Site search

Search results: «scam»

Found matches: 4

BLOCK WHATSAPP PHOTOS FROM APPEARING IN GALLERY

Pictures that you receive on WhatsApp are automatically stored in your phone’s Gallery, exposing them to anyone who browses photos on your phone. In iPhone, you can go into the phone’s Settings menu, then tap ‘Privacy’, ‘Photos’, and deselect WhatsApp which will restrict this.
For Android users it’s a little bit complicated.Using a file explorer app such as ES File Explorer, you can find WhatsApp’s ‘Images’ and ‘Videos’ folders and create a file within each called ‘.nomedia’. This will stop Android Gallery app from scanning the folder.

RESTRICT ACCESS TO PROFILE PICTURE
Set...
“Hacking doesn’t break the locks now... He dressed up as a security guard. "

Even if the file looks secure... Windows doesn't warn you.. You can get the virus.

Hackers are now sending out fake meeting invitations to Zoom and Microsoft Teams with malicious files attached.

What’s the trick ? This file is documented with a stolen or hijacked digital signature.

*Windows will look at it as reliable
*No warning may come up
*Some protection programs can be allowed to pass

Simply: A hacker wears a true security certificate.

You are getting:
"Urgent meeting of the Board of Directors." ”...
iPhones are under mass attack, with Chinese scammers, Russian spies, and other cybercriminals using government-grade iOS exploit kits.
#cybersecurity #iPhone #scam
🔐 Threat actors tied to Russian intelligence are running phishing campaigns to hijack accounts on commercial messaging apps like WhatsApp and Signal. The attacks focus on high-value targets such as government officials, military personnel, politicians, and journalists, with thousands of accounts already compromised.

📩 The scheme relies on social engineering, not technical flaws. Victims receive messages creating a false sense of urgency, often warning of suspicious login attempts. They are tricked into clicking malicious links, scanning QR codes, or sharing verification codes and PINs.

⚠️ If a victim shares their code, attackers can take over the account and impersonate them,...