofing texts

Lost24

Swindlers impersonating the operator send texts informing about enabled service. If we text back we will lose significant amounts of money from our account. 


The text  informs of about enabled service with jokes, in order to disable the service, the swindler induces us to text back. If we text back, such text will cost us an arm and a leg- even up to the amount of about 80 PLN. 


We can also often receive a text encouraging to the participation in the contest. In the contents of the text  we also receive the information about the cost of the reply. It is often not a large sum, for example 1.22 PLN with VAT. However, at the end of the message th

Sunday 5 February 2017, Safety Guide

Swindlers impersonating PZU

Lost24

We have recently informed about swindlers impersonating ZUS (Social Insurance institution)or also PEKAO S.A. Bank


PZU warns its customers about false e-mail messages informing about alleged arrears for PZU. 


Like always, the contents of the message encourage the recipient to click the placed link to "invoices". 

Downloading and starting the file will cause the infection of our computer with malicious software. 


66.

Skimmer - the cover put on payment card slot in the ATM. 


At the end of May, the residents o

Sunday 5 February 2017, Safety Guide

SIM Card Registration

Lost24

The purpose of the Antiterrorist  act which entered into force on 25.07.2016, was increasing the safety of citizens, among others, by imposing on cellular phones network operators duty of assigning the pre-paid card to a given person or company. 


During the registration of the SIM card, the subscriber is required to give his name, surname, PESEL number, the series and the number of ID. The number can be registered to the person who turned  14, people under this age can register number to their legal guardian. 


According to the estimates shared by a mobile network operator, the necessity to disclose the personal data can concerns as many as 15 million Po

Sunday 5 February 2017, Safety Guide

Beware the fake Pokémon Go apps

Lost24

In United States there is absolute frenzy for the Pokemon Go game. 


Pokemon Go is officially available in Poland, in the Google Play Store and Apple App Store. 


https://www.youtube.com/watch?v=jOeZBW9Lwos 


But while downloading the game on our smartphone, we can be unpleasantly surprised. 

The ESET company warns about the false Pomekon Ultimate Go application which can entirely paralyse the work of our smartphone. 

After installing the application, it renames itself for the Network Pi at once. Starting the application causes blocking of the smartphone. We are for