• Smart Intel Briefing
  • Posts
  • The Cybersecurity Crucible - Forging Hard Targets – 03 November 2023 | KD Sec & Tech Secure

The Cybersecurity Crucible - Forging Hard Targets – 03 November 2023 | KD Sec & Tech Secure

Unveiling the Latest in Cybersecurity: From Apple's Ecosystem to Microsoft's Security Initiatives

Introduction

Hello, Hard Targets!

Welcome back, Hard Targets! We're thrilled to have you with us for another issue packed with valuable insights. As always, our artwork for this issue is a visual treat, reflecting the essence of cybersecurity in its intricate details.

If you're new here and haven't subscribed yet, don't miss out on our future releases. Subscribe here and become a part of our growing community. Our newsletter is more than just information; it's a valuable asset that equips you with the knowledge to stay ahead in the cybersecurity world.

Remember, we release our issues semi-weekly, every Monday and Friday, ensuring you're always updated with the latest in the realm of security.

For those who've been with us and love what we do, check out our exclusive Hard Targets Merchandise. And for an even deeper dive into the creative process behind our artwork, gain Artwork Insider Access.

In this issue, we delve into the latest cybersecurity tips across various platforms, highlight the most recent scams to be wary of, and provide insights into the tech world's latest happenings. Stay informed, stay secure, and most importantly, remain a Hard Target!

Thanks to Beehiiv for hosting this newsletter. Sign up for other newsletters here.

Cybersecurity Pop Quiz

Test Your Cybersecurity Knowledge with Our Quick Quiz. Let's See If You're a True Hard Target!

Question 1: Which of the following best describes the principle of "Data Sovereignty" in cybersecurity?

  • a) The process of encrypting data at rest and in transit.

  • b) The concept that data is subject to the laws of the country in which it is located.

  • c) The idea that data ownership belongs to the individual who created it.

  • d) The practice of storing data in multiple locations for redundancy.

Question 2: In the context of cybersecurity, what is the primary purpose of "Digital Rights Management (DRM)"?

  • a) To manage the rights of users on a network.

  • b) To ensure data is not accessed without proper authorization.

  • c) To control the use and distribution of copyrighted digital content.

  • d) To manage the digital identities of users in an organization.

Question 3: What is the primary function of "Intrusion Detection Systems (IDS)" in cybersecurity?

  • a) To detect and prevent malware infections on a network.

  • b) To manage user access to network resources.

  • c) To detect unauthorized access or activities on a network.

  • d) To encrypt data transmissions over a network.

Answers:

  1. b) The concept that data is subject to the laws of the country in which it is located.

  2. c) To control the use and distribution of copyrighted digital content.

  3. c) To detect unauthorized access or activities on a network.

Cybersecurity News and Emerging Technology

ChatGPT Chief Warns of Some ‘Superhuman’ Skills AI Could Develop

Source: Fox News

Summary: The CEO of OpenAI, Sam Altman, recently expressed concerns about the potential capabilities of AI systems, suggesting they could achieve "superhuman persuasion" before reaching general superhuman intelligence. Altman's statement has sparked discussions about the implications of such advancements in AI. While some experts believe that AI could become adept at identifying persuasive content, others argue that the technology to influence people already exists, pointing to the impact of social media. There are also concerns about AI's ability to provide accurate information, with some platforms occasionally "hallucinating" content to produce seemingly correct answers.

What’s the importance of this article? The article highlights the rapid advancements in AI technology and the potential ethical and societal challenges they present. As AI systems become more sophisticated, there's a growing need to understand and address the implications of their capabilities, especially in areas like persuasion.

How could this affect me? The development of AI systems with "superhuman persuasion" capabilities could influence the way we receive and perceive information. It underscores the importance of being critical consumers of information, whether it comes from human or machine sources.

NASA is Launching a Free Streaming Service with Live Shows and Original Series

Source: Engadget

Summary: NASA has unveiled a new streaming service named NASA+ that will be available on most major platforms starting November 8. This service will be entirely free, with no subscription or ad requirements. The space agency had hinted at this release during the summer as part of its broader digital revamp. NASA+ will be accessible via NASA's iOS and Android apps and on streaming devices like Roku, Apple TV, and Fire TV. The content will be family-friendly, offering viewers a deep dive into NASA's missions through live coverage and original video series. This new service seems to be an extension of NASA's existing broadcast network, NASA TV.

What’s the importance of this article? The article introduces NASA's initiative to expand its digital presence and engage with a broader audience. By offering a free streaming service, NASA aims to educate and inspire the public about space exploration and its missions.

How could this affect me? For space enthusiasts and the general public, this new streaming service provides an opportunity to gain deeper insights into NASA's missions and activities. It's a valuable resource for educational and entertainment purposes, especially for those interested in space exploration.

Call of Duty Modern Warfare 3’s Install Is Unbelievably Massive

Source: Kotaku

Summary: The latest installment in the Call of Duty franchise, "Call of Duty: Modern Warfare III," has a massive installation size, consuming over 200GB of storage on PlayStation 5 and Xbox Series X/S; this size includes all the content it offers. The new Call of Duty HQ download manager alone is roughly a 50GB install. Previous games in the series have also had large digital footprints, with "Call of Duty Black Ops: Cold War" taking up 255GB on PS5 after all content packs were installed. Activision explained the large file size is due to the increased amount of content available on Day 1, including open-world Zombies, support for items carried forward from Modern Warfare 2, and map files for the current Call of Duty: Warzone.

What’s the importance of this article? The article emphasizes the growing trend of large file sizes in modern video games, particularly in the Call of Duty series. It raises questions about storage management and the need for efficient content delivery systems.

How could this affect me? For gamers, especially those with limited storage capacity on their consoles or PCs, managing game installations becomes a challenge. It's essential to be aware of these large file sizes when considering new game purchases and to plan storage solutions accordingly.

Foldables are Affordable with this Black Friday Z Flip 5 Deal

Summary: The Samsung Galaxy Z Flip 5, a leading foldable phone, is now available with a significant deal from Buy Mobiles. The offer includes the Z Flip 5 with 100GB per month for £37, with no upfront cost. The phone is available in various colors. The contract lasts for 24 months on the Three network, providing unlimited minutes and texts. The Z Flip 5 boasts a 6.7-inch FHD+ Dynamic 120Hz AMOLED display and a larger 3.4-inch Super AMOLED cover screen. It also features a pair of 12-megapixel cameras and is powered by the Snapdragon 8 Gen 2 for Galaxy chipset.

What’s the importance of this article? The article highlights a significant deal on one of the most popular foldable phones in the market, the Samsung Galaxy Z Flip 5. It provides insights into the phone's features and the value proposition of the deal.

How could this affect me? If you're in the market for a new phone, especially a foldable one, this deal offers an affordable option with high-end features. It's an opportunity to get a premium device at a reduced cost.

Motorola's Affordable Razr (2023) Foldable Can Now Be Yours with Free Bose Buds or a Gift Card

Source: PhoneArena

Summary: Motorola has introduced a new deal for its third-generation Razr (2023) foldable phone, making it one of the most affordable foldable phones in the US market. Priced at just $699.99, it significantly undercuts competitors like Samsung's Galaxy Z Fold 5 and Google's Pixel Fold. The deal includes a free pair of noise-canceling Bose QuietComfort Earbuds II, valued at $299.99 when purchased from Motorola's official website. Alternatively, Best Buy is offering a $100 gift card with the purchase. The Razr (2023) features a 6.9-inch P-OLED foldable display with a 144Hz refresh rate, a 1.5-inch OLED external screen, a 4,200mAh battery with 30W charging capabilities, and a Snapdragon 7 Gen 1 Processor.

What’s the importance of this article? The article showcases Motorola's aggressive pricing strategy for its latest foldable phone, aiming to capture a larger market share by offering high-end features at a more affordable price point, along with enticing deals.

How could this affect me? If you're considering purchasing a foldable phone, this deal presents a cost-effective option with premium features. The added bonuses, such as the Bose earbuds or the Best Buy gift card, enhance the overall value proposition.

Rossen Reports: Tricks You Never Knew Your Smartphone Could Do

Source: WDSU

Summary: Jeff Rossen, Chief National Consumer Correspondent, reveals hidden features and tricks that smartphones possess, eliminating the need for newer phones or additional apps. Some of these features include:

  • Medical Information: iPhones allow users to store medical data such as allergies, medications, and blood type in the Health app. In emergencies, this information can be accessed even when the phone is locked. Android users can find a similar feature under "Settings" > "Safety and Emergency" > "Medical Info."

  • Fight Eye Fatigue: iPhones have a "Night Shift" mode under "Settings" > "Display & Brightness" that adjusts the screen's colors to warmer tones at night, reducing blue light exposure. Androids offer a "Night Light" feature under "Settings" > "Display."

  • Split Screen: Androids provide a split-screen feature, allowing users to use two apps simultaneously. Not all apps support this feature.

  • Share Location: iPhones let users share their current location via text messages. Android users can share their location using Google Maps.

  • Fix Typos: iPhones have a "Shake to Undo" feature to correct mistakes in texts, emails, or notes. Samsung Androids offer swipe controls for the same purpose.

What’s the importance of this article? The article provides valuable insights into the lesser-known features of smartphones, enabling users to maximize their device's potential without needing upgrades or additional apps.

How could this affect me? Understanding these hidden features can enhance your smartphone experience, making daily tasks more efficient and convenient. It also helps in emergencies, such as accessing medical information when the phone is locked.

Cybersecurity General Tip of the Issue

Secure File Sharing and Collaboration Across Platforms

Summary: In our interconnected world, file sharing and collaboration are integral to both personal and professional tasks. Whether it's sharing family photos, collaborating on a work project, or sending crucial documents, it's vital to ensure these files are shared securely. This is especially relevant across all platforms, including Apple, Android, Windows, and Linux.

Why is this important? Insecure file sharing can lead to various threats such as data breaches, malware infections, and unauthorized access. With the increasing number of cyber-attacks, ensuring the security of shared files has become more crucial than ever. It's not just about protecting the content of the files but also about safeguarding the integrity and confidentiality of the data.

How to Implement:

  1. Understand the Risks: Be aware of the potential dangers of insecure file sharing.

  2. Choose the Right Platform: Opt for platforms and collaboration tools with robust security features.

  3. Use Encryption: Prioritize end-to-end encryption for file sharing.

  4. Set Access Control: Define permissions and understand user roles in shared folders/documents.

  5. Opt for Temporary Sharing: Use links that expire to ensure limited access.

  6. Enable Two-Factor Authentication: Add an extra security layer for accessing shared files.

  7. Monitor and Audit: Regularly check who accessed or modified a file.

  8. Ensure Cross-Platform Compatibility: Make sure files are securely shared across different OS and devices.

  9. Local Sharing Best Practices: Share files within a local network securely.

The Apple Ecosystem

Apple Event Recap: 4 Key Things to Know

Source: MacRumors

Summary: Apple recently held its Mac-focused "Scary Fast" event. In a concise 30-minute presentation, Apple unveiled new 14-inch MacBook Pro, 16-inch MacBook Pro, and 24-inch iMac models equipped with the M3 series chips. The new MacBook Pro models come with M3 Pro and M3 Max chips, offering significant performance and power efficiency enhancements. They also feature a rearchitected GPU that supports hardware-accelerated ray tracing and mesh shading. The 24-inch iMac has been updated with the M3 chip, delivering up to 35% faster performance compared to its predecessor with the M1 chip. Additionally, there were expectations for Apple to introduce USB-C ports for the Magic Keyboard, Magic Mouse, and Magic Trackpad, but they remain equipped with Lightning. The event also highlighted that no new iPads would be released this year, with potential releases expected in March 2024 or later.

What’s the importance of this article? This article provides a concise recap of Apple's recent "Scary Fast" event, highlighting the key product announcements and updates. For Apple enthusiasts and potential buyers, this summary offers a quick overview of what to expect from the latest devices in the Apple ecosystem.

How could this affect me? If you're an Apple user or considering purchasing Apple products, this article gives you insights into the latest offerings from the tech giant. Whether you're looking to upgrade your MacBook Pro or interested in the new features of the updated iMac, this recap provides essential details to inform your decision.

Apple Watch to Introduce Blood Pressure, Sleep Apnea Features, and Health Coach Service

Source: CNBC

Summary: Apple is gearing up to launch new health features for its Apple Watch in the upcoming year. A report from Bloomberg reveals that the watch will incorporate a system for detecting sleep apnea and a blood pressure sensor. Additionally, Apple is venturing into a paid health coaching service, which could be a new avenue for Apple to generate recurring subscription revenues. This service is expected to recommend workouts, possibly through its paid Fitness+ app, and suggest eating plans. The blood pressure sensor will detect elevated blood pressure levels but won't display exact measurements. Apple is also planning to introduce specific diastolic and systolic metrics in future watch models. The upcoming Apple Watch will monitor breathing and sleeping habits to predict sleep apnea and will recommend consulting a doctor if potential sleep apnea is detected.

What’s the importance of this article? This article underscores Apple's continuous commitment to enhancing the health features of its Apple Watch, making it a more comprehensive health monitoring device. The introduction of features like sleep apnea detection and blood pressure monitoring can be crucial for users who want to keep a close eye on their health metrics.

How could this affect me? If you're an Apple Watch user or considering purchasing one, these new features can provide added value, especially if you're health-conscious. The ability to monitor potential health issues like sleep apnea or elevated blood pressure can be beneficial for early detection and intervention. Additionally, the health coaching service can offer personalized recommendations to improve your overall well-being.

Do You Have the Latest AirTag Firmware Update? How to Check

Source: ZDNet

Summary: Apple's AirTags are receiving a new firmware update, but Apple does not advertise these updates nor allows users to manually download and install them. However, users can check if they have the latest firmware. The recent update is version 2.0.61, with a phased rollout that will be completed by November 28th. The previous firmware was version 2.0.36 released in December 2022. Apple's updates to the AirTag are sporadic, and the company doesn't always detail the new features. However, with iOS 17, iPhone users can now share an AirTag with another iPhone owner, a feature that wasn't available before. Once the latest update is available to all AirTag owners, Apple is expected to announce the new features or bug fixes that firmware version 2.0.61 includes.

What’s the importance of this article? This article informs Apple AirTag users about the latest firmware update and how to check if they have received it. It's crucial for users to be aware of these updates as they often bring new features, improvements, or bug fixes that enhance the device's functionality and user experience.

How could this affect me? If you own an Apple AirTag, staying updated with the latest firmware ensures that you are utilizing the device to its fullest potential and benefiting from any new features or improvements. It's also essential for security and optimal performance.


The Apple Ecosystem Security Tip of the Issue

Secure File Sharing and Collaboration Across Apple Platforms

Summary: In today's interconnected world, sharing and collaborating on files is a routine task. However, ensuring that these files are shared securely is paramount, especially when dealing with sensitive or confidential information. Apple's ecosystem, which includes iOS, iPadOS, macOS, and watchOS, offers a range of tools and settings to ensure secure file sharing and collaboration.

Why is this important? With the increasing number of cyber threats, the way we share and access files can be a potential vulnerability. Ensuring secure file sharing not only protects the data being shared but also safeguards the devices involved from potential threats. Apple's ecosystem, known for its emphasis on user privacy and security, provides several features to help users share files securely.

How to Implement:

  1. Use iCloud Drive: iCloud Drive encrypts your data using AES 128-bit encryption. When sharing files or folders, generate a private link and share it with specific people. This ensures that only those with the link can access the file.

  2. AirDrop with Contacts Only: When using AirDrop, set your discoverability to "Contacts Only." This ensures that only people in your contacts can see your device and share files with you.

  3. Use FileVault on macOS: FileVault encrypts the entire drive on your Mac, ensuring that files are secure both at rest and during transfers.

  4. Leverage App-specific Passwords: When using third-party apps for collaboration, like Dropbox or Microsoft Teams, generate app-specific passwords. This adds an extra layer of security.

  5. Regularly Update Your Devices: Ensure that iOS, iPadOS, macOS, and watchOS are updated regularly. Updates often contain security patches that protect against known vulnerabilities.

  6. Use Two-Factor Authentication: Enable two-factor authentication for your Apple ID. This ensures that even if someone knows your password, they won't be able to access your files without the second authentication factor.

By following these steps, you can ensure that file sharing and collaboration across Apple's ecosystem are both seamless and secure.

Samsung & Android

The Snapdragon 8 Gen 3 for Galaxy Will Offer an Overclocked GPU Allowing for Faster Gaming Performance

Source: Wccftech

Summary: The Snapdragon 8 Gen 3 is expected to be a part of the Galaxy S23 series and will offer an overclocked GPU. This enhancement will allow for faster gaming performance, making it a significant upgrade for gaming enthusiasts. The Snapdragon 8 Gen 3 is expected to be a major selling point for the Galaxy S23 series.

What’s the importance of this article? The introduction of the Snapdragon 8 Gen 3 with an overclocked GPU in the Galaxy S23 series highlights Samsung's commitment to providing top-tier gaming performance on its devices. This move is likely to attract gamers and tech enthusiasts.

How could this affect me? If you are a gaming enthusiast or someone who prioritizes high-performance graphics on mobile devices, the Galaxy S23 series might be an attractive option for your next upgrade.

One UI 6: Release Date, Confirmed Features, and Device Compatibility

Summary: Samsung's One UI 6, based on Android 14, is the latest update to one of the most popular Android skins. This update primarily focuses on aesthetic changes, minor menu tweaks, and refining the overall One UI experience. Major new features are not expected this time. The One UI 6 has started rolling out in various regions, and a US rollout is anticipated soon.

What’s the importance of this article? The article provides insights into the latest features and improvements that Samsung users can expect with the One UI 6 update. It emphasizes Samsung's continuous efforts to refine and enhance the user experience on its devices.

How could this affect me? If you own a Samsung device, especially the ones mentioned as compatible, you can anticipate receiving the One UI 6 update. This will bring a refreshed look and potentially smoother user experience to your device.

Samsung Galaxy Tab S9 FE Plus Review: Should You Buy It?

Summary: The Samsung Galaxy Tab S9 FE Plus is positioned as a premium tablet without the high-end price tag. It offers a smooth One UI experience, 45W fast charging, and comes with an S Pen. Priced at $599, it provides a quality build, good software support, and a durable IP68 rating. However, it lacks 5G support on this model and has a good but not top-tier processor.

What’s the importance of this article? The review provides a comprehensive look at the Samsung Galaxy Tab S9 FE Plus, highlighting its strengths and areas where it might fall short compared to other tablets in the market.

How could this affect me? If you're in the market for a new tablet, this review offers valuable insights into what the Samsung Galaxy Tab S9 FE Plus has to offer. It can help you make an informed decision about whether this tablet aligns with your needs and preferences.

Samsung & Android Security Tip of the Issue

Secure File Sharing and Collaboration on Android and Samsung Devices

Summary: With the increasing reliance on mobile devices for both personal and professional tasks, secure file sharing and collaboration have become paramount. Android and Samsung devices, being among the most popular, offer a plethora of options for users to share files securely. However, it's essential to understand and implement best practices to ensure that your data remains confidential and doesn't fall into the wrong hands.

Why is this important? In today's digital age, data breaches and cyberattacks are rampant. Sharing files without adequate security measures can expose sensitive information, leading to potential financial, personal, or professional repercussions. Ensuring secure file sharing on frequently used devices like those running on Android or Samsung's ecosystem is a proactive step towards safeguarding your data.

How to Implement:

  1. Use Trusted Apps: Always use trusted file-sharing apps from the Google Play Store. Apps like Samsung's "Secure Folder" or Google's "Files" come with built-in encryption and security features.

  2. Enable Encryption: Ensure that your device's data is encrypted. Most modern Android and Samsung devices offer this feature. Navigate to Settings > Biometrics and Security > Encrypt Device.

  3. Avoid Public Wi-Fi: Refrain from sharing files when connected to public Wi-Fi networks. If necessary, use a VPN.

  4. Regularly Update Apps: Ensure that all your file-sharing apps are regularly updated. Developers often release security patches to address vulnerabilities.

  5. Use Two-Factor Authentication: If you're using cloud-based file-sharing solutions like Google Drive or Samsung Cloud, enable two-factor authentication for an added layer of security.

  6. Check File Permissions: Before sharing, check the file's permissions and ensure it's not accessible to unintended users or apps.

  7. Logout After Collaboration: If you're collaborating on a shared document or file, ensure you log out after your session, especially if you're using a third-party device or platform.

By following these steps, you can ensure that your file sharing and collaboration activities on Android and Samsung devices remain secure and confidential.

Microsoft & Windows

Microsoft's 'Secure Future' Initiative Aims to Strengthen Cybersecurity

Source: The Verge

Summary: Microsoft has launched the 'Secure Future' initiative, aiming to bolster cybersecurity across its vast array of products and services. This move is in response to the growing number of cyber threats and the need to ensure users have the tools and resources to protect themselves. The initiative will focus on four main areas: securing the software supply chain, protecting sensitive data, safeguarding cloud services, and ensuring the security of end-user devices.

What’s the importance of this article? This initiative underscores Microsoft's commitment to cybersecurity, emphasizing the importance of user protection in an increasingly digital age.

How could this affect me? Users of Microsoft products and services can anticipate more robust security measures, tools, and resources in the near future, offering enhanced protection against potential cyber threats.

Windows 11's Significant 2023 Update Now Available

Source: PCWorld

Summary: Microsoft has released a significant update for Windows 11, bringing a plethora of new features and improvements. This update includes enhancements to the taskbar, a revamped Microsoft Store, new window management features, and more. Additionally, the update promises better performance, with improvements in speed and responsiveness.

What’s the importance of this article? The article showcases Microsoft's continuous efforts to refine and enhance Windows 11, ensuring users have the best experience possible.

How could this affect me? If you're a Windows 11 user, this update offers a range of new features and improvements that can enhance your computing experience. Regular updates are crucial for system security and performance.

Microsoft 365's 'CoPilot' Now Generally Available

Source: CNBC

Summary: Microsoft's CoPilot, a feature for Microsoft 365, is now generally available to users. CoPilot uses artificial intelligence to assist users in creating and editing documents by offering real-time suggestions. It can help in refining content, ensuring consistency, and improving overall document quality. The feature is expected to enhance productivity for Microsoft 365 users.

What’s the importance of this article? The general availability of CoPilot signifies Microsoft's push towards integrating AI into its productivity tools, aiming to provide users with smarter and more efficient capabilities.

How could this affect me? If you're a Microsoft 365 user, CoPilot can significantly streamline your document creation process, offering real-time suggestions and improvements, which can save time and enhance the quality of your work.

Microsoft & Windows Security Tip of the Issue

Secure File Sharing and Collaboration in Microsoft Products

Summary: Microsoft offers a suite of tools and services designed to facilitate secure file sharing and collaboration. Leveraging these tools ensures that your data remains protected while enhancing productivity and teamwork.

Why is this important? As cyber threats continue to evolve, the need for secure collaboration has never been more critical. Microsoft's ecosystem, being widely used in businesses and personal tasks, is often a target. Ensuring secure file sharing within this ecosystem not only protects sensitive data but also fosters trust among collaborators.

How to Implement:

  1. Use OneDrive: OneDrive, Microsoft's cloud storage solution, comes with built-in security features. Always share links instead of sending files. Use the "Anyone with the link can edit" option judiciously and set expiration dates for shared links.

  2. Leverage Microsoft Teams: For team collaborations, Microsoft Teams provides a secure platform where files can be shared within the chat and access can be controlled.

  3. Set Permissions in SharePoint: If using SharePoint for collaboration, always set precise permissions. Avoid giving 'full control' unless necessary.

  4. Use Windows' Built-in File Encryption: Before sharing, you can encrypt files using Windows' Encrypting File System (EFS) to add an extra layer of security.

  5. Regularly Update Software: Ensure that all Microsoft software (Windows, Office, etc.) is regularly updated. These updates often contain security patches.

  6. Educate & Train: Ensure that all team members are aware of best practices for secure file sharing and the risks associated with non-compliance.

By following these steps, you can ensure that your collaborations within the Microsoft ecosystem are both productive and secure.

Scams to Watch Out For

Black Friday and Cyber Monday Scams: Beware of the Pitfalls

Source: McAfee

Summary: The holiday shopping season, especially Black Friday and Cyber Monday, is a prime time for online scams. As shoppers rush to grab the best deals, they often let their guard down, making them easy targets for scammers. This article by McAfee highlights various scams that consumers should be wary of during the shopping bonanza.

Key Takeaways:

  • Understanding the Scams: Scammers exploit human emotions like urgency, fear, or stress, especially during the holiday season. Recognizing these scams is crucial to avoid becoming a victim.

  • Fake Order Scam: Scammers send fake order confirmations via email or text containing malware or phishing links. Always track orders directly from the seller’s website.

  • Phony Tracking Number Scam: Fraudsters send fake package tracking notifications as email attachments. Genuine retailers never send tracking numbers this way.

  • Bogus Website Scam: Scammers create fake email addresses and URLs resembling legitimate companies. These lead to scam sites that capture login credentials and payment information.

  • Hot Deal Scam: Scammers create fake websites offering popular items that are hard to find. These scams can result in paying for a product that never arrives.

  • Fake Charity Scam: Scammers set up bogus charities and employ high-pressure tactics to get donations. Always verify the legitimacy of a charity before donating.

  • False Discount Scam: Scammers lure victims with ads offering significant discounts on popular products. These ads usually redirect to fraudulent websites.

  • Social Media Gift Exchange Scam: A gift exchange scam often resurfaces on social media during the holiday season. This scam is deceptive and illegal.

  • Fraudulent Gift Card Scam: Scammers use emails or text messages pretending you've received a gift card. These messages often contain malicious links.

  • Non-existent E-tailer Scam: Scammers create fake e-commerce sites offering massive discounts. These sites vanish after collecting money.

  • Smishing Scam: Scammers send text messages posing as reputable companies to trick individuals into revealing personal information.

The article emphasizes the importance of being vigilant and taking precautions to ensure a safe shopping experience during Black Friday and Cyber Monday. It also recommends equipping devices with security solutions to further enhance online safety.

Thank You, Hard Targets!

Thank you for taking the time to read this issue. Your continuous support means the world to us, and it's what drives us to deliver top-notch content in every release.

We have a small request: if you found value in our newsletter, could you introduce a friend or family member to it? By getting them to subscribe before our next issue, you'll be playing a pivotal role in helping our newsletter grow. This growth allows us to offer even better content and exclusive discounts on tech and security products and services. We're counting on you, our dedicated Hard Targets, to spread the word and make our community even stronger.

Once again, thank you for your unwavering support. If you haven't already, don't miss out on our Artwork Insider Access for a deeper dive into the creative minds behind our artwork.

Stay vigilant, stay informed, and always remain a Hard Target!

Links

Kingdom Dominion Security

& Technology

Subscribe to Premium to read the rest.

Become a paying subscriber of Premium to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In.

A subscription gets you:

  • • Exclusive Artwork Access: Get your hands on all the additional artwork that didn't make it to the main issue. A unique collection curated just for our premium members.
  • • Behind-the-Scenes Insights: Understand the story behind each artwork. Discover the inspiration, the challenges, and the evolution of each piece.
  • • Early Access to New Releases: Be the first to view our upcoming artwork even before it's released to the general public. A sneak peek into our creative world.
  • • Special Discounts on Merchandise: Enjoy exclusive discounts on our merchandise, from prints to apparel. A token of appreciation for our premium members.

Reply

or to participate.