• Smart Intel Briefing
  • Posts
  • The Cybersecurity Crucible - Forging Hard Targets – 16 October 2023 | KD Sec & Tech Secure

The Cybersecurity Crucible - Forging Hard Targets – 16 October 2023 | KD Sec & Tech Secure

Navigating the Cyber Frontier: Threats, Solutions, and Insights

Introduction

This issue is dedicated to James E Walker

August 10, 1950 ~ October 7, 2023

Hello, Hard Targets!

Welcome back, Hard Targets! We're thrilled to have you with us for another insightful edition of our newsletter. In this issue, we delve deep into the world of cybersecurity, shedding light on the latest scams to watch out for and offering actionable tips to fortify your defenses. Our featured artwork beautifully captures the essence of digital vigilance, reminding us all of the importance of staying alert in the digital realm.

If you're joining us for the first time, don't miss out on our future editions. Subscribe here to ensure you're always in the loop. Our newsletter stands as a valuable asset, arming you with the knowledge and tools to navigate the ever-evolving cyber landscape confidently. We pride ourselves on delivering timely, relevant content, with new issues released semi-weekly, every Monday and Friday.

In this edition, apart from the scams to watch out for, we'll also be sharing expert insights, key takeaways, and actionable advice to help you stay a step ahead of potential threats. Remember, knowledge is power, and with every issue, we aim to empower you to become an even harder target for cyber adversaries.

Stay safe, stay informed, and let's dive in!

Cybersecurity Pop Quiz

Test Your Cybersecurity Knowledge With Our Quick Quiz: Are You a True Hard Target?

Question 1: Which of the following best describes the principle of "Defense in Depth" in cybersecurity?

a) Relying solely on a strong perimeter defense
b) Implementing multiple layers of security controls throughout an information system
c) Using only one type of security measure for all assets
d) Depending on deep learning algorithms for all security decisions

Question 2: In the context of cybersecurity, what does "Endpoint Security" primarily refer to?

a) Securing the endpoints of a network cable
b) Protecting the data as it travels over the network
c) Securing remote access to a corporate network
d) Protecting individual devices like computers and mobile devices from threats

Question 3: Which of the following is NOT a primary function of a Security Information and Event Management (SIEM) system?

a) Aggregating log data from multiple sources
b) Providing real-time analysis of security alerts
c) Encrypting data at rest
d) Identifying patterns that might indicate a breach

Answers:

  1. b) Implementing multiple layers of security controls throughout an information system

  2. d) Protecting individual devices like computers and mobile devices from threats

  3. c) Encrypting data at rest

Cybersecurity News and Emerging Technology

T-Mobile’s Automatic Plan Upgrades Are Causing Chaos for Customer Service

Source: The Verge 

Summary: T-Mobile has recently implemented automatic plan upgrades, leading to widespread confusion and increased customer service complaints. Many customers have been unexpectedly moved to the Magenta MAX plan, which offers unlimited premium data and other benefits, but at a higher cost.

What’s the importance of this article? The article highlights the challenges and potential pitfalls companies face when making unilateral decisions that affect their customer base, especially without clear communication.

How could this affect me? If you're a T-Mobile customer, it's essential to check your plan and billing details to ensure you haven't been unintentionally upgraded and charged more.

House Republicans Had Their Cell Phones Confiscated Before the Speaker Vote

Source: Business Insider 

Summary: In a recent move, House Republicans had their cell phones confiscated before a crucial speaker vote. This action was taken to ensure that the voting process remained confidential and free from external influences.

What’s the importance of this article? The article underscores the lengths to which political entities might go to maintain the integrity of internal processes and decisions.

How could this affect me? While this event might not directly impact most individuals, it serves as a reminder of the importance of confidentiality and security in decision-making processes.

Uber Sexual Assault Survivors Call for In-Car Cameras, Tech Upgrades

Source: TechCrunch 

Summary: Survivors of sexual assault incidents involving Uber rides are calling for the company to implement in-car cameras and other technological upgrades to enhance safety. These demands come as part of a broader push for improved safety measures within the ridesharing industry.

What’s the importance of this article? The article emphasizes the ongoing concerns regarding rider safety in the ridesharing industry and the potential technological solutions that could address these issues.

How could this affect me? If you frequently use ridesharing services like Uber, these proposed changes could directly impact your safety and overall experience.

NASA's Psyche Mission to a Metal World Now Has a SpaceX Rocket to Launch On

Source: Digital Trends 

Summary: NASA's Psyche mission, aimed at exploring a metal-rich asteroid, now has a designated SpaceX rocket for its launch. This mission will provide insights into the building blocks of planet formation.

What’s the importance of this article? The article sheds light on the collaborative efforts between NASA and SpaceX and the continued exploration of our solar system.

How could this affect me? While the mission's direct impact might be limited, understanding our universe's intricacies can lead to technological advancements and a broader understanding of space.

Goodbye to More DVDs: Best Buy Plans to Phase Out Sales of Physical Movies

Source: US News 

Summary: Best Buy, one of the largest electronics retailers, has announced plans to phase out the sale of physical movies in the coming months. This decision reflects the changing consumer preferences towards streaming and digital content.

What’s the importance of this article? The article indicates a significant shift in the entertainment industry, with physical media becoming increasingly obsolete.

How could this affect me? If you prefer physical copies of movies, this change might limit your options for purchasing DVDs and Blu-rays in the future.

Cybersecurity General Tip of the Issue

Secure Browsing Habits: Protecting Your Online Footprint

Summary: As our digital lives expand, so does our online footprint. Secure browsing habits are essential practices that help safeguard our personal information, preferences, and activities from potential threats and unwanted eyes.

Why is this important? Every click, search, and interaction online can be tracked, stored, and potentially exploited. Adopting secure browsing habits minimizes the risk of data breaches, identity theft, and other cyber threats. It also ensures that our online behavior doesn't become an easy target for malicious actors.

How to Implement:

  1. Use a trusted VPN to encrypt your internet connection.

  2. Regularly clear cookies and browsing history.

  3. Use incognito or private browsing modes when necessary.

  4. Be cautious about the extensions and plugins you install.

  5. Always ensure you're visiting HTTPS websites, especially when entering personal information.

The Apple Ecosystem

How to leave a FaceTime video message

Source: CNBC

Summary: Apple has introduced a new feature that allows users to leave video messages through FaceTime. This feature is similar to voicemail but for video, enhancing the communication experience for iOS users.

What’s the importance of this article? With the increasing use of video calls, Apple's introduction of video messages on FaceTime indicates the tech giant's move to make communication more versatile and user-friendly on its platform.

How could this affect me? If you're an Apple device user, this feature can enhance your communication experience, allowing you to leave video messages for contacts who might be unavailable for a live call.

Instructions:

  1. Update your phone: Ensure your iPhone is running iOS 17. You can check and update by navigating to Settings > General > Software Update.

  2. Initiate a FaceTime call: Open the FaceTime app, tap the New FaceTime button, select the contact you wish to call, and then tap the FaceTime icon at the bottom.

  3. Record the video message: If the recipient doesn't answer, you'll have the option to record a video message. A countdown will be displayed, after which you can start recording. After recording, you can choose to retake, send, save the video message to your Camera Roll, or cancel.

  4. Retrieving a FaceTime message: The recipient will see your video message in their missed call log within the FaceTime app. They can choose to return the call, view the video message, or save it to their Camera Roll.

Keep your device updated to receive the latest features.

Apple could lose $20 billion a year if Google loses DOJ antitrust case

Source: Apple Insider

Summary: Apple could face a significant financial impact if Google loses its ongoing antitrust case with the Department of Justice. The tech giant could potentially lose up to $20 billion annually.

What’s the importance of this article? The potential financial implications for Apple highlight the interconnectedness of big tech companies and the ripple effects that legal decisions can have across the industry.

How could this affect me? If you're an investor or stakeholder in Apple or Google, or if you closely follow the tech industry, such developments could have implications for stock performance and the broader tech market landscape.

Warren Buffett relies on stocks now that Apple is crumbling

Summary: Warren Buffett's significant investment in Apple (AAPL) has been a setback for Berkshire Hathaway (BRKB) recently. However, eight other U.S.-listed stocks in Berkshire's portfolio, such as Charter Communications (CHRT) and T-Mobile US (TMUS), have shown positive performance since the S&P 500 peaked on July 31. Despite Apple accounting for 55% of Berkshire Hathaway's U.S.-listed stock portfolio, its value has decreased by 8% since July, resulting in a loss of $14.4 billion in just over two months.

In contrast, nearly 84% of Berkshire Hathaway's 49 U.S.-listed stocks have declined since July 31, with an average drop of more than 11%. Apple's stock, despite being up by almost 39% this year, has been underperforming, especially when compared to tech giants like Alphabet (GOOGL) and Meta Platforms (META). Analysts predict a 1% decline in Apple's adjusted profit per share this fiscal year.

On the brighter side, Charter Communications has been Buffett's top-performing stock since July 31, with a gain of 10.5%. However, its contribution to Berkshire Hathaway's portfolio is minimal, adding only $163.6 million in value. Similarly, T-Mobile's shares have risen by 2.3% since July 31, but its impact on the portfolio is negligible with a $16.7 million gain.

What’s the importance of this article? The article offers a deep dive into the current state of Warren Buffett's investments, especially his heavy reliance on Apple and its recent underperformance. It provides insights into how other stocks in Berkshire Hathaway's portfolio are faring, which is crucial for investors and market analysts.

How could this affect me? For investors or those considering investing in Apple or any of the stocks in Berkshire Hathaway's portfolio, this article provides a comprehensive overview of their recent performance. It underscores the importance of diversification and the risks associated with heavily relying on a single stock, even if it's a tech giant like Apple.

Key Financial Insights:

  • Apple's stock has decreased by 8% since July, leading to a $14.4 billion loss for Berkshire Hathaway in just over two months.

  • Charter Communications, one of the top-performing stocks in Buffett's portfolio since July 31, has gained 10.5%.

  • T-Mobile's shares have seen a 2.3% rise since July 31, but its contribution to the portfolio is minimal.

  • Occidental Petroleum, of which Buffett owns a quarter, has grown by just 0.1% since the market pullback.

The Apple Ecosystem Security Tip of the Issue

Secure Browsing Habits: Protecting Your Online Footprint in the Apple Ecosystem

Summary: With the increasing amount of personal and sensitive information we share online, it's crucial to adopt secure browsing habits. This not only protects your data from potential cyber threats but also ensures a safer online experience.

Why is this important? Apple devices are known for their security features, but they're not invincible. Adopting secure browsing habits on your Apple devices ensures that you're leveraging the full potential of Apple's security infrastructure while also adding an extra layer of protection against potential threats.

How to Implement:

  1. iOS & iPadOS:

    • Use Safari's built-in privacy features: Enable "Prevent Cross-Site Tracking" and "Block All Cookies" in Safari settings.

    • Regularly clear browsing history and website data.

    • Use private browsing mode when needed.

  2. macOS:

    • In Safari, use the "Privacy Report" feature to see which known trackers are being blocked.

    • Consider using a VPN for an added layer of privacy.

    • Ensure that your macOS firewall is turned on and set to block incoming connections.

  3. watchOS:

    • Limit web browsing on your Apple Watch to trusted sites.

    • Ensure that your watchOS is updated to the latest version to benefit from the latest security patches.

Samsung & Android

Samsung One UI 6.0: Android 14 Features, Eligible Devices, and Release Date

Source: Sammy Fans

Summary: Samsung has unveiled its One UI 6.0, which will be based on Android 14. This update promises enhanced privacy features, a refreshed design, and improved performance. Notable features include a new privacy dashboard, microphone and camera indicators, and simplified widget organization. Samsung Galaxy S23, S23+, and S23 Ultra are among the first devices to receive this update, with a broader rollout expected soon.

Samsung One UI 6.0: A Comprehensive Look

Samsung's One UI 6.0, based on Android 14, is set to bring a plethora of changes to the Galaxy devices. Here's a deeper dive into what users can expect:

  • Visual Overhaul: One of the most noticeable changes is the visual overhaul. A new system font gives a modern look, and the dropdown menu has been redesigned for better usability. Additionally, Samsung has updated its emoji set, aligning it more with other platforms.

  • Camera App Interface: The Camera app has been streamlined. Users can now easily switch between 12MP and 50MP images in Photo mode. In Video mode, selecting resolution and frame rate has been made more intuitive.

  • Gallery Enhancements: The gallery app now features an "i" button for easier access to photo details. The editing interface has also been improved, offering undo and redo buttons for image editing.

  • Weather App: The Weather app has been redesigned, now predominantly blue. It provides larger sections for the sunrise and moon phases.

  • Auto Blocker Feature: Located under the Security and Privacy menu, this feature enhances protection by blocking apps from unauthorized sources and performing security checks on existing apps.

  • Battery Page in Settings: The Battery page has been moved to the Settings home page, providing detailed insights about battery usage.

  • Smart Select: This feature has been improved to show the aspect ratio, and a magnifier helps users make precise selections.

  • Waveform Animation for Music: A new animated waveform appears while playing music, adding a visual element to the listening experience.

  • Update Rollout: The Galaxy S23 series is expected to be the first to receive the Android 14-based One UI 6.0 in October. The Galaxy S22 and Galaxy S21 series are anticipated to get the update by the end of the year.

What’s the importance of this article? The introduction of One UI 6.0 showcases Samsung's commitment to providing its users with the latest Android features, ensuring enhanced user experience, privacy, and device performance.

How could this affect me? If you own a Samsung device, especially one of the newer models, you can anticipate receiving this update. It's crucial to be aware of the new features and improvements to make the most of your device.

Samsung Launches Galaxy SmartTag2 Tracker to Rival Apple AirTag

Source: iClarified

Summary: Samsung has introduced the Galaxy SmartTag2, a direct competitor to Apple's AirTag. This device assists users in tracking and locating misplaced items using Bluetooth technology. The Galaxy SmartTag2 boasts a longer battery life and a built-in speaker to help locate items. It seamlessly integrates with Samsung's SmartThings Find service.

What’s the importance of this article? With the introduction of the Galaxy SmartTag2, Samsung is directly competing in the item-tracking market, offering an alternative to Apple's AirTag. This highlights the growing importance and demand for such devices in our daily lives.

How could this affect me? If you're in the market for an item tracker or are already using similar products, the Galaxy SmartTag2 offers a new option to consider, especially if you're integrated into the Samsung ecosystem.

Happy New Year! Samsung Galaxy S24 Series May Be Released Month Earlier at January 2024 'Unpacked' Event; Ultra Version Might Sport iPhone 15 Pro-Like Titanium Frame

Summary: Samsung is reportedly planning an early release for its Galaxy S24 series, with a launch date set for January 2024. This strategic move is seen as a response to the early release of Android devices powered by the Snapdragon 8 Gen 3 SoC. The upcoming S24 series will feature Exynos chips in most regions, but selected countries may receive the Snapdragon 8 Gen 3 processors. The Galaxy S24 Ultra is expected to exclusively sport the Snapdragon 8 Gen 3 chip. Additionally, the series will feature LTPO Dynamic AMOLED 2x displays, Android 14-based One UI 6.1, and impressive camera capabilities. Notably, the Galaxy S24 Ultra might come with a titanium frame, similar to Apple's iPhone 15 Pro.

What’s the importance of this article? The article sheds light on Samsung's strategic decision to release its Galaxy S24 series earlier than its usual schedule. This move is significant as it indicates Samsung's intent to compete aggressively in the market, especially against other Android devices powered by the latest Snapdragon processors.

How could this affect me? If you're a Samsung enthusiast or considering upgrading your smartphone in the near future, this article provides insights into what to expect from the upcoming Galaxy S24 series. The early release, combined with the advanced features and hardware specifications, suggests that Samsung is pushing the boundaries to offer top-tier devices to its consumers.

Samsung & Android Security Tip of the Issue

Secure Browsing Habits on Samsung & Android Devices

Summary: Browsing the internet securely is crucial to protect your personal data and maintain privacy. Samsung and Android devices come equipped with features and settings that can enhance your online security, ensuring a safer browsing experience.

Why is this important? With the increasing number of cyber threats targeting mobile devices, it's essential to adopt secure browsing habits. Samsung and Android devices, being widely used, are frequent targets for cybercriminals. By understanding and implementing secure browsing practices on these devices, users can significantly reduce the risk of falling victim to online threats.

How to Implement:

  1. Use Secure Browsers: Opt for browsers like Samsung Internet or Google Chrome, which offer built-in security features such as phishing protection and safe browsing mode.

  2. Regularly Clear Browsing Data: Periodically clear your browsing history, cookies, and cache to prevent tracking and potential data breaches.

  3. Enable 'Do Not Track': Both Samsung Internet and Chrome offer a 'Do Not Track' feature. When enabled, it requests websites not to track your browsing behavior.

  4. Use Incognito Mode: When browsing sensitive information, use the incognito or private browsing mode to ensure your activities aren't recorded.

  5. Update Regularly: Ensure your browser and OS are updated to the latest versions. Updates often contain security patches for known vulnerabilities.

  6. Download Apps from Trusted Sources: Only download apps from the Google Play Store or Samsung Galaxy Store. Avoid third-party app stores as they might host malicious apps.

  7. Be Wary of Permissions: Always check app permissions. If a simple game is asking for access to your contacts, it's a red flag.

By following these steps, Samsung and Android users can ensure a more secure and private browsing experience.

Microsoft & Windows

Analysis: Microsoft Now Owns Activision Blizzard, Which Shifts the Balance of Power in the Video Game Industry

Source: GeekWire


Summary: Microsoft's recent acquisition of Activision Blizzard is a game-changer, quite literally. By integrating one of the largest game publishers into its fold, Microsoft has positioned itself as a dominant force in the gaming industry. This move is not just about adding popular titles like "Call of Duty" or "World of Warcraft" to its portfolio; it's about reshaping the future of gaming.

What’s the importance of this article? The acquisition is a strategic move by Microsoft to bolster its Xbox and Game Pass offerings. With Activision Blizzard's extensive library of games, Microsoft can potentially offer more exclusive content to its subscribers, making its gaming services more attractive. Furthermore, this merger could lead to deeper integrations between Activision Blizzard games and Microsoft's cloud gaming technology, potentially revolutionizing how games are played and delivered. The deal also signifies the tech giant's vision of a more interconnected and immersive gaming ecosystem, where games are accessible across multiple devices seamlessly.

How could this affect me?

  • For Gamers: Expect to see more Activision Blizzard titles appearing on Xbox Game Pass, offering more value for subscribers. There might also be enhanced gaming experiences, with better cloud integration, cross-platform play, and possibly even exclusive content or early access to new releases for Microsoft platform users.

  • For Developers: The merger could lead to more resources and tools being available for game development, especially for those under the Microsoft-Activision umbrella. This might also set a precedent for how game development is approached, with a potential focus on cloud-first strategies.

  • For Investors: Microsoft's stock could see fluctuations based on the success and integration of this acquisition. It's also a sign of Microsoft's aggressive push into gaming, indicating that they see significant growth potential in this sector. On the other hand, competitors in the gaming space might need to strategize their moves carefully, given Microsoft's strengthened position.

Microsoft Brings Copilot to OneDrive, Zoom Improves Collaboration with Docs & More News

Source: Reworked


Summary: Microsoft has introduced Copilot to OneDrive, enhancing file recommendations based on user activity. This feature aims to improve user productivity by suggesting relevant files. Additionally, Zoom has integrated with Docs to bolster collaboration.


What’s the importance of this article? The article emphasizes the continuous efforts by tech giants to enhance collaboration and productivity tools, especially in a world that's leaning more toward remote work.


How could this affect me? If you use OneDrive or Zoom, these updates could streamline your workflow and improve your collaborative efforts.

Intel's Core i7-14700K and Core i9-14900K Mistakenly Go on Sale Early


Summary: Intel's Raptor Lake refresh, which includes the Core i7-14700K and Core i9-14900K, has been mistakenly sold ahead of its official launch. A Reddit user reported purchasing the Core i7-14700K from an Indonesian retailer for 7.45 million IDR (approximately $476). The user has already posted benchmarks of the processor's performance. Additionally, the Core i9-14900K was listed on eBay by one of Europe's largest retailers, Alternate, and nine units were sold before the listing was removed.


What’s the importance of this article? This article highlights a significant oversight in the sale of Intel's upcoming CPUs before their official release. Such premature sales can lead to leaks of performance benchmarks and other critical details that companies typically want to control.


How could this affect me? For tech enthusiasts and potential buyers, this could provide an early insight into the performance and capabilities of Intel's new processors. However, it also serves as a reminder to be cautious about purchasing products that haven't been officially released, as there may be risks associated with early versions.

Microsoft & Windows Security Tip of the Issue

Secure Browsing Habits: Protecting Your Online Footprint in the Microsoft & Windows Ecosystem

Summary: As we increasingly rely on the internet for various tasks, it's crucial to adopt secure browsing habits, especially in the Microsoft & Windows ecosystem. This involves being cautious about the websites you visit, the information you share, and the tools you use to protect your online data.

Why is this important? Cyber threats are evolving, and attackers are always looking for vulnerabilities. By adopting secure browsing habits, you reduce the risk of falling victim to phishing attacks, malware, and other online threats. For users of Microsoft & Windows products, this is especially important given the vast number of services and integrations available.

How to Implement:

  1. Use Microsoft Edge's Enhanced Security Features: Microsoft Edge offers features like SmartScreen, which helps protect against malicious websites and downloads.

  2. Regularly Update Your OS and Browser: Ensure you're always using the latest version of Windows and Microsoft Edge, as updates often contain security patches.

  3. Be Wary of Suspicious Emails and Links: Even if they appear to come from a trusted source, always double-check URLs and avoid downloading attachments unless you're certain of their legitimacy.

  4. Use a VPN: Especially when on public Wi-Fi, a VPN can encrypt your online activity, making it harder for attackers to intercept your data.

  5. Enable Two-Factor Authentication: For added security on your Microsoft account and other online services, enable two-factor authentication. This provides an additional layer of security beyond just a password.

Scams to Watch Out For

Cyber Security Practices Can Help Avoid Scams

Source: YouTube

Summary: The video, hosted by Michael Clark and Karrie-Leggett Brown, discusses the increasing frequency of hacking incidents and the importance of cybersecurity. The video emphasizes that while hacking is common, there are preventative measures individuals can take to protect their data. Hannah Hayes provides insights into phishing, a prevalent cybercrime, and Justin Shows elaborates on how to recognize it. Amanda Mills from Dixie recommends changing passwords every 60 to 90 days and using a password manager to keep track of various online account passwords. She also stresses the importance of being cautious with unsolicited emails and messages, suggesting that if something seems off, it's best to delete the email without opening it. Amanda concludes by emphasizing the combination of using the right tools and practicing good habits to stay safe online.

Key Takeaways:

  • Phishing is a common cybercrime, and it's essential to recognize its signs.

  • Change your password every 60 to 90 days to ensure security.

  • Use a password manager to keep track of various online account passwords.

  • Be cautious of unsolicited emails or messages and avoid clicking on suspicious links or downloading attachments from unknown senders.

  • Staying safe online requires both the right tools and good habits. Always trust your instincts.

Thank You, Hard Targets!

Thank you for taking the time to read this issue. Your continued support means the world to us, and it's what drives us to deliver the best content possible. We genuinely appreciate every single one of you.

As we strive to grow and enhance our newsletter, we humbly ask for a small favor. If you found value in this issue, please consider introducing a friend or family member to our community. By getting them to subscribe, you're not only helping us reach a wider audience but also ensuring that we can offer even better content and exclusive discounts on tech and security products and services in the future.

Once again, thank you for your unwavering support. Remember, by staying informed and vigilant, we all become harder targets in the digital realm. Let's continue on this journey together, ensuring that we remain the toughest targets out there.

Stay safe and see you in the next issue!

Links

Kingdom Dominion Security

& Technology

Reply

or to participate.