Do you know what happens if you connect to the hotspot of unknown origin? 

It was proven that using the touch screen in the phone disturbs the wi-fi signal and it can be used for watching what we type. For example, a PIN code in our bank application. 

Controlled attack on 3 types of mobile phones in order to get the PIN number in the popular Alipay payment system which in 2015 had as many as 900 million users. 

The test was supposed to prove that using the touch screen in the mobile phone disturbs the wi-fi signal which can lead to intercepting what we type by third parties. 


Friday 3 February 2017, Safety Guide

Hacking Attacks - Dyn company


As a result of the attack by hackers against the Dyn company which  manages the servers of many popular services, Internet users had a big deal of a problem. Two days ago probably many of you could not log onto Twitter or also watch favourite series on Netflix. Popular services as Twitter, Netflix, Reddit, the PayPal or Playstation Network fell victim of the attack on the DNS system thanks to which we can open a website. The attack consisted in bombing servers with enquiries with the use of bots, as a  result all free sources were used up. 

Dyn company restored functioning of attacked servers after a few hours but  it also warns that a consecutive phase of the attack takes place. 

Friday 3 February 2017, Safety Guide

Stolen/lost ID - what to do?


Remember that the stolen/lost ID can be used for extorting the loan or cash credit, as well as to hire-purchase. 

How to react when we lose documents? 

- in case of the theft of the document we have to notify the police, there we will get a document confirming that we reported the theft.

The document will have to be presented at the commune office. 

- we notify the closest organ of the commune or the consular institution, when we are outside of the borders of our country. At the office we will get a document confirming the loss of the ID and we will be obligated to form a new one. 

Friday 3 February 2017, Safety Guide

USB Killer 2.0. killer PenDrive


Everyone realizes that with the portable memory the computer can be infected but can flashdisk physically damage our machine? 

Carrying out the unusual project which tries to draw attention to the low awareness of motherboards producers or entire computer units, provokes controversies. The creators want to make us aware of dangers the USB port itself. That is why, they created USB Killer 2.0 which will damage our computer literally within seconds. The cost of such a device is almost 50 euros. 

How does the killer PenDrive work? 

While  connecting the pendrive to the USB port, the device starts charging cond

Friday 3 February 2017, Safety Guide

Damage caused by malware


Malware campaign was disclosed , by using the gaps in store software, the malicious javascript code "was injected" to subpages of the shop. 

Among victims was one of American shops of Republican party which volume of visitors estimates to 350 000 visits monthly and data of credit cards of customers was transmitted to Russia. The profit of criminals is estimated for about 600 000 dollars. 

According to the sekurak portal almost 6 thousand shops are skimmed for a lot of months, there are also domains from Poland. 

Trekker Sport shop, which was also affected by this problem, conducted the analysis in the testing environment. Basing on th

Friday 3 February 2017, Safety Guide

Stealing ID


To take loan without our knowledge is often associated with stealing ID. We wrote numerous times about the theft of the identity and about consequences it can bring about. 

However, the example which we want to present is completely different. 

Ten instalments of about 180 PLN, so much was seen on falsified forms from the bank which were received by an elderly man from Elbląg. On the falsified letter from the bank everything seemed to be in perfect order i.e. the surname or the place of residence, but the man did not take any loan and also he did not hire-purchase anything. 


Since the beginning of April 2016 the government program "Family 500 +" has started. From the first day,  over 100 thousand applications for social benefits were filed. However, the people who decide to file an application through the Internet should be very cautious not to be deceived. 

Police warns against swindlers who create false websites, in order to extort money or also our personal data such as PESEL number or the place of residence. 

Remember that while filing an application to the "Family 500 +" program we do not have to make any extra payments. We remind about


IPhone owners unknowingly called the police by clicking one link.

Pay attention to what you click. 

Unaware iPhone users rang the police not just more than once but as many as 19 times! 

How did it happen? 

Everything happened due to the fake link made available on Twitter, by the American teenager. 

The error in iOS which made use of JavaScript forced the system to connect to number 911 along with redialling. After 19 attempts to call the police from the given number, the police called back to ask why somebody call

Friday 3 February 2017, Safety Guide

Shazam eavesdrops Apple users


The Motherboard portal informs that the application for recognizing music tracks Shazam eavesdrops Apple users. 

What does eavesdropping users of the application consist in the computer version? 

The application works in the background all the time and listens closely to users by the microphone, because it never shuts down completely.

Recordings collected by the application are not used in any way but doesn't it  violate of our privacy? 

The company explains that this an intentional action of the application to make it run faster. If the microphone was not on, it would cause the longer ini

Friday 3 February 2017, Safety Guide

The ingeniousness has no limits


We would like to  present the new series of entries concerning the most daring and surprising thefts. 

Today the ingeniousness of Russian thieves. 

How many times we heard about the attempt of ATM theft under the cover of the night, by simply  ripping it out of the wall or using explosives ? In Russia the thieves decided not to tire out and steal the standalone ATM in one of hypermarkets. To do this, they made use of a cart designed to transport furniture. 

In Wołgograd county, two men who stole 1.3 thousand of beer bottles were stopped. What is interesting within one day, along with friends, they

Friday 3 February 2017, Safety Guide

The ingeniousness of smugglers


Nothing will probably surprise the Border Guard, the ingeniousness of smugglers from year to year is more and more surprising. 

Today from the series called the ingeniousness has no limits  - smugglers 

Cigarettes and alcohol are most often smuggled goods. The Border Guard is one of the most modern Polish uniformed forces. It being equipped with more and more state-of-the-art equipment i.e. fingerprints readers, cordless optical passports readers, night vision devices or drones, let alone a portable X-ray scanners. 

Have you ever wondered how many packets of cigarettes can be hidden inside the door?

Officers of the Bo

Friday 3 February 2017, Safety Guide

Cybercriminals - e-mail attacks


Another  attack by cybercriminals on customers of the mobile phones network - Play.


This time the cybercriminals are trying to infect our electronic equipment. The e-mail is sent to our postbox with the counterfeit invoice, after downloading the attachment we also download a virus "Trojan-Downloader.JS.Agent". The virus can download the ransomware software, encrypting victim's personal data to  extort money. 

There is a list of advice at PLAY website on how to recognize the real invoice.

In this case, the first thin


The autumn-winter period is particularly dangerous to pedestrians and cyclists. Difficult weather conditions or early dusk cause the above mentioned groups to be often invisible for other road users. 

Pedestrians and cyclists constitute the group that has the highest danger of  participation in road accidents which is confirmed by police statistics. Therefore, increasing the visibility on the road outside the built-up area is so important. We are talking about reflectors here. 

Interesting research was conducted at two universities in Australia and the USA. It was checked how drivers see pedestrians at night depending on the age of the driver or also a type of p


Do you remember our article concerning stealing money from bank accounts? 

We mentioned that the most popular method of hackers to steal money from accounts is sending to the mail address of bank client false information e.g. information about blocking the  account and in order to unblock it, it  will be sufficient to click the link and log on. By logging onto the false website of the bank the client unknowingly shares his login name and password. 

Recently one of partners of the lost24 portal has received an e-mail message from the sender who impersonated the Polish post office. The -mail included information about the unclaimed parcel. The sender thre

Wednesday 1 February 2017, Safety Guide

Victims of the pickpocket


Crowd, absent-mindedness, too great confidence ..... a moment's distraction can be enough to become the victim of the pickpocket. Every year in large urban agglomerations as many as a dozen or so thousand victims report this kind of theft to the police. 

Police emphasize that in terms of pickpockets, the detectability is just a few per cent at maximum. In case of such a theft, it is extremely difficult to prove anything to the perpetrator, if we do not catch him red-handed. 

For the thief, a crowded street, a hypermarket or a public transport are the perfect places, not mentioning mass events or bus and train stations. 

A perfect victim is an o