অর্ঘ্য 🏏 📚 💻
banner
stringsvsatoms.bsky.social
অর্ঘ্য 🏏 📚 💻
@stringsvsatoms.bsky.social

🌏 " वसुधैव कुटुम्बकम् " - " The World Is One Family " 🌍

Connect Securely 🔐 --> threema.id/XENJFKT6
Over the past few years, cases of digital arrest fraud, phishing, impersonation scams, and more have sharply increased.
5/5
November 22, 2025 at 4:51 PM
Google has launched this new real -time scam detection feature at a time when online and phone-based fraud has become one of the country’s biggest consumer threats, particularly for children, teens, and elderly users who are routinely targeted by scammers.
4/5
November 22, 2025 at 4:51 PM
The new feature was announced today at the company’s ‘Safe and Trusted AI’ event, addressing growing concerns over fraudulent phone activity targeting individuals across India.
3/5
November 22, 2025 at 4:51 PM
The feature is aimed at protecting users from the growing menace of scam calls in the country and helping them spot suspicious conversations before they fall victim.
2/5
November 22, 2025 at 4:51 PM
This malware shows that encryption 🔐 is only as strong as the device it runs on. A fully compromised endpoint can defeat even the strongest E2EE.

Look where mobile malware are heading towards. Yet smartphone users are reluctantly casual about end point security.
10/10
November 21, 2025 at 11:00 AM
📱Review Admin Rights: Regularly check which apps have "Device Administrator" privileges and revoke any that are unnecessary or suspicious.

9/10
November 21, 2025 at 11:00 AM
⚓ Inspect Permissions: Be extremely cautious granting apps Accessibility Service permissions, especially if the app is not a dedicated accessibility tool. This is the primary vector for Sturnus's screen monitoring and chat theft.
8/10
November 21, 2025 at 11:00 AM
🛡️ Defensive Action:

Avoid Sideloading: Only download apps from the official Google Play Store. Sturnus is currently distributed via malicious apps like "Google Chrome" and "Preemix Box."
7/10
November 21, 2025 at 11:00 AM
⚡Unstoppable: It actively monitors user actions and, if the user navigates to settings screens that could disable its administrative rights, the malware automatically navigates away to prevent its removal.

6/10
November 21, 2025 at 11:00 AM
👻 Stealth and Persistence Tactics
Fake Update Screen: To conceal malicious actions, Sturnus displays a full-screen overlay that mimics an Android OS update screen, blocking visual feedback while the trojan works in the background.
5/10
November 21, 2025 at 11:00 AM
📊 Impact: Attackers can read private conversations, steal banking credentials via overlay attacks (fake login screens), and perform full device takeover via Virtual Network Computing (VNC).

Targets: Financial institutions across Southern and Central Europe.
4/10
November 21, 2025 at 11:00 AM
Instead, it uses Android's accessibility and display-capture services to record the screen and capture UI interactions after the messages are decrypted and displayed to the user.
3/10
November 21, 2025 at 10:59 AM
💥 The Threat Breakdown: Screen Capture After Decryption
The Spyware: Sturnus is a sophisticated banking trojan that uses a unique tactic to defeat End-to-End Encryption (E2EE).

How it Works: It doesn't crack the encryption key.
2/10
November 21, 2025 at 10:59 AM
In this video, I'll break down what Autonomi actually is: an autonomous network that turns everyday devices into the world's largest decentralized storage system. No servers. No monthly subscriptions. No Big Tech middleman. Just you and your data.
3/3
November 20, 2025 at 10:34 AM
What if we could combine all that wasted capacity into one giant, encrypted hard drive that anyone could use? That's exactly what Autonomi is. And it's not science fiction. It's live, it's real, and it's changing how we think about the internet.
2/3
November 20, 2025 at 10:34 AM
Digital breaches on infrastructure (shipping, utilities, defense) are now pre-attack intelligence platforms designed to enable destruction, not just theft.

This represents a fundamental evolution in warfare for critical global commerce and military logistics.
7/7
November 20, 2025 at 10:07 AM
This real-time visual intel was used to assess where missiles hit and improve precision during widespread missile attacks against the city.

⚠️ Why It Matters:

The line between digital espionage and physical warfare has officially dissolved.

x.com/joellatto/stat...
6/7
November 20, 2025 at 10:07 AM