All About HackingBlackhat Hacking ToolsFree CoursesHacking

Your Best Hacker Defense … Revealed 2023

In this article we will learn about Your Best Hacker Defense.

Introduction about Your Best Hacker Defense:

I have a secret to avoid malware infection on your phone, desktops and laptops. It’s a strange secret! It works on all operating systems — Windows, Mac OS X, Android, iOS, GNU/Linux distributions, BSD/Unix distributions… you name it!

Make sure you sit down while reading because what you are about to read will shock you. Once you know the truth behind my secret, your life will never be the same!

We all depend on our phones, tablets, computers and servers for work and play. Although we can run software on these devices for certain purposes that do not require the Internet, what would we do without it? How you can share selfies on Instagram, watch cat videos on YouTube, watch porn on RedTube, tweet celebrities on Twitter, email your boss with Gmail, install apps from Google Play, fight trolls on Reddit, check grandma on Facebook, buy stuff , that you don’t need from Amazon, BitTorrent pirated movies and ass-kicking on Xbox Live without internet? you couldn’t! I guarantee it!

Viruses, trojans, spyware and other types of malware can infect your phone or computer and ruin your life! We’ve all had to deal with malware at some point. What a headache!

Did you know that most malware originates from the Internet? Yes, it’s a scientific fact. Viruses that can turn your computer into an expensive paperweight come from the same place as websites, email, and P2P file sharing. They come through your computer’s TCP/IP stack! Did you know that your phones and tablets are also computers? They are!

Blackhats love the internet as much as you do. It gives them a way to access your computers and do really bad things, whether they know you or not!

Blackhats do a lot of their bad stuff by creating malware and using the internet to put it on your favorite computing devices. Antivirus software should be on all your computers, from smartwatches to smartphones to laptops to supercomputers. Frequently updated antivirus software will prevent many malware infections… but not all!

I know the secret to avoiding many malware infections that antivirus software may or may not prevent.

I’m just an ordinary woman from Toronto, Canada. What I am about to say will shock you. Hackers hate me! Be careful who you share my 1 weird tip with because what I know is top secret!

Scroll down for more… Shhh!

My secret is… Healthy Skepticism™.

Healthy Skepticism™ is a powerful antivirus tool… Can you do it?!

If you don’t already have it, I’ll sell it to you in thirteen easy payments for just $6.66!

So how does it work?

Healthy skepticism can protect you from Trojan horses

In the information security world, a trojan is malware that tricks you into thinking you want it. You let it into your device because you enable it by lacking Healthy Skepticism™. If you’re reading this, chances are you’re a computer professional and you already know this. But do your friends know? Does your family have? Do your non-IT colleagues know?

If you share my 1 weird tip with them, they can prevent Trojan infection themselves! Then hackers will hate them too. Shhhhhh!

Trojan horses can take many different forms. They are so clever. They can appear as a banner ad on a website, an email attachment, fun free games and screensavers for your computer, a torrent for the hottest new Hollywood movie or pornographic movie, a pop-up or an app on the iOS App Store and Google Play Store. As trojans and social engineering techniques grow and evolve, the possibilities of trojans are limited only by the imagination of blackhats. So expect Trojans to appear in many new ways in the future.

Did you click on the actual 1 weird tip? Oops!

Blackhats can be very sneaky. Malware can be attached to almost any file type. Hyperlinks can direct malware to your computer by taking you to websites or applications that are designed to wreak havoc on your computer. The seemingly innocent things you see on your computer or phone can look so tempting, but they can be so deceiving.

Trojan horses require some action from the user, usually clicking on something or agreeing to download or install something. So they use social engineering to trick you. Does something sound too good to be true? It probably is!

As I tell you about my top-secret Healthy Skepticism™, I’ll share a few instances of mobile app Trojans. After that, I’ll share a few instances of banner ad trojans. Keep in mind that these are just two of the many different types of Trojans.

What you are about to read will shock you!

Mobile application trojans

Google and Apple are doing everything they can to prevent Trojans from entering their Google Play and App Stores. However, they often don’t know the app is Trojan malware until thousands of people have installed it. Healthy Skepticism™ works great to prevent infection from these Trojans, as well as all other types of Trojans. Here are some examples of horrific incidents that Healthy Skepticism™ could have prevented from happening to you.

Sexy girls

One particular mobile application trojan was discovered on January 22 by Nathan Collier of Malwarebytes. Titled Sexy Girls Wallpaper Gallery, it was available on the Google Play Store for Android from May 16, 2014, if not earlier. It has since been removed by Google.

If you were one of the unlucky ones missing Healthy Skepticism™ people who installed it on your phone or tablet, you would really enjoy the “sexy girls” wallpapers. But these lovely ladies have hidden a special surprise!

By using Android’s GET_ACCOUNTS permission and then the getAccountsByType() function, Sexy Girls emails your sensitive Facebook, Twitter, and Google account credentials to a remote server. Blackhats behind that remote server could use those credentials to log into your accounts without your knowledge.

About 50,000 to 100,000 people installed the Trojan on their Android devices. It is likely that many people were seriously injured by this abuse. Blacks could impersonate their victims. They can even use your Google Account to access your Google Wallet. Oh!

A little bit of computer literacy and Healthy Skepticism™ would make users look at all the unnecessary permissions that a seemingly simple wallpaper app asked for before they decided to install it. Why would an app need access to your identity just to show pretty women on your phone? Healthy Skepticism™ could also encourage you to read user reviews of an app before you decide to install it.

Reading Google Play Store user reviews is easy! When you’re in the Google Play Store, simply scroll down and read these reviews before you decide to scroll up and tap “Install.” If any of these reviews say something along the lines of “a spammer started using my Twitter account after I downloaded this stupid thing”, don’t click “Install”.

If user reviews don’t trigger your Healthy Skepticism™, you still have another chance to avoid a Trojan infection. After you tap “Install,” the Play Store will show you what permissions the app requires. Do they look suspicious based on what the app is supposed to do? Before Google Play will download and install the app on your phone, you must accept the app’s permissions, so use Healthy Skepticism™ and read them carefully!


Although many Trojans come from the Google Play Store, it’s even more likely that you’ll get a Trojan Android app outside of the Play Store.

In May 2014, Kaspersky Lab discovered an Android Trojan that many victims received via SMS, which Kaspersky calls Trojan-SMS.AndroidOS.Opfake.a.

This particular Trojan really tests Healthy Skepticism™ because the victim receives a text message from the device of someone they trust and actually exchanges text messages with them. But the victim’s friend, loved one, or colleague didn’t actually send the text from their device; The Trojan that infected their phone, yes. This text would insert the same trojan into the recipient’s device, which would then send the same trojan texts to their other SMS contacts. How meta!

Trojan-SMS.AndroidOS.Opfake.a also did other nasty things, such as replacing web browser bookmarks with links to malicious websites and spamming expensive toll numbers to cause huge financial costs to the victim. That money probably went to the blackhats… oh ha! There’s a motive!

Many excellent mobile antivirus apps, such as Lookout, display text messages for malware and warn you of potentially malicious texts. However, antivirus software is usually unable to prevent zero-day attacks because it usually depends on signatures.

Do you know what can prevent a zero-day? You guessed it! Healthy Skepticism™! Would your brother text you “Here’s a fun game, click here!” Probably not. If you don’t “click here” you will probably prevent infection.

Simply find it

Think mobile app trojans only affect Android users? If so, you really need Healthy Skepticism™.

In 2013, there was an app in the iOS App Store called Simply Find It. Offensively, you would have to spend $2.00 to install it on your iPhone.

Bitdefender discovered that the game contains what they identify as Trojan.JS.iframe.BKD. Simply Find It contained Payload/ The file day.mp3 contains iframe src=”” in its code.

There is absolutely no reason for a music file to contain a web hyperlink. A lot of cyber attacks come from URLs with the Chinese top-level domain .cn. Music files that contain hyperlinks trigger my Healthy Skepticism™.

When Bitdefender discovered the Trojan, other iOS antivirus apps didn’t catch it.

Web Trojans

Hackers will hate me even more if I share my top secret knowledge of a few of the many web trojans. You are ready?

DoubleClick Trojan

DoubleClick is a banner ad network that was purchased by Google in 2008. You’ve probably come across countless DoubleClick banner ads over the years.

In 2004, some DoubleClick banner ads were found to be malicious without DoubleClick’s knowledge. They installed Browser Helper Objects (BHOs) that exploited Internet Explorer vulnerabilities that existed at the time.

The banner code ran a series of exploit scripts that caused IE to install spyware. But like all Trojans, they needed user interaction – the user would have to click on the ad to get infected.

Related article:10 tips for Certified Ethical Hacker (CEH) exam success

Some of these ads led to malware that stole sensitive banking information, and others installed software keyloggers, which are a form of spyware.

I’m going to safely assume that some of these ads said things like “Congratulations! You are the 1 millionth visitor to this site! Click here to claim your prize!”

DoubleClick has done its best to remove trojans from blackhat advertisers. Now that they’re owned by Google, they’re probably better at preventing malware from being transmitted. But the risk is always there… So users need Healthy Skepticism™!

A real media trojan

Yahoo owns a banner ad network equivalent to Google’s DoubleClick, Right Media.

In 2007, the security firm ScanSafe found that some Right Media ads could run several million times on user’s computers.

They used Adobe Flash, and unlike the DoubleClick Trojan, victims didn’t even have to click on the ads to get infected. All they had to do was visit websites that had embedded Flash applets.

In response, Right Media said: “We have become aware of an advertising trojan horse introduced to the Right Media Exchange by a member network. The ad has been identified as a high-risk creative and is prohibited from being replaced. However, we cannot control what happens elsewhere on the network. We continue to improve our protection tools and are committed to finding ways to keep this type of activity out of reach of consumers and publishers.”

The identified trojan again exploited IE vulnerabilities.

Microsoft Silverlight Netflix Trojan

If you don’t think web Trojans are already a major threat, you need Healthy Skepticism™.

Silverlight is Microsoft’s equivalent of Flash for embedding dynamic content and applications into web pages.

Millions of Netflix customers use their services through their web browsers.

Last May, Cisco discovered that blackhats were exploiting the Netflix web app, which requires Silverlight for all web browsers on both Windows and Mac OS X. Blackhats infiltrated the AppNexus ad network to insert malicious ads between shows.

Clicking on one of these ads would launch a malicious website that would launch a quick download of the Angler exploit kit, which targeted vulnerabilities in all major web browsers. Then your computer would be under a black spell!

With Healthy Skepticism™, you can resist the urge to click on harmful ads.

Trojan horses come in many, many different forms, not just the trojan application and web trojan examples I cited. Trojan horses are malicious software and code that use social engineering to trick users into running them.

Healthy Skepticism™ not only prevents Trojan infection, but also all other forms of social engineering attacks.

If you already have Healthy Skepticism™, you may need to share this article with the people in your life who may need this super powerful antivirus tool.

But please don’t because hackers will hate you!

  • To the best of my knowledge, Healthy Skepticism™ is not an actual trademark.

** Please don’t send me thirteen easy payments of just $6.66 for Healthy Skepticism™.

*** You do not need to ask your doctor before using Healthy Skepticism™.

**** Healthy Skepticism™ comes with Satire Identification™ at no extra charge!

* I’m pretty sure Satire Identification™ isn’t a real trademark either.

No BS Detectors™ were harmed in the creation of this article.

* Therefore, I am almost absolutely certain, BS Detectors™ is also not a registered trademark.


‘Sexy Girls’ wallpaper app in Google Play Store accessed account info- Adam Greenberg, SC Magazine

Account Stealing Wallpaper App Found In Google Play Store- Nathan Collier, Malwarebytes Unpacked

Mobile Threat Monday: Android Trojan Turns Your Phone Into A Nasty Spam Factory- Max Eddy, PCMag

iOS app contains potential malware- Lex Friedman, MacWorld

Phishing Attacks Using Banner Ads to Spread Malware- Rich Miller, Netcraft

Yahoo’s Right Media had Trojans in banner ads- Elinor Mills, C|Net

Criminals Target Netflix Users Via Microsoft Flaws- Jill Scharr, Tom’s Guide

Leave a Reply

Your email address will not be published. Required fields are marked *