How Anyone Can DESTROY A Scam Website in Minutes šŸ˜¤ (Scammers Will HATE This)

Published: Mar 01, 2023 Duration: 00:19:45 Category: Science & Technology

Trending searches: what a phisher might get you to click
Intro Scammers are going to be furious at this video.Ā  I'm going to show you how just by yourself,Ā Ā  you can shut down scam and phishing websitesĀ  potentially within minutes. In this video,Ā Ā  I'll demonstrate using a real life scamĀ  phishing site that I found on TwitterĀ Ā  designed to steal Steam accounts.Ā  This website had been up for 10 daysĀ Ā  already and not a single antivirusĀ  security company had flagged it yet. But within minutes, I had it flagged by multipleĀ  security companies, within hours, nearly a dozen,Ā Ā  and within 24 hours, the website was completelyĀ  blocked by Google Chrome and Edge by default. AndĀ Ā  within two days, the domain registrar itselfĀ  had the domain name suspended and taken awayĀ Ā  from the scammers completely, which is why I'mĀ  not worried about showing the domain name here. Still though, don't go to it. You never knowĀ  in the future. So if you didn't think youĀ Ā  could make a difference as just one person,Ā  I'll show you how. All you need to do is knowĀ Ā  the various pages that security companies haveĀ  for submitting malicious websites and reportĀ Ā  them. And to be clear, I didn't use any kind ofĀ  special YouTuber connections to do any of this. I used the same exact public forms thatĀ  everyone else would, and within one day,Ā Ā  a scam site was shut down. SoĀ  as an overview for this video,Ā Ā  first I'll give you a quick explanation onĀ  how this particular scam website worked.Ā Ā  Then I'll show you how to report a maliciousĀ  URL to over 15 security companies using theirĀ Ā  pages for doing so, which will basicallyĀ  end up nuking the scam website from orbit. Then I'll give you the results for about howĀ  long it took each security company to startĀ Ā  flagging the scam site. So for this scam, it'sĀ  actually getting pretty common recently on Steam,Ā Ā  Today's Scam Example where you get a message from one ofĀ  your friends whose account has beenĀ Ā  hijacked though. And the scammerĀ  will ask you to go to a websiteĀ Ā  supposedly for some game tournamentĀ  and asks you to vote for their team. Again, still pretending to be your friend.Ā  But on that website, when you go to vote,Ā Ā  it prompts you to log in with yourĀ  Steam account. But it's a fake SteamĀ Ā  login window. And it looks prettyĀ  convincing. All the links on thisĀ Ā  window go to the real Steam site, but if youĀ  type in any credentials, it will steal them. I've actually seen a couple varietiesĀ  of this type of website. On this site,Ā Ā  it actually pops up a separate browser window,Ā  but the URL box just says "about:blank". OnĀ Ā  another site, it brought up an entireĀ  fake browser window. So this apparentĀ Ā  window with Steam as the URL showing isĀ  not even a separate browser window at all. Very tricky. Also apparently tricky is it willĀ  also steal your Steam Guard credentials. So IĀ Ā  just put in a fake login credential and it knewĀ  that the login was incorrect. So I wasn't aboutĀ Ā  to type in any real credentials, but I bet thatĀ  it was actually relaying the login and if itĀ Ā  saw that it was asking for Steam Guard,Ā  it would have just asked for that too. And by then it had your login and yourĀ  Steam Guard code. And I have to say,Ā Ā  as far as scam domain names go, fps league dot comĀ  actually seems pretty legit. Now obviously do notĀ Ā  go to this website. Right now it's down anyways,Ā  but you still don't want to knowingly visit aĀ Ā  potentially malicious site. As a pro tip, a lot ofĀ  scam websites use newly registered domain names. Pro Tip: Site Age They are not up for very long before they getĀ  caught and then they just go down. So a goodĀ Ā  way to tell if a site is kind of suspiciousĀ  is to look up that registration date usingĀ Ā  the so-called WHOIS registration data. If it'sĀ  a common domain extension like .com or.net,Ā Ā  you can go to lookup.ican.org andĀ  it will tell you the created date. If it's an extension that that siteĀ  doesn't work on, you can just GoogleĀ Ā  the top level domain extension like .ioĀ  and then "whois lookup" and you should beĀ Ā  able to find something from there. And I wouldĀ  actually recommend if possible that you justĀ Ā  automatically block newly registered domains ifĀ  you have some kind of service that allows that. Sometimes hardware firewalls use that,Ā  but one service I've been using recentlyĀ Ā  that I just found out about, and thisĀ  isn't sponsored or anything by the way,Ā Ā  but it's called NextDNS and itĀ  lets you add a bunch of filters,Ā Ā  including newly registered domains. I'm notĀ  going to get into how to do all that yourself. If you don't know how, maybe ask a friend who'sĀ  good with computers and they can probably helpĀ Ā  you. But I just wanted to mention it. I've beenĀ  using it for about a week and I like it so far.Ā Ā  Preparing to Report All right, so now let's get to how to actuallyĀ  report a malicious URL, assuming you come acrossĀ Ā  one. So what you want to probably do is open upĀ  notepad and copy over the URL so you have it. And also what you want to do is make aĀ  note - a description, that you'll submitĀ Ā  along with the report to describe what theĀ  scam is. So for example with this website,Ā Ā  I wrote a quick thing that says, "It is aĀ  Steam phishing site. If you click on a linkĀ Ā  such as sign in with Steam at the top, thenĀ  it will bring up a fake Steam login window." And something like that is detailed enough, justĀ  enough where if a human goes to review the site,Ā Ā  they'll know why you actually reported itĀ  as malicious and they'll be able to easilyĀ Ā  tell. If possible, you might also wantĀ  to take a screenshot of the scam part,Ā Ā  like the fake pop-up window or something. ThatĀ  can sometimes be included with the report. And remember if you are visitingĀ  a known scam website, open it inĀ Ā  a sandbox. Windows has a built-in sandboxĀ  now that you can open it with. You can alsoĀ Ā  use some kind of virtual machine. AndĀ  there's also some websites like Anyrun,Ā Ā  which you can use a virtual machine online. LikeĀ  you just type in the URL here and it'll give youĀ Ā  a quick 60 second virtual machine where you canĀ  actually navigate around the site, click on stuff. So you can get a quick screenshot throughĀ  that. Just you want to be sure you're safe.Ā Ā  Specific Sites for Reporting And now I can go through the individualĀ  pages for all the security websites,Ā Ā  how to report each one. I'm going toĀ  go through them pretty quickly becauseĀ Ā  there are several. And of course I willĀ  put all these links in the description. Google Safe Browsing Alright so the first big one you'll wantĀ  to report it to is Google Safe Browsing.Ā Ā  This will get the website blocked on Chrome.Ā  And all you have to do is put in the URL andĀ Ā  add a little note describing it. So I'llĀ  put that in that I showed you before. AndĀ Ā  if it doesn't get auto detected, that noteĀ  will of course help them review it manually. And then you just submit it. The other big oneĀ  you'll want to report it to is Microsoft and theirĀ Ā  Microsoft SmartScreen SmartScreen Filter. This will get it blockedĀ  on Edge and Windows and all that. Now you canĀ Ā  either log in with your Microsoft account or as aĀ  guest. I don't think it really makes a difference.Ā Ā  But either way, you'll just put in the URL andĀ  then choose phishing or the other one, dependingĀ Ā  on the website, and then fill out the CAPTCHAĀ  if you're not logged in and then hit submit. Unfortunately there is no notes sectionĀ  on this site. I'm not sure why that is,Ā Ā  but it is what it is. Also if you'reĀ  using an enterprise admin account,Ā Ā  you can go into the Microsoft 365 DefenderĀ  dashboard and you can submit a URL throughĀ Ā  that. And that does actually let you add a note,Ā  but you have to have like a business account. So most people won't be able to do that.Ā  Next, it's definitely worth trying toĀ Ā  Contact the Registrar report the domain to the registrar and cut itĀ  off at the source. Right in the WHOIS info,Ā Ā  there should be the registrar'sĀ  name and abuse contact email. IĀ Ā  emailed this one and basically saidĀ  the same thing as in my other notes. But when you do go to type theĀ  domain, don't do it like this.Ā Ā  Write it something like this withĀ  the dot spelled out or whatever,Ā Ā  because the first email I tried to sendĀ  got blocked by Gmail, because I guess theĀ Ā  domain was already flagged. So you want toĀ  write it out as not a link. In this case,Ā Ā  they actually just sent an email back saying thatĀ  I actually had to fill out a form on their site. So I did that instead. And about two days later, IĀ  noticed the registrar had set the name servers toĀ Ā  show that it was actually suspended. And thereĀ  were also some new domain statuses applied,Ā Ā  which corroborate that. Though not every registrarĀ  may show suspended name servers like this. Also,Ā Ā  not every registrar is very good at takingĀ  down sites, but it's still worth it. But usually I found after Google and MicrosoftĀ  start blocking the site that the scammers oftenĀ Ā  just shut the site down themselves anyway. NextĀ  up we have FortiGuard. And here you type in theĀ Ā  Fortiguard URL for the site and hit enter or the search icon.Ā  And you'll see that here it lists the category asĀ Ā  recently registered and a security risk group.Ā  But we want it flagged fully as phishing. So click request a review and then forĀ  suggest a category, choose "phishing" orĀ Ā  whatever the site is. And if you're able, takeĀ  a screenshot of the site or the malicious part,Ā Ā  like the fake login window. A lot of theseĀ  sites block scanners that are automatic. SoĀ Ā  you'll notice VirusTotal actually returned aĀ  404 because it must have somehow blocked it. So putting in a screenshot, a lotĀ  of times it will help with a manualĀ Ā  review. Then just put in your name andĀ  email, you'll get a notification on whatĀ Ā  they do. And then for "company", you canĀ  just put "self". And then for comment,Ā Ā  add that same note and then hit submit. And youĀ  should see a confirmation message at the top. Brightcloud Next we have BrightCloud. Just paste theĀ  site in the box that says "Look up URLĀ Ā  or IP" and then hit look up. The reputationĀ  will probably be uncategorized or suspiciousĀ Ā  because it's a new domain, but again we wantĀ  it fully flagged. So look on the left for theĀ Ā  "Request a Change" section. Put in the URL, thenĀ  click on "I would like to suggest a category." In this case we want "phishing or otherĀ  frauds." Then click done and then put inĀ Ā  your email and you can leave theĀ  product box empty. Then add yourĀ Ā  note and then submit. And then you shouldĀ  see a confirmation message. Next is CRDFĀ Ā  CRDF Threat Center Threat Lab Center. So at the top, hover overĀ  URLs and then click Submit Malicious URLs. This form is super basic. It just asks youĀ  for your email address and a list of URLs.Ā Ā  So don't put anything except links in here, noĀ  notes or anything. And then agree to the terms,Ā Ā  then submit the request and you'llĀ  see a confirmation number. Now I haveĀ Ā  found this website often on the firstĀ  attempt might not catch a scam site. I guess it's automated. So in my case, I gotĀ  an email about 30 minutes after submittingĀ Ā  it and it says no malicious sites were found.Ā  So what you'll want to do then is follow theĀ Ā  link in the email to the report that they giveĀ  you. And then next to the URL you submitted,Ā Ā  you can check the "misclassification" box andĀ  then click "Continue the reporting process." Then here, they finally do let you addĀ  an explanation in this box. So be sureĀ Ā  to put your note and that it has enoughĀ  details for when they manually review it,Ā Ā  then just hit submit and it'll say successfullyĀ  reported. In the two times I submitted a websiteĀ Ā  and they didn't catch it at first, I appealedĀ  and both times they then caught it after that. So you might have to do that. Next up weĀ  have Netcraft. So just put in the URL ofĀ Ā  Netcraft the site along with your email. And IĀ  actually forgot to do this, but be sureĀ Ā  to select "add further details" and then addĀ  your explanation. And then hit Report MaliciousĀ Ā  URL. Fortunately even without the details, itĀ  still caught it and flagged it automatically. But if they send you an emailĀ  that says no threats were found,Ā Ā  just hit "Check Results" and then on the left,Ā  click "Report An Issue". And then next to the URL,Ā Ā  select Misclassification and ideally uploadĀ  a screenshot for evidence. But then eitherĀ Ā  put the same note you did before or maybe addĀ  a more detailed one in the misclassificationĀ Ā  report reason, and then hit submit issueĀ  and they'll re-review it probably manually. And I did have to do this one time and they didĀ  catch it when re-reviewing it. As a cool side noteĀ Ā  for this website, they actually have a leaderboardĀ  for who submits the most malicious URLs the firstĀ Ā  time. And they even have some prizes ifĀ  you submit enough, which is kind of cool.Ā Ā  Palo Alto Networks Moving on for Palo Alto Networks on the "Test aĀ  Site" page, just put in the URL and hit search. And it may have a few categories alreadyĀ  like newly registered, high risk,Ā Ā  but nothing confirmed malicious or phishing.Ā  So click Request a Change, then put in yourĀ Ā  note and then find the proper category and selectĀ  it, put in your email and hit submit. For ESET,Ā Ā  ESET they have a "report a phishing page"Ā  form. So put in the URL, then the note. And it also asks you for the organizationĀ  being targeted. So in this case, the siteĀ Ā  is stealing Steam logins, so I put Steam.Ā  Also, some sites like this one may requireĀ Ā  you to add the HTTPS to the beginning of theĀ  URL. So just be aware of that and then hitĀ Ā  submit. And they don't ask you for email, soĀ  you won't get a notification if they flag it. Trend Micro For Trend Micro, you put the URL in the box thatĀ  says, "Is It safe?" And then hit Check Now. AndĀ Ā  here it just says untested and newly observedĀ  as the category. So hit Reclassify Request. AndĀ Ā  then here are two options. So just click theĀ  button under where it says "For Home Users",Ā Ā  etc. And then on this page for safety rating,Ā Ā  select the Dangerous option under content,Ā  select "suggest a different category." Then under Internet Security, choose phishing orĀ  whatever it is. Then you can just leave these twoĀ Ā  check boxes alone, but in the box for comments,Ā  add your note to explain it and then enterĀ Ā  email address and hit OK. Now hold on becauseĀ  there's one more step. For this one you need toĀ Ā  actually go to the email they send you and clickĀ  a confirmation link before they actually scan it. And also check your spam box. In my case,Ā  it was in there. So then once you go to theĀ Ā  confirmation link, it will actually submitĀ  for a scan. For Bitdefender on this page,Ā Ā  Bitdefender you'll want to scroll down to theĀ  submission form and then for category,Ā Ā  select False Negative. Then put in your name, yourĀ  email, in our case select URL and paste it in. Then for description as usual put theĀ  note and hit submit. And you should seeĀ Ā  a green confirmation message show up. ForĀ  McAfee, this page is for checking a singleĀ Ā  McAfee URL. This box will ask you what productĀ  you're using. Just select the Real-TimeĀ Ā  Database option. Here it's at the top. AndĀ  then put in the link and hit Check URL. You can see it says it's currently uncategorized.Ā  So down lower for Category 1, select Phishing andĀ Ā  you don't need to select all the categories, justĀ  one is fine. Then put in your note and hit submitĀ Ā  URL for review and it should show a confirmationĀ  page. For the company Forcepoint, in this boxĀ Ā  Forcepoint we put the URL. And I guess you can only reportĀ  five a day or something, but anyway hit analyze. Currently it says the threat level isĀ  low and is only classified as a newlyĀ Ā  registered website. So hit suggest a differentĀ  classification. In the suggest dropdown,Ā Ā  the phishing option is actually called "Security:Ā Ā  Phishing and Other Frauds". So select that thenĀ  put in your note. Then click submit and thereĀ Ā  doesn't seem to be any kind of confirmationĀ  message, but it still should have worked. For Symantec on their site review request page,Ā Ā  first put in the URL and thenĀ  hit check category. In this case,Ā Ā  Symantec it just says the URL has not been rated and letsĀ  you fill out a form. For "Filtering Service",Ā Ā  there are a bunch here. I wasn't even sure whichĀ  one, so I just picked Norton Safe Web, but I kindĀ Ā  of assume that they're going to propagate theĀ  malicious URLs to all their products anyway. For category, it's just Phishing and then put inĀ  your email address and then in the comment box,Ā Ā  your note and hit submit for review. To submitĀ  to Spam404, this one is very simple. Just putĀ Ā  in the URL and the explanation note and that'sĀ  it, hit submit. For Kaspersky on their ThreatĀ Ā  Spam404 Intelligence portal, go to the Lookup tab,Ā  then put in the URL and hit enter to search. Kaspersky We can see it is not categorized. So on the right,Ā  hit the submit to reanalyze button and here justĀ Ā  put in your email address and then it lets youĀ  put in a comment to explain. So then hit submitĀ Ā  and you should see a little confirmationĀ  message. Next up we have Cisco's TalosĀ Ā  Intelligence service. This one actually requiresĀ  signing up for a free account to report a URL,Ā Ā  Cisco Talos but it is actually probably worth it because CiscoĀ  is such a big company with so many customers. Anyway, on the reputation center page,Ā  you can put in a URL or even just an IPĀ Ā  and then hit the search icon. And here itĀ  says unknown reputation and no category,Ā Ā  but if you have an account, you can clickĀ  the buttons to submit a reputation orĀ Ā  categorization ticket. However, one thingĀ  to note is for the categorization option,Ā Ā  very strangely, there is no optionĀ  for phishing or malware or anything. It's just regular website categories,Ā  which I thought was weird. So insteadĀ Ā  what you have to do is go to the reputationĀ  change option and then in the dropdown here,Ā Ā  select "Suggest Threat Category", and thenĀ  it lets you select stuff like phishing andĀ Ā  malware. So do that and then you set the platformĀ  to Talos Intelligence, which is the only option. Then in the comments, put the usual note andĀ  click submit. Finally I want to mention thisĀ Ā  one called PhishTank. Now this wouldĀ  be a good one to submit to becauseĀ Ā  PhishTank it's used by so many other services. However,Ā Ā  they require a account to submit and for someĀ  reason they have registrations closed right now. So I guess just check back on this one, orĀ  if anyone knows a guy who knows a guy soĀ Ā  I can get an account, maybe just send me anĀ  email or DM me on Twitter or something. Oh,Ā Ā  and one final thing though, you canĀ  actually sign up for a VirusTotalĀ Ā  account and that will let you vote onĀ  a website and also leave a comment. VirusTotal Community So if anyone scans it, maybe even if it isn'tĀ  detected yet, they can still see your commentĀ Ā  about it. So now after reporting all of these,Ā  we can get into the results for what happened.Ā Ā  I'll show you the VirusTotal scan resultsĀ  and then I'll show you as accurate as I canĀ Ā  The Reporting Results the exact amount of time that each of theseĀ  security vendors took to actually flag it. So I re-scanned on VirusTotalĀ  after about an hour. And awesome,Ā Ā  there were already four vendors thatĀ  were flagging it. But surprisingly,Ā Ā  even though VirusTotal had Google Safe BrowsingĀ  showing it as clean, on the actual Google siteĀ Ā  to check a domain status, it does say it hadĀ  flagged it as unsafe and it was the same day. So I'm sure it was from when I submitted.Ā  And this was even the case six hours laterĀ Ā  and even the next day, VirusTotal isĀ  still saying it was clean. So good toĀ Ā  know that VirusTotal can be prettyĀ  delayed with some vendors. And doĀ Ā  realize that VirusTotal won't actually showĀ  the latest results unless you hit re-scan. You can see here that it'll say it wasĀ  scanned hours ago and it'll just showĀ Ā  you those results. Also if you doĀ  a scan and it flags something new,Ā Ā  be sure to also re-scan it on both the HTTPĀ  and HTTPS version of the URL. For some reason,Ā Ā  VirusTotal shows these as separate and you willĀ  want people to see the flagged results whetherĀ Ā  they look on the HTTP or HTTPS version. And theyĀ  might not know they have to actually re-scan it. After re-scanning a couple hours later,Ā  eight vendors were now flagging it. AndĀ Ā  after about six hours, 10 of them wereĀ  flagging it. Now I do want to mentionĀ Ā  something that I just learned, that evenĀ  if Google Safe Browsing flags a website,Ā Ā  which apparently it did very shortly afterĀ  I submitted it, it won't be blocked inĀ Ā  Google Chrome right away unless you haveĀ  Enhanced Protection on in the settings. I just had Standard Protection on and you'llĀ  notice it says "Chrome may send URLs" to SafeĀ Ā  Browsing and checks if the malicious URL isĀ  stored locally. But for enhanced protectionĀ Ā  it checks all URLs I guess. So you mightĀ  want to enable that. I will say however,Ā Ā  that by the next day within 24 hours, it wasĀ  blocking with standard protection by default. And also Microsoft Edge was blocking it withĀ  their smart screen. I'm not sure exactly howĀ Ā  long this took because I was asleep, butĀ  it was within 24 hours. But I will noteĀ Ā  that even though both Google and MicrosoftĀ  were blocking these, VirusTotal still wasĀ Ā  not showing them as being flagged when IĀ  re-scanned it, which was kind of weird. Anyway, I was doing my best to keep track ofĀ  exactly how long each security company wouldĀ Ā  Company Response Times take to flag it, whether by sending an emailĀ  or just showing up on VirusTotal. And hereĀ Ā  are the results. Though I will point out thatĀ  it seems that for this site, fortunately a lotĀ Ā  of the companies were able to automaticallyĀ  detect it, I guess with an automated scan. Other times it may take longer if it hadĀ  to be manually reviewed to confirm. SoĀ Ā  don't necessarily expect some of these instantĀ  results, but it could be. So now hopefully youĀ Ā  all are scam website destroying machines.Ā  And the next time you see a scam websiteĀ Ā  and it just fills you with rage, you canĀ  do something about it and take them down. Definitely give this video a big thumbsĀ  up if you enjoyed it. I put quite a bitĀ Ā  of testing and work into this one, so I'dĀ  really appreciate it. Also let me know downĀ Ā  in the comments if there's maybe other servicesĀ  that let you submit to it that I didn't mention,Ā Ā  that it would be good. Or you can let meĀ  know if you did this and it worked out. And if you want to subscribe, I try to makeĀ  videos about twice a week, Wednesday and Saturday,Ā Ā  so it should be worth it. If you want to keepĀ  watching, the next video I'd recommend is oneĀ Ā  where I was talking about some new scams thisĀ  year. So I'll put that link right here if youĀ Ā  want to click on it. So thanks so much forĀ  watching and I'll see you in the next one.

Share your thoughts

Related Transcripts

A Preliminary User Experience Evaluation Of MISP Work In Progress   Borce Stojkovski thumbnail
A Preliminary User Experience Evaluation Of MISP Work In Progress Borce Stojkovski

Category: Science & Technology

Morning for my side my name is takovski and it's a pleasure to present to you the preliminary work that we are working on mess with respect to disability and user experience this is joint work with my supervisor gabriela lancini and we are from the center for security reliability trust at the university... Read more

What Happens If You Click On Links In Phishing Emails? thumbnail
What Happens If You Click On Links In Phishing Emails?

Category: Howto & Style

Ages ago i made this video which was about phishing emails how to recognize them and what not to do specifically do not open attachments from them and do not click links in them i said i would follow up with the description of what happens if you do that it's taken me a really long time to get back... Read more

You Clicked a Phishing Link...NOW WHAT? (3 steps) thumbnail
You Clicked a Phishing Link...NOW WHAT? (3 steps)

Category: Science & Technology

You clicked a phishing link panic! i clicked on a phishing link...or did i? i can't tell. as these attacks get more sophisticated, sometimes it's hard to be a hundred percent sure. whether it's a link in a text message or a downloaded email attachment, the important thing is that you take action immediately.... Read more

The Resurgence of DDoS: Microsoft's Outage Highlights Persistent Cyber Threat thumbnail
The Resurgence of DDoS: Microsoft's Outage Highlights Persistent Cyber Threat

Category: News & Politics

The resurgence of ddos: microsoft's outage highlights persistent cyber threat the resurgence of dos microsoft's outage highlights persistent cyber threat by sator news in an era where cyber threats morph with the advancement of technology an old nemesis in the form of distributed denial of service dos... Read more

Microsoft, AT&T customers hit with outages thumbnail
Microsoft, AT&T customers hit with outages

Category: News & Politics

Hold on to your keyboards microsoft and at&t are experiencing major service disruptions today on the morning of september 12th users across the globe woke up to connectivity chaos microsoft teams has surged to over 4,000 reported outages by 9:00 a.m. eastern time a dramatic spike from fewer than 300... Read more

What If 5 SPIDER-MAN & JOKER in 1 HOUSE? JOKER Become KID SPIDER MAN?? Fake & Real Spider-man+ MORE thumbnail
What If 5 SPIDER-MAN & JOKER in 1 HOUSE? JOKER Become KID SPIDER MAN?? Fake & Real Spider-man+ MORE

Category: People & Blogs

Stop it huh [music] [music] [music] huh lollipop [music] hello hello there [music] no woo w [music] huh nope [music] [music] wow damn [music] [music] [music] sp for you thank you hey play for bo [music] hi [music] hi ready what [music] happened mommy [music] tr to f daddy hey what happened daddy he... Read more

'Digital battlefield': Embattled app Telegram offers academics 'incredible insight' into conflicts thumbnail
'Digital battlefield': Embattled app Telegram offers academics 'incredible insight' into conflicts

Category: News & Politics

Well there are more questions than answers at the stage about the arrest of dv and to shed some light on this story i'm pleased to be joined on the program now by dr melanie garon she works on cyber policy at the tony blair institute for global change and at university college london good afternoon... Read more

Saturday Security NPD Breach Update: Credentials at Risk with a Clear Text Catastrophe thumbnail
Saturday Security NPD Breach Update: Credentials at Risk with a Clear Text Catastrophe

Category: Science & Technology

We got an update on last week's national public data breach you can check out that video right down below so if you remember there was reported that 2.9 million social security numbers were pilfered from the npd database npd has now publicly confirmed that a number of records were stolen but they're... Read more

Real men test in productionā€¦ The truth about the CrowdStrike disaster thumbnail
Real men test in productionā€¦ The truth about the CrowdStrike disaster

Category: Science & Technology

Last friday the world finally got the y2k experience it deserved when millions of windows machines went down thanks to a bad update from cyber security firm crowd strike 8.5 million to be exact but now the plot is thickened and multiple theories for why this actually happened have emerged a was it just... Read more

NBC coverage of Brittany Mahomes slammed after Donald Trump endorsement thumbnail
NBC coverage of Brittany Mahomes slammed after Donald Trump endorsement

Category: News & Politics

Nbc coverage of britney mahomes slammed after donald trump endorsement nbc's coverage of britney mahomes during the kansas city chief's nfl opener has been slammed after she endorsed donald trump nbc's coverage of britney mahomes during the kansas city chief's nfl opener has been slammed following her... Read more

First wave of Jamaican security personnel headed to Haiti ā€¢ FRANCE 24 English thumbnail
First wave of Jamaican security personnel headed to Haiti ā€¢ FRANCE 24 English

Category: News & Politics

Six months after pledging support to the kenyan le mission in haiti jamaica is sending a first wave of troops the jamaican president announced that only 24 military and police personnel would land in haiti on thursday and lay the groundwork for further deployments haiti is the example of what could... Read more

2024 USA #Tourist Report Pennsylvania(ķŽœģ‹¤ė² ė‹ˆģ•„ģ£¼)ā˜šŸ»More details are provided in the full video #ģ§€ģ‹ģ•Œź·„ė¦¬ thumbnail
2024 USA #Tourist Report Pennsylvania(ķŽœģ‹¤ė² ė‹ˆģ•„ģ£¼)ā˜šŸ»More details are provided in the full video #ģ§€ģ‹ģ•Œź·„ė¦¬

Category: Howto & Style

ėÆøźµ­ ģ£¼ė³„ ź“€ź“‘ź° ķŽœģ‹¤ė² ė‹ˆģ•„ģ£¼ ģ—­ģ‚¬ģ™€ ģžģ—°ģ˜ ģ”°ķ™” ėÆøźµ­ ė¶ ė™ė¶€ģ— ģœ„ģ¹˜ķ•œ ģ£¼ė”œ ķ’ė¶€ķ•œ ģ—­ģ‚¬ģ™€ ė‹¤ģ–‘ķ•œ ģžģ—° ķ™˜ź²½ģ„ ģžėž‘ķ•©ė‹ˆė‹¤ ėÆøźµ­ ė…ė¦½ źø°ė…ź“€ ģžģœ ģ˜ ģ¢… ė“± ėÆøźµ­ ģ—­ģ‚¬ģ˜ ģ¤‘ģš”ķ•œ ģœ ģ ģ§€ė„¼ ė³“ģœ ķ•˜ź³  ģžˆģŠµė‹ˆė‹¤ ķ”¼ģø ė²„ź·øėŠ” ģ² ź°• ģ‚°ģ—…ģ˜ ģ¤‘ģ‹¬ģ§€ė”œģ„œ ģ‚°ģ—… ģ—­ģ‚¬ė„¼ ėŠė‚„ ģˆ˜ ģžˆėŠ” ė„ģ‹œģž…ė‹ˆė‹¤ ģ½”ģ½”ė…ø ģ‚°ė§„ ėøė¼ģ›Øģ–“ ź°• ė“± ģ•„ė¦„ė‹¤ģš“ ģžģ—°ģ„ ģžėž‘ķ•˜ė©° ķ•˜ģ“ķ‚¹ ģŗ ķ•‘ ė‚šģ‹œ ė“± ė‹¤ģ–‘ķ•œ ģ•¼ģ™ø ķ™œė™ģ„ ģ¦źøø ģˆ˜ ģžˆģŠµė‹ˆė‹¤ ė¶ ė™ė¶€ģ—ėŠ” ģ•„ėÆø ģ‹œ ģ‚¬ėžŒė“¤ģ“ ģ§‘ė‹Ø ź±°ģ£¼ķ•˜ė©° ė…ķŠ¹ķ•œ ė¬øķ™”ė„¼ ģœ ģ§€ķ•˜ź³  ģžˆģŠµė‹ˆė‹¤ ķ•„ė¼ėøķ”¼ģ•„ėŠ” ėÆøźµ­ ė…ė¦½ģ˜ ė°œģƒģ§€ė”œ ė‹¤ģ–‘ķ•œ ģ—­ģ‚¬ ģœ ģ ģ§€ģ™€ ė°•ė¬¼ź“€ģ“ ģžˆģŠµė‹ˆė‹¤... Read more