Random Question About Botnets and DDOS

From what I understand: ​ Wouldn’t it be possible for a malicious hacker to get player IPs from a video game company’s servers and use them to create a botnet and DDOS giant organizations? I would feel like there’s at

Should i drop out of college

Hello Everyone, I’m currently second year computer science, I’ve seen many of you guys recommending cyber security certificates so i tried with the CompTIA sec+ online quizzes and i got a decent score. Also i kinda feel like I’m getting

Is there any good reason my retirement account site would be connecting to surfly?

When I click on two different links in my dashboard on the investment site the status bar of my firefox browser says “Read surfly.com”. One of the links actually goes somewhere and the message about surfly stays up – the

Chances of this being legit?

Hello everyone! Yesterday Mongolia’s news outlets started reporting about Mongolian people’s information being sold on raidforums, it was titled “Mongolia Marketing Database” and it is said to be containing around 2’300’000 unique people’s personal infos (Full name, Phone, Email, Home

If an ACL is configured to block incoming ICMP traffic but allow outgoing traffic such as ICMP echo messages, would it be possible to spoof the return information and bypass the ACL entirely?

This is probably a stupid question and I’m only in my first semester of an accelerated program so I apologize if what I’m asking seems obvious. This chapter, we are learning about ACLs and in the reading it says: “Several

USB tethering ran some background processes

I used an old android device to try and make my computer connect to the internet since I don’t have a wifi adapter. I used USB tethering and it worked but things kinda seemed slow. So I checked task manager

Hackers Targeted Apple Devices in Hong Kong for Widespread Attack

Hackers Targeted Apple Devices in Hong Kong for Widespread Attack

I get these notifications when I don’t send audio messages in chat. What does it mean? Am I hacked?

I get these notifications when I don’t send audio messages in chat. What does it mean? Am I hacked?

Cyber Security Career Questions Survey

Hey there! I’m currently going to school for cyber security and in one of my classes I’m in right now, we have to write a business report. I’m gathering information from current Cyber Security professionals and was wondering if you

Google Caught Hackers Using a Mac Zero-Day Against Hong Kong Users

Google Caught Hackers Using a Mac Zero-Day Against Hong Kong Users

Any good virus/malware scanners for iOS that are free and legit?

Title is another placeholder, most if not all probably require a subscription, but I thought I’d ask on this sub to see if there are any free ones that work or ones that don’t cost as much. If not, just

“freeaddon.com” PUP

[Repost of [my submission](https://www.reddit.com/r/computerviruses/comments/qs0yzy/freeaddoncom_pup/) in r/computerviruses] My antivirus Malwarebytes marked an extension I use as a PUP. The extension, which comes from the Chrome Web Store and is provided by a site called “freeaddon,” is nothing more than a wallpaper

Linux distributions

Hi! There is many Linux distributions. Which is mostly security people using in work and pentesting and which is more efficient and user friendly? Can you guys describe?

Virus may be hiding in my pc

So long story short I left home for a couple hours with my pc left on. It had been on overnight the day before too so it had been on for a while with no issues. After I came back

guidance needed

hi all, I have 6 years of experience, I have worked in operations (transfer agency) as hard core operations guy for almost year but then moved into process mapping, time and motion studies and risk reporting and resolution for 2.5