πŸŽ… ✈️ πŸšƒ πŸš— How can friends and family can keep their online accounts secure during the holiday and travel season? This article does an outstanding job of explaining what really keeps accounts safe vs hacklore. πŸ™

https://www.thetimes.com/article/cfd5f639-db6b-41f1-a583-d9adbf64bea3?shareToken=39c1ba3cdbc6dd583aa58c3d628751b8

More info: https://www.hacklore.org/ πŸ”

πŸ“’ Spread the word! πŸ“’

The biggest myths about being hacked, debunked

An open letter by 80 cybersecurity experts challenges misconceptions and reveals what really matters

The Times

@boblord I kinda disagree about the QR codes and the NFC.

There is plenty of NFC-relaying malware for Android.

You mention yourself the "QR code in a parking lot" scenario but your advice is useless. "Examine the page carefully" doesn't work because the attacker will use an exact copy of a legitimate page. On mobile devices (which is what is usually used to scan QR codes) the URL and the domain part of it are not as easily visible as on a PC. And people tend to trust info posted on public places (like a parking lot) more than info received via e-mail spam anyway.

@bontchev Regarding NFC attacks, which make/model/versions are most vulnerable? Is this how a significant percentage of devices/accounts are compromised?

Regarding QR codes, there are many ways to get social engineered, so it's important to be skeptical regardless of the method of delivery. If there are documents that recommend UI improvements for the device makers, this is a great time to surface those.

@boblord Here's a good article about NFC relaying malware:

https://www.bleepingcomputer.com/news/security/massive-surge-of-nfc-relay-malware-steals-europeans-credit-cards/

Doesn't mention models - just that apps doing this were discovered. These attacks were very popular in China but didn't get much attention. However, they later spread in huge waves to Russia, Czechia, Poland, and so on. It's definitely a problem.

Regarding QR codes, there have been several cases when attackers slapped a QR code pointing to a phishing site over a legitimate QR code in a public place, like a parking meter:

https://www.cnbc.com/2025/07/27/cybersecurity-scams-quishing-qr-code-consumer-risks-hackers.html

Massive surge of NFC relay malware steals Europeans’ credit cards

Near-Field Communication (NFC) relay malware has grown massively popular in Eastern Europe, with researchers discovering over 760 malicious Android apps using the technique to steal people's payment card information in the past few months.

BleepingComputer

@bontchev Thanks for the link! I saw a similar article and it also focused on the malware and not which phones/devices were vulnerable. It's a common framing problem. We admire what the villains did right, and what the victims did wrong. We need to move the focus to the vendors and what they are doing about these problems, even if they are rare. It's odd that reporters never seem to call the manufacturers for comment.

I've seen several references to parking meter scams. Some of those stories seem hyped by security companies selling services and lack details, almost like they are repeating things they heard but don't have first-hand knowledge of. And that's also odd since it should be simple for law enforcement to partner with the credit card companies to understand who the criminals are and where the money went.
πŸ™

@boblord I agree that these threats are probably overhyped - the media loves talking about scary exotic stuff. What I'm saying is that these two threats are *not* non-existent - they really exist in the real world right now. That's why I said that I "kinda disagree" with listing them as mythical.
@boblord For instance, I don't disagree with the Bluetooth part. That was a *real* threat decades ago, when SymbianOS was the most popular mobile OS and viruses like Cabir were spreading like wildfire. But this is no longer the case. (Although I still always turn Bluetooth off - not for security reasons but in order to reduce energy consumption; I don't have devices like headphones that require the connection.)
BleepingComputer (@[email protected])

A 44-year-old man was sentenced to seven years and four months in prison for operating an "evil twin" WiFi network to steal the data of unsuspecting travelers at various airports across Australia. https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/

Infosec Exchange