OPPO Find X6 Pro specifications

0
[ad_1]

The OPPO Find X6 Pro got announced today, and it comes with a truly powerful spec sheet. We’ve already covered the OPPO Find X6 Pro launch, and are here to take a closer look at its specifications, actually.

The Snapdragon 8 Gen 2 spearheads the list of OPPO Find X6 Pro specifications

The device is fueled by the Snapdragon 8 Gen 2 SoC, Qualcomm’s most powerful offering. The MariSilicon X NPU is included for image processing, while OPPO used both LPDDR5X RAM here, and UFS 4.0 flash storage. 12GB and 16GB RAM models are on offer, and are combined with 256GB and 512GB of storage.

This phone has the brightest display on the market, it looks outstanding on paper

A 6.82-inch QHD+ (3168 x 1440) AMOLED LTPO display sits on the front. That panel is curved, and it includes very thin bezels. A display camera hole is centered at the top of this display. The panel gets immensely bright at 2,500 nits of peak brightness, which is a new record on smartphones.

This panel can project 1 billion colors, and it has support for HDR10+ content, and Dolby Vision too. It has a 240Hz touch sampling rate, and it can just between 1 and 120Hz refresh rate as needed. 1440Hz PWM dimming is also included.

The device has a 93.5% screen-to-body ratio, which is quite high

The company says that we’re looking at a 510 PPI here, while the screen-to-body ratio is extremely high at 93.5%. This panel is protected by the Gorilla Glass Victus 2, in case you were wondering. The Gorilla Glass 5 sits on the back.

The phone also comes with a heat dissipation area of 34,268mm2. Android 13 comes pre-installed, while OPPO’s ColorOS 13.1 is included on top of Google’s OS. The device has two SIM card slots, and ships with Bluetooth 5.3 support. Wi-Fi 7 is also supported here.

On top of all that, the device is IP68 certified for water and dust resistance. You will find an IR blaster at the top of the phone, which is a rarity these days on smartphones, especially flagship ones. Stereo speakers are also a part of the package.

100W wired, 50W wireless, and 10W reverse wireless charging is included

A 5,000mAh battery is also a part of the package. The device supports 100W SuperVOOC wired charging, and 50W AirVOOC wireless charging. 10W reverse wireless charging is also on offer. A charger does come included in the box, by the way.

The OPPO Battery Health Engine is also included, and the company says that the phone can keep 80% of its original battery capacity after 1,600 full charge cycles over 4 years. Needless to say, that’s great, especially considering the charging speed here.

A 1-inch camera sensor leads the pack on the back

There are three 50-megapixel cameras included on the back, and all three are quite powerful. The main one does steal the show, from the hardware perspective. That is a 50-megapixel main camera with a 1-inch camera sensor from Sony (IMX989). It has OIS support, and a 1.6um pixel size (3.2um after binning). We’re also looking at an f/1.8 aperture here, and a 23mm focal length. All Pixel Omni-Direction PDAF is also a part of the package, as is a 1G+7P lens module. This camera also supports 2x zoom with in-sensor Zoom Technology.

Outstanding ultrawide & periscope telephoto camera hardware is also in use

A 50-megapixel ultrawide camera uses Sony’s IMX890 sensor. This camera also supports OIS, and has a 1um pixel size, 2um after binning. An f/2.2 aperture lens is included here, and the camera has a 15mm equivalent focal length. A 7P lens module is also a part of the package, as is All Pixel Omni-Direction PDAF. This camera has a minimum focal distance of 4cm for macro shots.

The third camera on the back is also a 50-megapixel unit. It’s also Sony’s IMX890 sensor, but with different specs. OIS is supported, while this camera has a 1um pixel size, 2um after binning. An f/2.6 aperture lens is used, while we’re looking at a 65mm equivalent focal length. A 6P lens module is also inc use, while the camera also uses All Pixel Omni-Direction PDAF. 6x Zoom Technology with in-sensor zoom is supported, while this camera can zoom up to 120x, and has a minimum focal distance of 25cm.

There is also a 32-megapixel selfie camera (Sony’s IMX709 sensor, 0.8um pixel size, f/2.4 aperture, 7P lens module, 21mm focal length, AON Ready, Active Focus) included on the front.

The phone comes in three variants

The OPPO Find X6 Pro measures 164.8 x 76.3mm x 9.1mm, for the glass model. The vegan leather + glass model is a bit thicker at 9.5mm. The glass model comes in black and green colors, while the vegan leather + glass combines brown and white colors on the back.


[ad_2]
Source link

Download OPPO Find X6 series wallpapers

0
[ad_1]

OPPO announced its Find X6 series flagship smartphones today. The OPPO Find X6 Pro was the main focus of the announcement, of course, as the Find X6 lives in its shadow. That being said, OPPO did share some official wallpapers with us, wallpapers exclusive to the Find X6 series.

The OPPO Find X6 series wallpapers are now available

If you take a look at the gallery below the article, you’ll be able to see these images. There are four wallpapers included in there, and they have the same abstract pattern, but they come in different colors.

The colors are Blue, Green, Leather, and Purple. The ‘Leather’ color is actually a brown one, in case you were wondering. These colors are meant to represent the colors the devices are available in. The brown one is called ‘Leather’ as the brown + white model of the Find X6 Pro combines vegan leather and glass on the back.

In any case, the images in the gallery below have been compressed. If you do like them, however, you can download full-sized wallpapers from the link we’ve included below the article.

Considering these are .jpg files, you can use them on any device you want, of course. All four images come in a resolution of 3168 x 1440, but you can, of course, resize them as you want to fit your phone’s display.

The Find X6 Pro is one of the most powerful smartphones on the market at the moment

Now, the Find X6 series is quite powerful, especially the ‘Pro’ model. That device has one of the most powerful camera setups on the market. The camera hardware is outstanding, and lead by a 1-inch main camera sensor from Sony. Hasselblad is also a part of the picture.

The Snapdragon 8 Gen 2 is a part of the package too, while the Find X6 Pro supports 100W wired charging, and 50W wireless charging. On top of everything, 10W reverse wireless charging is also included. And yes, a 100W charging adapter is also included in the package.

This phone also has the brightest display in the business, as it goes all the way up to 2,500 nits. It’s a QHD+ panel with a 120Hz adaptive refresh rate, and all the other bells and whistles you may want.

If you’d like to get more info about the device’s specs, click here.

Download OPPO Find X6 Pro wallpapers (MEGA)


[ad_2]
Source link

Hackers Weaponized and Exploited Over 55 Zero-days

0
[ad_1]
55 Zero-days

Mandiant researchers have recently reported that 55 zero-day vulnerabilities were actively exploited in 2022, most against the following brands and their products:-

Researchers state that hackers are still targeting zero-day vulnerabilities in malicious campaigns. It has been reported that most of these vulnerabilities resulted in the attacker being able to either gain elevated privileges or execute remote code on vulnerable devices.

Zero-days Exploited in 2022

However, it is important to note that compared to recent years, there has been a decline in the overall number and proportion of financially motivated zero-day exploits in 2022.

There were 55 zero-day flaws exploited in 2022; 13 were exploited by cyber-espionage groups, while Chinese cyber spies exploited seven.

Seven zero-day vulnerabilities have been exploited by China so far, making the country the most prolific. And here below, we have mentioned those seven flaws:-

One of the flaws exploited by Russian threat actors overlapped with another two flaws exploited by North Koreans. In three cases, Mandiant could not determine the origin of the espionage attack.

Explicit Financial Motives Decline in 2022

Notably, there was a decrease in the proportion of zero-day vulnerabilities exploited as part of financially motivated operations in 2022.

Exploiting n-day vulnerabilities, which have already been patched, is one of the most common vectors used to transmit ransomware and extortion attacks, as observed in Mandiant Incident Response and Managed Defense investigations.

In order for this decline to have occurred, there may have been a number of factors contributing to it. A significant number of zero-day exploits, including extortion campaigns utilizing four Accellion FTA vulnerabilities simultaneously, occurred in 2021. It was an exceptional year for zero-day exploits across the board.

Most Exploited Vendors & Product Type

Three large vendors, whose technology is widely adopted worldwide and whose distribution mirrors previous years, were disproportionately affected by zero-day vulnerabilities in 2022.

Some threat actors may have targeted unique vendors or niche products based on specific targets or victims of interest. Those technologies were especially useful as attack vectors for those particular targets.

Among the most exploited products were:-

  • Operating systems (19)
  • Browsers (11)
  • Security, IT, and network management products (10)

15 zero-day exploits have been identified in Windows, most of which target the desktop operating system in 2022.

Mitigations

Since zero-day vulnerabilities don’t exist, the patches protecting systems against them can be difficult. However, organizations can take steps to mitigate their impact:-

  • When exposing internal devices to the internet, implement IP-based allow lists if necessary.
  • Instead of exposing your servers to the internet, use private tunnels or VPNs to access them.
  • To maintain the principle of least privilege, it is advisable that the user’s access rights are restricted as much as necessary.
  • Segment your network in the case of a breach to reduce the attack’s spread.
  • It is imperative to monitor your network.
  • Make sure to install firewalls.
  • Ensure the use of e-mail and web filtering products.
  • Always make sure that your endpoints are secure.

It is imperative to properly configure Microsoft, Google, and Apple products, including network segmentation and least privilege policies since they are the most exploited vendors.

During the first quarter of 2023, it has been estimated that the number of Russian cyber threats had increased by 50%, primarily targeting Ukrainian civilian and military assets and those of its partners.

Building Your Malware Defense Strategy – Download Free E-Book

Related Read


[ad_2]
Source link

How to avoid potentially unwanted programs

0
[ad_1]

If you’ve ever downloaded software onto your computer, chances are you’ve unknowingly cluttered your machine with potentially unwanted programs.

If you’ve ever downloaded software onto your computer, chances are you’ve unknowingly cluttered your machine with PUPs. Here’s what you need to know about these sneaky programs.

What are PUPs?

If you’re thinking baskets of doe-eyed baby dogs, then you’re sadly mistaken. PUPs is the acronym for Potentially Unwanted Programs. Also called bundleware, junkware, or PUAs (Potentially Unwanted Applications), PUPs are software programs that you likely didn’t want installed on your computer. Why not? Here are a few things that PUPs can do:

  • slow your computer down
  • display a ton of annoying ads
  • add toolbars that steal space on the browser
  • collect private information

PUPs often come bundled with software that you did, in fact, want to download. By swiftly clicking through an installation, it’s easy to miss the fine print and “agree” to these extra applications.

So why aren’t PUPs simply called malware? The makers of PUPs felt that since they included the information necessary for consent in the download agreement, they shouldn’t be lumped in with other malicious programs. (‘Cause everyone reads download agreements, right?) So cybersecurity company McAfee came up with the softer, less mal-sounding term “Potentially Unwanted Programs.”

What makes a program a PUP?

In order to determine whether an application is a PUP, security engineers examine a list of bad behaviors. Some apps are classified as PUPs because of multiple small transgressions. Others because they had one serious violation. PUP criteria includes advertising no-nos such as obtrusive pop-ups, web infractions, such as altered search results or bookmark insertions, or download offenses, such as pre-populated check boxes or the liberal use of “recommended” next to an option. So how do you go about avoiding PUPs? Here are a few tips to keep your computer PUP-free.

Recognize dark patterns

Dark patterns are user interfaces that are deliberately designed to trick people. For example, a newsletter that makes it difficult to find the unsubscribe button or a website whose customer service contact information is obfuscated—that’s a dark pattern. Here are some other dark patterns to look out for:

  • Pre-populated check boxes (Software programs such as Unchecky scan third-party software agreements and uncheck options that result in PUPs, but they may not catch everything.)
  • Adding an unofficial “seal” as a credibility indicator
  • Emphasis of a desired path (gray out the “skip” button, use bright color for “next” button)
  • Misdirection (hiding free or cheaper options)

Read through install wizard instructions carefully

When you download a piece of software, you’ll be directed through the install process by an installation wizard. The install wizard, or setup assistant depending on which operating system you use, is a series of dialog boxes that helps you through the installation process step-by-step. PUPs can openly hide in the install wizard, as their makers understand that most users tend to fly through the steps in order to launch their intended program. In order to catch PUPs in the act, you should:

  • Read the information in the top navigation bar of the install wizard to catch names of unwanted programs.
  • Do not accept standard, express, default, or other installation settings that are recommended. Always choose custom. Install wizards may call this out as “advanced” in parentheses but that’s actually a dark pattern. Custom settings are not advanced.

Read through EULAs carefully

EULAs are the End User License Agreements that come standard with any download. They are legal contracts between you and the makers of the software programs you’re downloading. EULAs go on forever and are full of legalese, which is why most people skip right past them to the “I accept” button. However, EULAs are where the makers of PUPs can legally slip their programs onto your computer. In order to avoid that:

  • Don’t accept terms of use that are for bundled programs. Read the top title above the fine print to be sure the EULA you are accepting is only for the program you originally downloaded. If it isn’t, you can decline and still move forward in the install process.

Level up on security

While vigilant scrutiny of software downloads is your best protection against PUPs, cybersecurity programs can give you some valuable assistance. Installing some additional layers of defense can help stave off RAM-hungry PUPs. You might want to purchase or download the following:

  • ad blocker/pop-up blocker
  • anti-spyware
  • anti-malware

At the end of the day, one of the best ways to keep PUPs out of your system is the same advice we offer to anyone who wants to stay on top of cybersecurity: stay vigilant. If you use your newfound knowledge to critically review your software downloads, you’ll be a true PUPs master.


[ad_2]
Source link

Amazon just gave the Razer Iskur XL Gaming Chair a huge price cut

0
[ad_1]

Amazon has discounted the Razer Iskur XL gaming chair today, and it is now sitting at its lowest price ever. Making this a really great time to pick one up. The Razer Iskur XL is currently priced at $469, that’s down from its regular price of $599.

This is the same as the regular Razer Iskur, the “XL” part just means that it supports bigger and taller people. Razer says that this gaming chair is recommended for those between 6-feet and 6-foot-10-inch people, and up to 400 lbs. Which should cover most people.

The Razer Iskur XL is a really good gaming chair, or just office chair for your home office. I actually have one and have been using it for a few years now. I do have the fabric non-XL model, so not quite the same model, but they are pretty similar. With the biggest difference being the material. This Iskur XL uses leather, which gives it a more premium look and feel.

This chair has repeatedly made it into our list of the best gaming chairs, and that’s largely thanks to the full adjustable lumbar support that is able to match your spine for absolute comfort. This is a great chair to sit in if you like to game for hours, or sit at a desk for hours on end. As it is super comfortable.

Just about everything on this chair is adjustable. From the height, to the back, to lumbar, to even the arm rests. The arm rests are actually 4D adjustable. Which basically means that they can move up and down, in and out and the angle can also be adjusted. To give you the most comfortable chair possible.

You can pick up the Razer Iskur XL gaming chair from Amazon today by clicking here. This sale won’t last long so you’ll want to be quick here.

Razer Iskur XL – Amazon


[ad_2]
Source link

iPhone 15 Pro leaks – goodbye mute switch, hello mute button

0
[ad_1]

It was reported not long ago that Apple plans to replace its mute switch with a mute button on the iPhone 15 Pro, and a newly-leaked video and images taken from it confirm that fact. The iPhone 15 Pro and iPhone 15 Pro Max will see this change.

The iPhone 15 Pro series will welcome a mute button, instead of a mute switch

This was confirmed via more CAD images that were shared via TikTok (reshared by ShrimpApplePro). These images not only show the mute button, but a switch to solid-state buttons for the ‘Pro’ series of next-gen iPhones. That is also something we expected.

The video shown below also shows that the iPhone 15 vanilla series will keep the physical buttons, and the mute switch. So, the entire button setup is more or less confirmed for the ‘Pro’ series only at this point.

The iPhone 15 Pro and iPhone 15 Pro Max will include their mute button on the left-hand side, in the upper portion of it. In other words, it will sit in the same spot where you’d find the mute switch.

It will be a physical mute button, not a solid-state one

Unlike the solid-state power/lock and volume rocker buttons, this mute button seems to be a physical one. What we’re wondering is if it will be a regular physical button, like the power/lock key on current-gen iPhones, or perhaps a button that will stay pressed when the phone is muted, and be in its default state when not.

We’ll have to wait and see. Who knows, maybe Apple even adds an indicator in form of a different light or something of the sort, but that’s a long shot. This is Apple we’re talking about after all.

It is worth noting that all iPhone 15 models will include a Dynamic Island setup this time around. That goes for both vanilla and Pro models. They’ll all also include a Type-C port at the bottom, as the Lightning port is finally becoming a thing of the past.


[ad_2]
Source link

A look at a Magecart skimmer using the Hunter obfuscator

0
[ad_1]

The threat actor behind this operation is using an open-source JavaScript obfuscator to hide its code.

Threat actors are notorious for trying to hide their code in various ways, from binary packers to obfuscators. On their own, these tools are not always malicious as they can also be be used by companies or individuals who wish to keep their work safe from piracy, but overall they tend to be largely abused.

In the case of credit card skimmers in client-side attacks, obfuscators are a common occurrence as they can make code identification more difficult. Defenders typically have the choice to either rely on the browser’s debugger and step through the code, or can statically try to reverse it. The latter tends to be quite time consuming, but the former can often problematic if the malware author adds anti-debugging routines.

Today, we look at a Magecart skimmer that uses Hunter, a PHP Javascript obfuscator. During our investigation, we were able to discover a number of domains all part of the same infrastructure with custom skimmers for several Magento stores.

Initial injection on e-commerce sites

The attack relies on 2 steps: the first one is code injected inside the website’s source that calls out a remote URL. That URL in turn, loads the skimmer within the payment checkout process.

We notice a large blurb of code that contains some static elements and others that are uniquely generated. The ‘eval‘ portion of the code is a clear giveaway that the random looking string is being processed dynamically to return some instructions.

The function (h,u,n,t,e,r) helps us to identify that this obfuscator is called Hunter and available on GitHub. To decode the obfuscated string, we can simply write out the content of eval and we obtain a single line of JavaScript pointing to a URL.

This URL contains code that has been obfuscated with Hunter once again. This time, once we deobfuscate it, we see what appears to be HTML code with forms referring to credit card fields. This is the actual skimmer.

Skimmer at checkout page

When a victim who’s shopping at a compromised online store goes to check out, there will be additional fields injected in the contact form that aren’t normally there. Below is the legitimate checkout page of a store without the skimmer being loaded:

We can see that the payment process is on the bottom right hand side. In contrast, this is what the same page looks like when the skimmer is loaded:

Additional fields were inserted between the shopper’s email address and name. In this case, the threat actor didn’t do a very good job because the fields are in English while the rest is in Spanish.

The credit card data to be stolen is encoded, then stored inside a cookie and subsequently exfiltrated via a POST request.

Infrastructure

The skimmer domains registered with Porkbun all appear to be hosted on the same server at 193.201.9.116 (ASN49505):

We can get any of the currently still resolving domains to show their own version of the skimmer code by crafting a GET request with the proper referer:

The Hunter obfuscator is handy but quite easy to reverse and as such provides minimal stealth capabilities. Based on the skimmer code, this is not a very sophisticated attack probably limited to less than a hundred stores. However, this was the first time we encountered a Magecart skimmer using this kind of obfuscation and most endpoint security products are not detecting the client-side JavaScript.

Malwarebytes customers are shielded against this campaign via our web protection in End Protection (EP), Endpoint Detection and Response (EDR) and Malwarebytes Premium.

Indicators of Compromise

Host:

193.201.9.116

Skimmer domains:

1537la[.]buzz 

1537li[.]buzz 

1537lx[.]buzz 

1568la[.]buzz 

1568li[.]buzz 

1568lx[.]buzz 

1599la[.]buzz 

1599li[.]buzz 

1599lx[.]buzz 

1599lz[.]buzz 

appcloud1[.]buzz 

appcloud19[.]buzz 

appcloud2[.]buzz 

appcloud20[.]buzz 

appcloud3[.]buzz 

appcloud5[.]buzz 

araboxtv[.]sbs 

blindsmax[.]sbs 

bubapeq[.]quest 

dev-extension[.]cloud 

dev-extension[.]one 

dev-extension[.]us 

hedeya[.]sbs

hedeya[.]sbs 

inspirefitness[.]sbs 

motherearthlabs[.]sbs 

nasaservers[.]sbs 

newarriwal[.]quest 

paramountchemicals[.]sbs 

peqart[.]sbs 

remediadigital[.]sbs 

roboshop[.]sbs 

schmerzfrei-shop[.]sbs 

swsgswsg[.]sbs 

thecornerstoreau[.]sbs 

ultracoolfl[.]sbs


[ad_2]
Source link

I asked Google’s Bard what Phone I Should Buy, Here’s what happened

0
[ad_1]

Google announced today that it was opening the waitlist for Bard. Which is its competitor to ChatGPT. It was initially announced last month, but it was quickly pulled due to it spitting out inaccurate information. But now, it’s back and it’s actually really impressive.

I’ve been messing with it for a good bit, and it’s pretty incredible. One query I asked was, which phone should I buy? I did not give it any options at all. So the possibilities here were endless. And I was actually quite impressed with what it spit out to me.

Screenshot 2023 03 21 at 1 10 54 PM

As you can see in the screenshot above, it says that the best phones will depend on your individual needs and preferences. Something I always stress in our Best Smartphones guides. And then spits out some of the top phones for 2023. Not only did it give out four great phones – Samsung Galaxy S23 Ultra, iPhone 14 Pro Max, Google Pixel 7 Pro and OnePlus 11 – but it also gives you some pros for these phones. Typically talking about the display, chipset, battery and camera. Arguably the four most important features of any phone. You will notice that there are a few mistakes here. For example, it says that the OnePlus 11 has a Snapdragon 8 Gen 1 chip. It’s actually the Snapdragon 8 Gen 2 chip.

Google does have a disclaimer that Bard might display inaccurate or offensive information. So they did cover their butts here. But this is still really impressive.

Bard can also compare these phones

Still not sure which phone you should buy? Bard can compare them for you, in a side-by-side table. Which is pretty mindblowing.

Screenshot 2023 03 21 at 1 17 03 PM

Like with the best phones, it also has some inaccuracies here in this table. For example, the Galaxy S23 Ultra and OnePlus 11 both run the Snapdragon 8 Gen 2, not Gen 1. The Galaxy S23 Ultra does not come in 128GB storage model. While the Pixel 7 Pro does not come in 1TB. And the OnePlus 11 does not have a 512GB or 1TB model. Finally, the OnePlus 11 and Galaxy S23 Ultra both launched with Android 13.

So it’s not always super accurate, but it does paint a pretty good picture of how these phones stack up. Which is beyond impressive, and it will only get better from here, hopefully.


[ad_2]
Source link

iPhone 14 Plus is seemingly more popular than iPhone 13 Mini

0
[ad_1]

According to a new report, the iPhone 14 Plus seems to be more popular than the iPhone 13 Mini. The iPhone 13 Mini is kind of its predecessor, as the iPhone 14 Plus directly replaced the ‘Mini’.

The iPhone 14 Plus seems to be more popular than the iPhone 13 Mini

This information comes from Display Supply Chain Consultants (DSCC). The report basically shares info on panel shipments for specific Apple models, which gives us an idea of how popular they are.

The display shipments for the iPhone 14 Plus are up by 59% compared to the iPhone 13 Mini. The iPhone 14 Plus is still the company’s least popular iPhone 14 model, however, so keep that in mind.

In addition to this, the report shared all kinds of other interesting tidbits. The iPhone 14 lineup seems to be more popular than iPhone 13 models, though only slightly. The report claims we’re looking at a 2% improvement. This is based on info for April 2023, compared to the same period last year, of course.

The company’s ‘Pro’ models are still outselling the vanilla models

Now, the iPhone 14 Pro models are more popular than vanilla units. That is not surprising, as the same has been the case in previous years too. The sales of vanilla models are actually down by 36%, while the Pro and Pro Max sales are up by 22% and 23%, respectively.

It will be interesting to see how well will the iPhone 15 series do. All iPhone 15 models will include a Dynamic Island, and also Type-C ports. So the vanilla models will get a visual improvement compared to the iPhone 14 and 14 Plus, which was not really the case last year.

Apple is expected to replace the physical buttons on the iPhone 15 Pro series with solid-state buttons. That won’t be the case with the vanilla models, however, they’ll keep their physical buttons for at least one more year.


[ad_2]
Source link

The NBA tells fans about data breach

0
[ad_1]

The NBA is warning fans of a data breach at a third-party newsletter service which could result in targeted phishing attempts

The National Basketball Association (NBA) has notified its fans they may be affected by a data breach in a third-party service the organization uses.

For now, it is safe to assume that the attacker only obtained names and email addresses, but the NBA has hired the services of external cybersecurity experts to analyze the scope of the impact.

The NBA is a global sports and media organization most famous for its annual mens basketball league in the USA. The organization is actually built around five professional sports leagues: the NBA, WNBA, NBA G League, NBA 2K League and Basketball Africa League.

The NBA sent out emails to a number of its followers noting that while names and email addresses have been compromised, no other personally identifiable information was breached.

According to BleepingComputer the email read:

We recently became aware that an unauthorized third party gained access to, and obtained a copy of, your name and email address, which was held by a third-party service provider that helps us communicate via email with fans who have shared this information with the NBA.

The email also warned about possible phishing attempts appearing to come from organizations associated with the NBA or basketball in general. It urges fans to treat any links and attachments, even if they appear to come from a legitimate @nba.com email address, with extra caution.

We know that newsletter services are high on the target list of cybercriminals. In January of 2023, Mailchimp fell victim for the second time in a year to a social engineering attack. Getting your hands on a list of email addresses that share a common interest is a golden opportunity for scammers.

Data breach

There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.

  • Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened, and follow any specific advice they offer.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication. Where possible, use a FIDO2 2FA device. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify any contacts using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.

Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link