Fake DDoS services set up to trap cybercriminals

0
[ad_1]

The British National Crime Agency has been setting up fake DDoS services to teach people a lesson in what not to do online.

The “online criminal marketplace” has been disrupted via several fake Distributed Denial of Service (DDoS) tools, according to an announcement from The British National Crime Agency (NCA). 

Not everyone on an underground forum is up to no good. Some folks register on hacking sites and services out of curiosity. It’s not uncommon for people to register on a breach forum to check if their own data is included in whatever latest disaster is unfolding in the news. Even so, certain types of service exist which are most definitely going to get users in some form of trouble no matter the supposed intention.

This is the case with DDoS tools. A DDoS attack occurs when someone decides to effectively flood a service or site with more traffic than it can handle. The site becomes overloaded, and can no longer function correctly which leads to downtime.

It can happen to websites and gaming services, and even individual gamers in some sessions have been targeted and taken down. Paid for DDoS tools have been around for many years, and are a very popular service for people who want to quickly perform a DDoS attack without much legwork.

However, attacks like these are illegal in the UK under the Computer Misuse Act 1990. And, as it turns out, the focal point for the NCA’s participation in a worldwide operation designed to disrupt and panic criminal elements.

Registering for a very bad day

From the NCA’s announcement:

DDoS-for-hire or ‘booter’ services allow users to set up accounts and order DDoS attacks in a matter of minutes. Such attacks have the potential to cause significant harm to businesses and critical national infrastructure, and often prevent people from accessing essential public services.

All of the NCA-run sites, which have so far been accessed by around several thousand people, have been created to look like they offer the tools and services that enable cyber criminals to execute these attacks.

Once an individual registers on the fake sites, they’re not given access to DDoS tools as they may have expected. Instead, their data is collected by the NCA. For anyone registered living in the United Kingdom, they can expect to be contacted by the NCA at a later date and given a warning about the consequences of engaging in cybercrime. Individuals outside the UK will find that their details are passed to international law enforcement.

Powering up Operation Power Off

This is all a continuation of a project called Operation Power Off, which has been running for some years now. DDoS tools are a big focus for these operations, as they’re one of many gateway entry points into the world of illegal activity.

Back in December, this same project was responsible for 48 major booter services being taken offline permanently alongside multiple arrests in the UK and US. As the NCA points out, this kind of activity helps to undermine trust in the criminal market and also makes such sites feel quite a bit less safe and anonymous. You can never really trust an underground marketplace, and that’s before you throw the spectre of law enforcement into the mix.

Indeed, a well known forum for trading stolen data recently shut down for precisely that reason. If you’re at all curious about signing up for rogue services, take the safer option. Close that browser tab, and have a good read of the oft-linked NCA Cyber Choices page. Parents, teachers, and children of all ages can see what the risks are, how someone could get into trouble, and why it’s better to put digital talents to use in favour of something more productive.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

March update rolling out to Samsung’s Galaxy Tab S6

0
[ad_1]

Samsung‘s four-year-old flagship Android tablet, the Galaxy Tab S6, is getting the latest security patch. The Korean firm is pushing the March 2023 security update to the device in Europe. A global rollout should follow in the coming days.

The Galaxy Tab S6 joins Samsung’s March update party

As of this writing, the March SMR (Security Maintenance Release) is available for the LTE version of the Galaxy Tab S6 in Europe. To be precise, only users in Germany are getting it currently. Samsung should soon release the update widely in the region, followed by a global rollout. The new firmware build number for the tablet is T865XXU5DWC3 (via SamMobile). The Wi-Fi version of the device should get the update with a slightly different build number, though the content should be the same.

When we say content, don’t be hopeful for new features. The firmware version suggests this update brings something more than just vulnerability fixes, but we are only expecting some optimizations. The Galaxy Tab S6 is way past its prime and no longer eligible for features updates. It will get a few more security updates and that’s about it. Unfortunately, Samsung hasn’t updated its update tracker to reflect the latest release, so we can’t confirm what else the tablet is getting today.

However, we already know that the March SMR patches more than 60 vulnerabilities. The majority of those are Android OS patches coming from Google and other partners. At least five patches supplied by Google this month concern critical vulnerabilities. The 20-odd Galaxy-specific patches take care of issues with the Exynos baseband, Bluetooth, Galaxy Themes Service, System UI, Settings, Call app, and other system components.

If you’re using the Galaxy Tab S6, you can look forward to receiving the March security update in the coming days. You can navigate to the Software update menu in the Settings app and tap on Download and install to check for updates manually. If you’re planning to upgrade your aging Galaxy tablet, Samsung is readying the Galaxy Tab S9 series for launch in the second half of 2023.

The Galaxy Tab S9 series will include three models

When Samsung launched the Galaxy Tab S6 in 2019, it only offered one model. It later added the Galaxy Tab S6 Lite, but that isn’t a flagship tablet. In 2020, the Korean firm debuted two Galaxy Tab S7 models, with the Galaxy Tab S7 FE following in 2021. Last year, it launched three Galaxy Tab S8 models, including its first-ever Ultra tablet. The company will do the same this year. The Galaxy Tab S9, Galaxy Tab S9+, and Galaxy Tab S9 Ultra are expected to arrive in August or September 2023. We will keep you posted with the latest information about these tablets.


[ad_2]
Source link

Newegg is integrating ChatGPT to enhance its shopping experience

0
[ad_1]

It’s no secret that the launch of ChatGPT has ushered in a new era of conversational artificial intelligence, prompting many companies to explore the possibilities of integrating AI into their services. Now, according to a report from BusinessWire, Newegg is leveraging ChatGPT to enhance its website’s user experience. From optimizing text content on its website to enhancing its PC Builder shopping tool and customer service chat, ChatGPT will enable Newegg to streamline its operations and offer its customers a more efficient experience.

ChatGPT integration into various aspects of Newegg’s operations

One area where Newegg is using ChatGPT is its PC Builder shopping tool. While customers had to previously find the parts for their PC themselves, with the new ChatGPT integration, they would only need to input their desired PC attributes into a search bar, and the AI will evaluate and recommend component configurations that match their preferences and budget.

Moreover, ChatGPT is optimizing text content throughout the website by suggesting product detail page titles, summaries, and descriptions, making it easier for consumers to browse and discover tech products. In addition, ChatGPT will help customers get the best answers in customer service chats and alert Newegg staff when necessary. Lastly, Newegg is also using ChatGPT to create on-site text and descriptions to enhance customers’ shopping experiences by generating targeted content for Newegg’s search engine optimization efforts.

However, Lucy Huo, Vice President of Application Development for Newegg, emphasized that ChatGPT is not intended to replace employees, but rather to provide additional resources so that employees can handle more complex projects. Although AI technology is still in its early stages of implementation, it has the potential to offer substantial benefits for e-commerce.

“Our customers are among the most knowledgeable regarding the latest technology because they assemble often complex tech products. Therefore, customers should expect Newegg to deploy the most advanced technology for their shopping experience, and ChatGPT currently enables this,” said Huo.


[ad_2]
Source link

Parts of Twitter’s Source Code Leaked Online On GitHub

0
[ad_1]
Twitter's Source Code Leaked

Recently, Twitter has acknowledged that some of its confidential source code has been exposed on the popular coding platform GitHub.

To address this issue, Twitter has sent GitHub a copyright infringement notice. The petition demands GitHub identify the individual who leaked the source code and reveal their identity.

Even Twitter also asked GitHub through the petition for the details of any other parties who downloaded it. As for the Twitter code that was leaked, Musk did not make any comments about it.

GitHub Action

After getting the notice from Twitter, GitHub immediately removed the code from its platform. But, there was no indication of how long the leaked source code had been on the web before GitHub removed it.

Musk’s Twitter is facing a number of challenges due to the exposure of its source code.

Technology companies are often reluctant to share such code for fear of giving competitors an unfair advantage or making security vulnerabilities public.

Twitter immediately launched a thorough investigation to determine the source of the breach of its confidential source code after discovering the leak.

Executives leading the inquiry have since speculated that the individual responsible for the incident may have departed from the company’s San Francisco offices last year.

Twitter’s Response

Approximately 7,500 employees of Twitter have been laid off or resigned since Mr. Musk acquired the company in October for $44 billion. In the GitHub project, “FreeSpeechEnthusiast” leaked Twitter’s source code.

Only one contribution listed on the anonymous user’s GitHub profile was made at the beginning of January to the platform.

While apart from this, a simplified approach will be developed to “serve” more “compelling tweets,” Musk said. Aside from the recent leak, Twitter also has structural and financial challenges to contend with due to the leak.

By cutting costs, trying out new features, and welcoming back banned users, Musk has been trying to turn around the social network.

For the company to generate revenue, advertisements are its primary source of income. Despite the site’s popularity, advertisers have hesitated to place ads on it due to its reputation.

In an email to staff, Musk indicated that Twitter is now worth about $20 billion, down more than 50% from the price he paid to acquire the platform.

GitHub’s website referred to Twitter’s takedown request on its homepage and declined to comment on the decision to remove the code.

Musk said that some of Twitter’s code would be available to the public in the coming months following the leak.

Twitter will make its recommendation code public by the end of March to allow anyone to review and scrutinize it. As people identify and report problems with Twitter’s code, this process could help make the code more secure.

In addition, Mr. Musk has been concerned about leaks and thefts by former employees who are displeased after being laid off in mass numbers.

Searching to secure your APIs? – Try Free API Penetration Testing

Related Read:


[ad_2]
Source link

A week in security (March 20

0
[ad_1]

The most interesting security related news from the week of March 20 – 26.

Last week on Malwarebytes Labs:

Stay safe!


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Older Galaxies are getting this Galaxy S23 exclusive feature

0
[ad_1]

Sometimes, companies give their newer devices exclusive features to move more units in those early months. Then, they trickle them down to older models. According to Sam Mobile. Older Galaxies are getting the Image Clipper feature.

Image Clipper was one of the new additions introduced with the Galaxy S23 phones, and it remained an exclusive feature. It’s a useful tool that allows you to simply hold your finger/S Pen on a part of an image in the Samsung Gallery. Then, the software will instantly crop out the part of the image and give you options to save, copy, or paste it.

This feature is great if you like to edit your photos on the go. You can find apps that allow you to extract parts from images, but it’s much better having the function natively available in the software.

The Image Clipper is coming to older Galaxies

This was one of the more notable features introduced with Samsung’s One UI 5.1. This is the version of Samsung’s Android skin that launched alongside the Galaxy S23 phones.

Now that the phones have been out for a bit, it’s time for Samsung to start bringing its features down to older phones. The Image Clipper feature is coming to the Galaxy S22 and Galaxy S21 next month. The report says that it’s going to land on older phones sometime in April. That’s not too long of a way seeing as we’re only a few days from April 1st.

However, the report doesn’t say which day in April it’s going to land. So, it could be any day during the month. In any case, if you don’t want to wait, and you’re looking to upgrade, then you might want to look into picking up a Galaxy S23.

These phones were highly reviewed, and they bring added power over their predecessors. You should be able to find some deals on these devices if you look for them.


[ad_2]
Source link

How to Redeem MLB.TV for Free in 2023

0
[ad_1]

Once again, T-Mobile is giving out a free subscription to MLB.TV to all of its customers this year. This means that you’ll be able to watch all of the games you could want, on your phone, tablet or TV. All for free. MLB.TV lets you watch out of market games, unfortunately you can’t watch the games if you are in that market. Which you can learn more about here.

T-Mobile is the official wireless provider of the MLB, which basically means that they paid a lot of money to be promoted during the baseball season this year. Which is not new, T-Mobile has been doing this for many years now. But because of that, T-Mobile offers its customers MLB.TV for free. Normally, MLB.TV would cost you $24.99 per month, or $149 for the entire season. So this is a pretty good value here.

So how can you redeem your free year of MLB.TV? Well, here’s how you can do it.

How to redeem MLB.TV for free

First off, you do need to be a T-Mobile customer. It is available for T-Mobile and Metro by T-Mobile customers. Whether you’re a prepaid customer or postpaid customer.

Now, you’ll need to open up the T-Mobile Tuesdays app. You’ll be asked to sign in if you aren’t already signed in.

Next, click on the “Redeem Offer” button in the T-Mobile Tuesdays app.

You’ll be taken to the MLB.TV app and asked to login. Once you are logged into the app, you can click on “Redeem now”.

And that’s all there is to it. Now you can start streaming all of your favorite teams within the MLB.TV app on any device. Whether that is your phone, tablet, TV or something else. If you’re a big baseball fan, then this is definitely worth checking out and claiming from T-Mobile.


[ad_2]
Source link

Food giant Dole reveals more about ransomware attack

0
[ad_1]

While Dole hasn’t said a lot about the February ransomware incident, it has revealed threat actors accessed employee data.

Fruit and vegetable producer Dole has confirmed attackers behind its February ransomware attack accessed employee data. The company hasn’t revealed the number of staff impacted.

In an annual report filed to the US Securities and Exchange Commission (SEC) last week, Dole said:

“In February of 2023, we were the victim of a sophisticated ransomware attack involving unauthorized access to employee information. Upon detecting the attack, we promptly took steps to contain the attack, retained the services of leading third-party cybersecurity experts and notified law enforcement. The February 2023 attack had a limited impact on our operations.”

“Limited impact” maybe, but according to CBS, customers complained on social media about delays and shortages of Dole products on store shelves for more than a week. The company also temporarily shut down production plants in North America and stopped delivery to stores.

Stewart’s Food Store in Texas was prompted by querying customers to post the memo it received from Dole on social media.


The Dole memo Stewart’s received and posted on its Facebook Page. (Source: Stewart’s)

It isn’t clear how long the company had to keep production offline. The company has also declined to comment when pressed for more details about the ransomware attack. When asked if it can recover the disruption cost through supplier recovery or insurance coverage, CEO Rory Byrne said, “I suppose the simple answer on that is no we don’t expect to recover on either of those categories.”

Byrne adds that getting insurance in North America now is “prohibitive.”

Dole employs more than 35,000 staff worldwide across 75 countries. It reports a $9.3B revenue for 2022 after being acquired by Total Produce, creating Dole PLC in 2021.

How to avoid ransomware

  • Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; disable or harden remote access like RDP and VPNs; use endpoint security software that can detect exploits and malware used to deliver ransomware.
  • Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.
  • Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.
  • Don’t get attacked twice. Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.

Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

ASUS’ Zenfone 9 is the best compact phone, and now its even cheaper

0
[ad_1]

Amazon has the ASUS Zenfone 9 on sale right now for just $599. And for that price, you’d be crazy not to grab one. That is $100 off of the regular price, and it is for the 8GB/128GB model here.

The ASUS Zenfone 9 is one of the best phones period, but it’s definitely the best compact phone on the market. And to see it down to $599 is quite impressive. It sports a 5.9-inch FHD+ AMOLED 120Hz adaptive display, powered by the Snapdragon 8+ Gen 1, along with 8GB of RAM and 128GB of storage inside. There’s also a 50-megapixel main camera, with a 12-megapixel ultrawide, and a 12-megapixel front-facing sensor.

ASUS sells the Zenfone 9 in four colors: Starry Blue, Moonlight White, Sunset Red and Midnight Black. And it looks stunning in all of these colors. It has a nice soft-touch back that is also pretty grippy. Making it easier to use without a case. But ASUS does also include a case in the box here, which is really nice.

There is a side-mounted fingerprint sensor, so you won’t have to worry about the slow and inconsistent under-display sensors on other phones. This entire phone was made for one-handed operation. Hence the much smaller size. If you’re one that really likes to have a small phone that you can use with one hand, this is definitely the one to get. Since it is definitely a dying breed.

On the software front, the Zenfone 9 is running mostly a stock Android experience, with some minor changes included. ZenUI is still there, but it’s barely there. So if you like having a stock experience, or something close to the Pixel, then the Zenfone 9 is a great option. ASUS has just started to update its phones to Android 13.

You can pick up the ASUS Zenfone 9 from Amazon today by clicking here.

ASUS Zenfone 9 – Amazon


[ad_2]
Source link

Twitter has a secret list of VIPs who get priority treatment

0
[ad_1]

Twitter reportedly has a secret list of VIPs who get increased visibility on the platform. According to Platformer, the company monitors the accounts of these VIP users to artificially boost the visibility of their tweets. The list has existed for several months and contains around 35 celebrities, journalists, and other prominent personalities, including Twitter CEO Elon Musk.

This list was created after Musk suggested last month that Twitter’s algorithm was suppressing his tweets. He made engineers roll out changes that resulted in his tweets briefly going rampant on the platform. A report from the same source claimed that the company artificially boosted Musk’s tweets to give him more visibility and engagement. It appears a few other people are also getting similar priority treatment.

Internal documents obtained by the publication show that Musk is accompanied by US President Joe Biden, NBA star LeBron James, Daily Wire founder and conservative commentator Ben Shapiro, Pseudonymous conservative commentator @catturd2, Rep. Alexandria Ocasio-Cortez (D-NY), YouTube personality MrBeast, and journalists Matt Yglesias, Glenn Greenwald, Noah Smith, and Adrian Wojnarowski.

These VIPs get artificial visibility on Twitter. Their tweets reportedly bypass visibility limitations on “For You” recommendations. They also get priority access to customer support. Whenever VIP users file a complaint, Twitter engineers are flagged and they look into it on a priority basis over others (via).

Twitter is removing legacy blue ticks to “treat everyone equally”

This news comes shortly after Twitter announced that it will soon start removing legacy verified checkmarks. The coveted blue ticks will disappear on April Fool’s day, i.e. April 1. The company wants people to buy a Twitter Blue subscription for a verified tick next to their handle. Elon Musk, who has always labeled Twitter’s old verification system “corrupt,” said the move is about equal treatment of all users on the platform.

“It’s more about treating everyone equally. There shouldn’t be a different standard for celebrities imo [in my opinion],” the Twitter CEO tweeted on Sunday. However, it turns out that the social network biggie doesn’t treat everyone in the same way. It is secretly boosting the visibility of tweets from a select group of VIP users. Meanwhile, starting mid-April, Twitter’s For You recommendations will only be available for verified accounts.

According to Musk, this is the “only realistic way to address advanced AI bot swarms taking over. It is otherwise a hopeless losing battle”. For the same reason, Twitter will also require verification for voting in polls. Plenty of changes are coming to the platform in the coming weeks.


[ad_2]
Source link