• Smart Intel Briefing
  • Posts
  • The Cybersecurity Crucible - Forging Hard Targets – 20 November 2023 | KD Sec & Tech Secure

The Cybersecurity Crucible - Forging Hard Targets – 20 November 2023 | KD Sec & Tech Secure

Unveiling the Latest in Cybersecurity: AI Advancements, Tech Updates, and Essential Security Tips

Introduction

Hello, Hard Targets!

Welcome back, Hard Targets! We’re thrilled to bring you another issue filled with the latest cybersecurity developments and emerging technologies. As always, we’ve included a unique piece of artwork, a visual testament to our commitment to cybersecurity.

If you’re new here, we encourage you to subscribe here and join our community of Hard Targets. Our newsletter, released semi-weekly on Mondays and Fridays, is your gateway to staying cyber-informed.

Don’t forget to check out our Hard Targets Merchandise and show off your cybersecurity savvy. For an in-depth experience, explore our Artwork Insider Access.

In this edition, we cover AI advancements, Apple and Android updates, Microsoft’s cybersecurity efforts, and essential phishing protection tips. Stay informed, secure, and embrace your Hard Target identity!

We’re excited to announce our new referral program. Refer 5 friends to our newsletter and earn a $10 reward via Cash App, Venmo, or Zelle. Start sharing and start earning!

Thanks to Beehiiv for hosting this newsletter. Sign up for other newsletters here.

Stay safe, stay informed, and remember - you’re a Hard Target!

Cybersecurity Pop Quiz

Test Your Cybersecurity Knowledge with Our Quick Quiz. Let's See If You're a True Hard Target!

Question 1: In the realm of cyber threat intelligence, what does the term "Indicators of Compromise" (IoCs) refer to?

  • a) Signs that a cybersecurity conference is about to start

  • b) Metrics used to evaluate the performance of security personnel

  • c) Artifacts or pieces of forensic data that identify potentially malicious activity on a system or network

  • d) Guidelines used to design new cybersecurity tools

Question 2: What is the purpose of a 'Sinkhole' in network security?

  • a) A process to dispose of outdated security protocols

  • b) A countermeasure that redirects malicious traffic away from its intended targets

  • c) A technique for anonymizing user data

  • d) A test to measure the strength of network encryption

Question 3: How does 'Fuzzing' enhance software security?

  • a) By compressing software data to save space

  • b) By adding additional encryption layers to the software

  • c) By automatically updating software to the latest version

  • d) By inputting random, invalid, or unexpected data into a program to discover vulnerabilities

Answers:

  1. c) Artifacts or pieces of forensic data that identify potentially malicious activity on a system or network

  2. b) A countermeasure that redirects malicious traffic away from its intended targets

  3. d) By inputting random, invalid, or unexpected data into a program to discover vulnerabilities

Cybersecurity News and Emerging Technology

Best Buy Black Friday 2023: Top Early Deals From the Sale

Source: IGN

Summary: Best Buy’s Black Friday 2023 sale started on November 17, with early deals already live. The sale will continue through Cyber Monday. Some of the early deals include discounts on the 86” LG UR7800 LED 4K UHD Smart TV, PS5 Console -Spider-Man 2 Bundle, and Nintendo Switch Console - Mario Kart 8 Deluxe Bundle.

What’s the importance of this article? This article is important as it provides information about the ongoing Black Friday sale at Best Buy, which is one of the biggest sales events of the year. It’s a great opportunity to grab some tech gadgets at discounted prices.

How could this affect me? If you’re planning to buy tech gadgets or electronics, this sale could help you save a significant amount of money. It’s a good idea to check out the deals and see if there’s anything that catches your eye.

Weekend poll: Will RCS on the iPhone benefit your life as an Android user?

Summary: This article discusses the potential benefits of RCS (Rich Communication Services) on iPhones for Android users. RCS is a communication protocol that enhances the features of traditional SMS and MMS messaging services.

What’s the importance of this article? The integration of RCS on iPhones could lead to improved communication between iPhone and Android users. It’s a significant development in the tech world that could enhance the way we communicate.

How could this affect me? If you’re an Android user who frequently communicates with iPhone users, the integration of RCS on iPhones could improve your communication experience by providing enhanced features such as read receipts, typing indicators, and high-quality media sharing.

US Navy Tests Sub-Launched Drones While Industry Continues Designing

Source: Defense News

Summary: The U.S. Navy is currently experimenting with launching and recovering medium unmanned underwater vehicles (UUVs) from submarines. The Program Executive Office Unmanned and Small Combatants is leading the project, which aims to create a common drone that can conduct expeditionary mine countermeasures or operate from submarines. The medium UUV is set to be fielded within the next few years, but the Navy is already practicing with similar systems available from industry to learn how to use them. The current medium UUV program adds a torpedo tube launch and recovery capability, allowing any submarine in the fleet to become a drone mothership. The Navy plans to deploy a torpedo tube-launched and -recovered UUV within the next year.

What’s the importance of this article? This article highlights the U.S. Navy’s efforts to enhance its capabilities through technological advancements. The development of a common drone that can operate from submarines represents a significant development in naval warfare.

How could this affect me? While these developments may not directly affect you unless you’re involved in the defense sector, they’re indicative of the increasing role of technology in various fields. It’s always beneficial to stay informed about such advancements.

Payments App Zelle Begins Refunds for Imposter Scams After Washington Pressure

Source: Reuters

Summary: Banks on the payment app Zelle have started refunding victims of imposter scams. This move addresses consumer protection concerns raised by U.S. lawmakers and the federal consumer watchdog. The policy change is a significant shift from last year when bankers argued that it was unreasonable to require banks to refund transfers that customers were tricked into approving.

What’s the importance of this article? This article highlights a significant policy change in the banking sector aimed at enhancing consumer protection. It shows the efforts being made to address the issue of imposter scams, which have become increasingly prevalent.

How could this affect me? If you’re a user of the Zelle payment app, this policy change could provide you with added protection against imposter scams. If you fall victim to such a scam, you may now be eligible for a refund, which was not the case previously.

iPhone and Android Signal Booster: 5 Techniques to Improve Your Cellphone Signal

Source: CNET

Summary: This article provides tips and tricks to improve your cellphone signal. Some of the suggestions include moving to a location with fewer obstructions between your phone and cell towers, removing your phone case, and ensuring your phone is adequately charged.

What’s the importance of this article? This article is important as it provides practical tips to improve your cellphone signal. A strong signal is crucial for making calls, sending messages, and using data services.

How could this affect me? If you often experience poor cellphone signal, the tips provided in this article could help improve your signal strength, leading to better call quality and faster data speeds.

Meta Quest for Business Launched

Source: Meta for Work

Summary: Meta has launched the Quest 3 headset for business use. The device is easy to set up and use, making it suitable for organizations. It’s designed for popularity and all-in-one utilization.

What’s the importance of this article? The launch of the Meta Quest 3 headset for business use represents a significant development in the field of virtual reality (VR). It shows how VR technology is being increasingly adopted in the business world.

How could this affect me? If you’re involved in a business that could benefit from VR technology, the Meta Quest 3 headset could be a valuable tool. It could be used for various purposes such as virtual meetings, training sessions, product demonstrations, and more.

Cybersecurity General Tip of the Issue

Securing Your Email: Best Practices Across Platforms

Summary: Email is a common attack vector for cybercriminals, making it crucial to secure it properly. This topic covers best practices for securing your email across different platforms, including Apple, Android, Windows, and Linux.

Why is this important? Email is an essential communication tool used daily for personal and professional purposes. However, it’s also a popular target for cybercriminals who use phishing emails, malware, and other tactics to gain unauthorized access to sensitive information. By securing your email, you can protect yourself from these threats and ensure your private information stays private.

How to Implement: Here are some steps you can take to secure your email:

  1. Detect phishing emails: Be wary of emails that ask for personal information, contain spelling and grammar mistakes, or have a sense of urgency. Legitimate organizations typically don’t ask for sensitive information via email.

  2. Don’t click on unknown links: Links in emails can lead to malicious websites or download harmful software onto your device. If you’re unsure about a link, don’t click on it.

  3. Use strong passwords: Create unique and complex passwords for your email accounts. Consider using a password manager to help manage your passwords.

  4. Enable two-factor authentication (2FA): 2FA adds an extra layer of security by requiring a second form of verification in addition to your password.

  5. Update your email apps: Regularly update your email apps to the latest version to benefit from the latest security patches and improvements.

  6. Secure your email on public Wi-Fi: Public Wi-Fi networks are often unsecured, making it easy for cybercriminals to intercept your data. Use a VPN when accessing your email on public Wi-Fi.

  7. Encrypt sensitive emails: If you’re sending sensitive information via email, consider using encryption to protect your data from being intercepted. By following these steps, you can significantly enhance the security of your email and protect yourself from potential cyber threats.

The Apple Ecosystem

How to Use Your iPhone's Emergency SOS via Satellite to Contact 911

Source: CNET

Summary: The iPhone 14 has a feature called Emergency SOS via Satellite, which allows users to contact emergency services even in remote areas without cellular service. The feature works by connecting to communications satellites hundreds of miles above the Earth. If you dial 911 and your phone can’t connect, an option to text emergency services via satellite appears. You can also share your location with loved ones via a satellite without sending a message.

What’s the importance of this article? This article is important as it provides information about a significant feature of the iPhone 14 that could potentially save lives. The ability to contact emergency services via satellite in areas without cellular service is a major advancement in mobile technology.

How could this affect me? If you’re an iPhone 14 user, this feature could be crucial in an emergency situation, especially if you’re in a remote area without cellular service. Knowing how to use this feature could potentially save your life or the life of someone else.

iOS 18 may introduce exclusive AI features on the iPhone 16

Summary: Apple is reportedly working on integrating AI capabilities into its products, with plans to revamp Siri and develop it into an ultimate virtual assistant and killer AI app. Rumors suggest that Apple will use cloud-based processing for AI capabilities in Siri, while also considering on-device AI processing for the iPhone 16. The iOS 18 update will unlock AI features for Siri and the iPhone 16.

What’s the importance of this article? This article is important as it provides insights into Apple’s future plans for integrating AI capabilities into its products. The potential revamp of Siri and the introduction of AI features in the iPhone 16 represent significant developments in the tech world.

How could this affect me? If you’re an iPhone user, these developments could enhance your user experience by providing more intelligent and personalized features. The integration of AI capabilities could make your device more efficient and capable, improving various aspects of its functionality.

Why Apple is Working Hard to Break into Its Own iPhones

Summary: Apple has been intensifying its efforts to enhance the security of its iPhones, a move highlighted by the introduction of Lockdown Mode, an "optional extreme protection" feature. This initiative is part of Apple's broader response to increasing security concerns as personal devices become more central in geopolitics. In Paris, Apple engineers are rigorously testing iPhones to identify and patch potential security gaps before they reach consumers. This proactive approach involves using advanced technology, like lasers and finely tuned sensors, to ensure hardware security, which is crucial since hardware cannot be easily modified after purchase. Apple's focus extends to its chips, which are responsible for encrypting data to ensure privacy and security. The company's security measures are not only a response to traditional threats like stolen passwords but also to sophisticated cyber threats like Pegasus spyware.

What’s the importance of this article? This article underscores Apple's commitment to user security and privacy, especially in an era where personal devices are increasingly targeted by sophisticated cyber threats. Apple's proactive approach to security, particularly in hardware, shows its dedication to safeguarding user data against both common and highly advanced attacks.

How could this affect me? As an Apple device user, this security focus means enhanced protection against a variety of cyber threats. Understanding Apple's security measures can provide reassurance about the privacy and safety of your data. It also highlights the need for users to be aware of and utilize security features like Lockdown Mode for added protection in high-risk situations.

Apple Pay, Visa bug allows hacking contactless payments

Source: Cybernews

Summary: Researchers have discovered a vulnerability that allows unauthorized contactless payments to be made from a locked iPhone due to flaws with Apple Pay and Visa. The flaw applies to Visa cards set up in ‘Express Transit’ mode in an iPhone’s wallet. Attackers can bypass the contactless limit, allowing unlimited EMV contactless transactions from a locked iPhone.

Exploitation: An attacker needs to set up an RFID reader that tricks the targeted phone into taking it for a ticket barrier. At the same time, the researchers ran a script on a rooted Android device to relay the iPhone’s signal to a contactless payment terminal. Because the iPhone thinks it deals with a ticket barrier, a transaction is possible without unlocking the phone. Researchers abused this feature by tricking the device to act as if it was unlocked. That allowed them to trick the device into acting as if the payment was authorized, bypassing limits on payment size.

Mitigation: The researchers advise users not to use Visa as a transport card in Apple Pay, at least until both Visa and Apple agree to fix the flaw in their systems.

Apple Ecosystem Security Tip of the Issue

Securing Your Email: Best Practices Across Platforms on Apple Devices

Summary: Email is a common attack vector for cybercriminals, making it crucial to secure it properly. This topic covers best practices for securing your email across different Apple platforms, including iOS, iPadOS, macOS, and watchOS.

Why is this important? Email is an essential communication tool used daily for personal and professional purposes. However, it’s also a popular target for cybercriminals who use phishing emails, malware, and other tactics to gain unauthorized access to sensitive information. By securing your email, you can protect yourself from these threats and ensure your private information stays private.

How to Implement: Here are some steps you can take to secure your email on Apple devices:

  1. Detect phishing emails: Be wary of emails that ask for personal information, contain spelling and grammar mistakes, or have a sense of urgency. Legitimate organizations typically don’t ask for sensitive information via email.

  2. Don’t click on unknown links: Links in emails can lead to malicious websites or download harmful software onto your device. If you’re unsure about a link, don’t click on it.

  3. Use strong passwords: Create unique and complex passwords for your email accounts. Consider using a password manager to help manage your passwords.

  4. Enable two-factor authentication (2FA): 2FA adds an extra layer of security by requiring a second form of verification in addition to your password. On Apple devices, you can enable 2FA in the “Password & Security” section of your Apple ID settings.

  5. Update your email apps: Regularly update your email apps to the latest version to benefit from the latest security patches and improvements. On Apple devices, you can update your apps through the App Store.

  6. Secure your email on public Wi-Fi: Public Wi-Fi networks are often unsecured, making it easy for cybercriminals to intercept your data. Use a VPN when accessing your email on public Wi-Fi.

  7. Encrypt sensitive emails: If you’re sending sensitive information via email, consider using encryption to protect your data from being intercepted. Apple Mail supports S/MIME, which allows you to encrypt your emails. By following these steps, you can significantly enhance the security of your email and protect yourself from potential cyber threats.

Samsung & Android

Samsung Galaxy Smartphones Black Friday

Summary: Samsung is offering impressive deals on some of its top products during its Black Friday event. The deals include big discounts on SSDs, laptops, monitors, TVs, smartphones, and more.

Here are some of the best deals on Samsung Galaxy smartphones during the Black Friday sale:

  • Samsung Galaxy S23: Available for $699, saving you $200 at Best Buy.

  • Samsung Galaxy S23 Plus: Priced at $799, which is $200 off the original price at Best Buy.

  • Samsung Galaxy S23 Ultra: Can be purchased for $899, giving you a discount of $300 at Amazon.

  • Samsung Galaxy S23 FE: Offered at $399, allowing you to save $200 at Amazon.

  • Samsung Galaxy Z Flip 5: Available for $799, which is $200 less than the original price at Amazon.

What’s the importance of this article? This article is important as it provides information about the ongoing Black Friday event by Samsung. It’s a great opportunity for consumers to purchase Samsung products at discounted prices.

How could this affect me? If you’re planning to buy a Samsung product, this could be the perfect time to make a purchase and save some money. Whether you’re looking for a new smartphone, laptop, or TV, you can take advantage of these deals to get your desired product at a lower price.

Huawei is Completely Ditching Android App Support with HarmonyOS Next

Source: WCCFTECH

Summary: Huawei has announced that its upcoming HarmonyOS Next is going to completely ditch Android app support. The new version will be a pure version of the HarmonyOS operating system, with no Android libraries. The company is looking to replace existing versions of the platform on all devices.

What’s the importance of this article? This article is important as it provides insights into Huawei’s future plans for its operating system. The decision to ditch Android app support represents a significant shift in Huawei’s strategy.

How could this affect me? If you’re a Huawei user, this development could impact your user experience. You won’t be able to install or use Android apps on Huawei devices running HarmonyOS Next. However, the company is now focusing on building native HarmonyOS apps, which could lead to the development of new and unique apps for Huawei devices.

How Qualcomm Plans to Bring Apple’s Ecosystem Perks to Windows and Android

Source: CNET

Summary: At the Snapdragon Summit, Qualcomm unveiled a new way for devices to connect and share data, much like Apple does with its ecosystem. The new system, called Snapdragon Seamless, allows phones, PCs, tablets, headphones, and accessories to automatically connect, simulating Apple’s seamless interactivity outside its ecosystem. All device makers need to do is integrate Qualcomm’s system into all their products.

What’s the importance of this article? This article is important as it provides information about Qualcomm’s efforts to enhance the connectivity between devices. The development of Snapdragon Seamless represents a significant advancement in mobile technology.

How could this affect me? If you’re a user of devices powered by Qualcomm, these developments could enhance your user experience by providing more seamless and automatic connectivity between your devices. This could make it easier for you to share data and use multiple devices together, improving the overall functionality of your devices.

Samsung & Android Security Tip of the Issue

Securing Your Email: Best Practices on Android and Samsung Devices

Summary:
Email security is crucial for Android and Samsung device users due to the prevalence of phishing scams and malware. Implementing best practices can greatly reduce the risk of unauthorized access and data breaches.

Why is this important?
Emails often contain sensitive personal and professional information. In the wrong hands, this data can be used for identity theft, financial fraud, or to compromise other accounts. Android and Samsung devices are widely used, making them common targets for cybercriminals.

How to Implement:

  1. Detect Phishing Emails: Be vigilant about emails requesting personal information, and watch out for spelling errors or high-pressure tactics. Legitimate organizations rarely ask for sensitive data via email.

  2. Avoid Unknown Links: Be cautious with links in emails. They can lead to malicious sites or download harmful software. Verify the sender's authenticity before clicking.

  3. Strong Passwords: Use complex passwords unique to your email accounts. Password managers can assist in creating and storing these securely.

  4. Two-Factor Authentication (2FA): Enhance security with 2FA. This requires a second verification method, such as a text message or an authentication app, in addition to your password.

  5. Regular Updates: Keep your email apps updated. Regular updates include security patches that protect against known vulnerabilities.

  6. Secure Wi-Fi Use: Public Wi-Fi can be risky. Use a VPN when accessing email on public networks to encrypt your connection and protect your data.

  7. Email Encryption: For sending sensitive information, consider using email encryption tools available for Android and Samsung devices, like S/MIME, to protect your data during transit.

Enhanced Email Security:

  1. Utilize Outlook's Security Features: Outlook offers built-in security features like junk email filtering and phishing email protection. Regularly review and adjust these settings to maximize email security.

  2. Windows Defender Integration: Ensure that Windows Defender, Microsoft’s built-in antivirus tool, is activated and updated. It offers real-time protection against malware that could be introduced via email attachments.

  3. BitLocker for Email Data Encryption: Use BitLocker, available on Windows Pro and Enterprise editions, to encrypt your local storage where emails are saved, adding an extra layer of security.

  4. Safe Links in Microsoft 365: For Microsoft 365 users, enable Safe Links in Outlook. This feature checks the safety of links in emails to prevent access to known malicious websites.

  5. Windows Update and Office Updates: Regularly update your Windows operating system and Microsoft Office suite. These updates often include patches for security vulnerabilities that could affect email security.

  6. Configure Firewall Settings: Use the Windows Firewall to control incoming and outgoing network traffic for Outlook, providing an added security barrier against unauthorized access.

  7. Control Email Access on Public Networks: On public Wi-Fi, ensure that Outlook and other email apps are set to use a VPN, safeguarding your email communication from potential eavesdropping.

  8. Secure Email Protocols: Configure your email accounts in Outlook using secure email protocols like IMAP over SSL (IMAPS) or SMTP over SSL (SMTPS) to ensure encrypted email transmission.

By following these steps, users can significantly enhance their email security on Android and Samsung devices, safeguarding their personal and professional information from potential cyber threats.

Microsoft & Windows

Microsoft and OpenAI Partnership Unveils New AI Opportunities

Summary: At OpenAI’s first DevDay Conference on November 6, 2023, Microsoft Chairman and CEO Satya Nadella made a surprise appearance during OpenAI CEO Sam Altman’s keynote to deliver a powerful message: “Our job number one is to build the best systems, so you can build the best models and deliver those to developers.” This was a testament to the deep partnership between Microsoft and OpenAI. They introduced new models, including GPT-3.5 Turbo, and updates to models including DALL-E 3, and Whisper 3. The eagerly awaited GPT-4 Turbo offers lower pricing, extended prompt length, and structured JSON formatting with improved efficiency and control.

What’s the importance of this article? This article is important as it provides insights into the deep partnership between Microsoft and OpenAI and their commitment to advancing AI technology. The introduction of new models and updates represents significant developments in the tech world.

How could this affect me? If you’re a developer or user of AI models, these developments could enhance your experience by providing more efficient and cost-effective models. The integration of these models could make your systems more intelligent and capable, improving various aspects of their functionality.

Microsoft Introduces Its Own Chips for AI, With Eye on Cost

Source: Reuters

Summary: Microsoft Corp is developing its own artificial intelligence chip code-named “Athena” that will power the technology behind AI chatbots like ChatGPT. The company has been working on the chip since 2019 and it is being tested by a small group of Microsoft and OpenAI employees. The chips will be used for training large-language models and supporting inference - both needed by generative AI like the one used in ChatGPT to process massive amounts of data, recognize patterns, and create new outputs to mimic human conversation.

What’s the importance of this article? This article is important as it provides information about Microsoft’s efforts to enhance the performance and efficiency of its AI technology. The development of its own AI chip represents a significant advancement in Microsoft’s technology.

How could this affect me? If you’re a user of devices powered by Microsoft, these developments could enhance your user experience by providing more seamless and automatic connectivity between your devices. This could make it easier for you to share data and use multiple devices together, improving the overall functionality of your devices.

Microsoft Releases AI Tool for Photorealistic Copying of Faces and Voices

Source: The Guardian

Summary: Microsoft has announced a new software, Azure AI Speech, at its Ignite 2023 conference. This software can generate new avatars and voices or replicate the existing appearance and speech of a user. It is trained with human images and allows users to input a script that can then be “read” aloud by a photorealistic avatar created with artificial intelligence. Users can either choose a preloaded Microsoft avatar or upload footage of a person whose voice and likeness they want to replicate. Microsoft envisions this tool being used to build “conversational agents, virtual assistants, chatbots and more”.

What’s the importance of this article? This article is important as it provides information about Microsoft’s latest contribution to the artificial intelligence race. The ability to generate photorealistic avatars and replicate human speech could have significant implications for various fields, including entertainment, customer service, and accessibility.

How could this affect me? If you’re a developer or user of AI models, this development could enhance your experience by providing more realistic and personalized avatars and voices. This could make your systems more engaging and user-friendly. However, it also raises concerns about the potential misuse of this technology, such as the creation of deepfakes. Microsoft has stated that it has implemented a variety of limits and safeguards to prevent misuse, including requiring users to disclose when AI was used to create a synthetic voice or avatar.

Microsoft & Windows Security Tip of the Issue

Securing Your Email: Best Practices Across Platforms on Microsoft Products

Summary: Email is a common attack vector for cybercriminals, making it crucial to secure it properly. This topic covers best practices for securing your email across different Microsoft platforms, including Outlook and Windows Mail.

Why is this important? Email is an essential communication tool used daily for personal and professional purposes. However, it’s also a popular target for cybercriminals who use phishing emails, malware, and other tactics to gain unauthorized access to sensitive information. By securing your email, you can protect yourself from these threats and ensure your private information stays private.

How to Implement: Here are some steps you can take to secure your email on Microsoft products:

  1. Detect phishing emails: Be wary of emails that ask for personal information, contain spelling and grammar mistakes, or have a sense of urgency. Legitimate organizations typically don’t ask for sensitive information via email.

  2. Don’t click on unknown links: Links in emails can lead to malicious websites or download harmful software onto your device. If you’re unsure about a link, don’t click on it.

  3. Use strong passwords: Create unique and complex passwords for your email accounts. Consider using a password manager to help manage your passwords.

  4. Enable two-factor authentication (2FA): 2FA adds an extra layer of security by requiring a second form of verification in addition to your password. On Microsoft products, you can enable 2FA in the “Account” section of your settings.

  5. Update your email apps: Regularly update your email apps to the latest version to benefit from the latest security patches and improvements. On Microsoft products, you can update your apps through the Microsoft Store.

  6. Secure your email on public Wi-Fi: Public Wi-Fi networks are often unsecured, making it easy for cybercriminals to intercept your data. Use a VPN when accessing your email on public Wi-Fi.

  7. Encrypt sensitive emails: If you’re sending sensitive information via email, consider using encryption to protect your data from being intercepted. Microsoft products support S/MIME, which allows you to encrypt your emails. By following these steps, you can significantly enhance the security of your email and protect yourself from potential cyber threats.

Scams to Watch Out For

Scams Targeting Student Athletes

Source: FlemLo Raps

Summary: The video discusses a growing concern about scams targeting student-athletes. These scams often involve fraudulent companies offering recruiting help for overlooked athletes. The scammers convince the athletes and their families to pay for services that are never delivered. In some cases, the scammers use advanced technology like artificial intelligence to make their operations seem more convincing. The video emphasizes the importance of doing thorough research and consulting with trusted individuals before entering into any agreements or contracts.

Key Takeaways:

  • Scammers are targeting student-athletes with fraudulent offers of recruiting help.

  • These scams often involve convincing the athletes and their families to pay for services that are never delivered.

  • Some scammers use advanced technology like artificial intelligence to make their operations seem more convincing.

  • It’s important for athletes and their families to do thorough research and consult with trusted individuals before entering into any agreements or contracts.

  • If an offer seems too good to be true, it probably is. Always be cautious and make informed decisions.

Thank You, Hard Targets!

A Big Thank You to Our Hard Targets

Thank you for taking the time to read this issue. Your support is invaluable to us, and we truly appreciate it. We’re counting on you to help us grow and offer better content and discounts for tech and security products and services. So, before the next issue, try to get a friend or family member to subscribe.

For those who haven’t yet explored it, don’t miss out on our Artwork Insider Access for $1.99 per month here. It’s a great way to dive deeper into the world of cybersecurity and technology. If you are interested, I can give you a free trial. This access provides you with an average of 120 additional pieces of artwork per month.

Remember, as a subscriber, you’re not just a reader - you’re a Hard Target. Your knowledge and awareness make you a formidable force in the face of cyber threats. So, keep learning, stay informed, and continue to be a Hard Target!

Once again, thank you for your support. Stay safe and secure!

Links

Kingdom Dominion Security

& Technology

Subscribe to Premium to read the rest.

Become a paying subscriber of Premium to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In.

A subscription gets you:

  • • Exclusive Artwork Access: Get your hands on all the additional artwork that didn't make it to the main issue. A unique collection curated just for our premium members.
  • • Behind-the-Scenes Insights: Understand the story behind each artwork. Discover the inspiration, the challenges, and the evolution of each piece.
  • • Early Access to New Releases: Be the first to view our upcoming artwork even before it's released to the general public. A sneak peek into our creative world.
  • • Special Discounts on Merchandise: Enjoy exclusive discounts on our merchandise, from prints to apparel. A token of appreciation for our premium members.

Reply

or to participate.