Service receive & sending SMS

Hackers send malware by regular mail

1385   |     /   Security

Hackers send malware by regular mail
Sounds crazy right? Computer games veteran Brian Krebs claims that this happens quite often. Suspicious envelopes can be marked with mail from any country; these letters are often found in the mailboxes of state and local authorities.

We provide a virtual number for telegrams, the cheapest online numbers, and there is also a free test number.

Inside there is a rambling letter that seems to be meaningless as is a CD, or flash drives. It’s hard to say exactly what this letter is.

This is probably the point. Whoever collects these letters, he knows that entangling a person can help infect the system, because curiosity prevails. And curiosity is just that thing that can lead a person to insert this CD, or flash drive, into the computer, having no idea who sent it or why. Yes, people really do such things.

In fact, the letter itself may be carelessly printed, because the one who sends it by mail considers that it will not be read anyway. The mere presence of something that can get into the computer is enough to convince many people that they need to see the contents of this drive.

This is much more likely than you think. A study conducted in 2016 showed that 50% of people plug in a random USB drive that they find in a public place, without any fear.

According to Krebs, the disks received state archives, historical societies and the Department of Cultural Affairs of one state. At first glance, they may seem strange goals.

Hackers could look for a "back door" - hoping to infect a computer somewhere else. On the other hand, it could be an inexperienced ransomware attack aimed at a low level of security and secrecy.

Be that as it may, let's hope that no one inserts one of these drives into a government computer.

Similar news

The basis of the Internet is aging every day for 30 years

The Internet has changed the conduct of business. This is what is pretty clear these days. Now it’s as easy for businesses to find customers across the road as they are across the Pacific. Employees no longer need to be tied to their desktops, but can access and complete their work from anywhere in the world. Finally, companies have the opportunity to communicate with millions of customers at t...

Android Q have face recognition like Apple

It was reported that Google is developing built-in support for secure biometric authentication features similar to the Apple Face ID in the upcoming release of the Android Q operating system for smartphones. Writing on the XDA-Developers Portal, Mishal Rahman points out “dozens of lines and a lot of methods, classes and fields related to face recognition, SystemUI and APK settings” of the relea...

Routers can turn into cryptocurrency zombies

Somewhere there, a cybercriminal is stuffing his pockets with cryptocurrency. Whoever it is, he does not use powerful computers for mining. Instead, this man uses an ever-growing army of enslaved routers to do the dirty work.


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved