• Smart Intel Briefing
  • Posts
  • The Cybersecurity Crucible - Forging Hard Targets – 27 October 2023 | KD Sec & Tech Secure

The Cybersecurity Crucible - Forging Hard Targets – 27 October 2023 | KD Sec & Tech Secure

Unveiling the Latest in Cybersecurity: From TikTok Scams to Tech Updates

Introduction

Hello, Hard Targets!

Welcome back, Hard Targets! We're thrilled to have you with us for another issue packed with the latest in cybersecurity news, tips, and insights. Our mission is to keep you informed and prepared, making you a harder target for cyber threats.

In this issue, we delve deep into the evolving landscape of online scams, especially on platforms like TikTok. We also bring you updates from the tech giants - Apple, Samsung, Android, and Microsoft. As always, our general cybersecurity tip aims to bolster your defenses, and we've tailored specific tips for different ecosystems to ensure you're covered, no matter what devices you use.

Don't forget to check out the artwork section, where we showcase some of the best cybersecurity-themed art. If you're new here and find our content valuable, consider subscribing to stay updated. Subscribe here. Our newsletter is a treasure trove of information, making it an invaluable asset in your cybersecurity arsenal.

We release new issues semi-weekly, every Monday and Friday, ensuring you're always up-to-date with the rapidly changing world of cybersecurity. And for those who want to wear their Hard Target status with pride, check out our exclusive Hard Target merchandise at our store.

Dive in and explore the curated content we've prepared for you in this issue. Stay safe, stay informed, and remain a Hard Target!

Thanks to Beehiiv for hosting this newsletter. Sign up for other newsletters here.

Cybersecurity Pop Quiz

Test Your Cybersecurity Knowledge with Our Quick Quiz. Let's See If You're a True Hard Target!

Question 1: Which of the following is a primary method used to ensure data confidentiality in cybersecurity?

  • a) Data masking

  • b) Data encryption

  • c) Data deduplication

  • d) Data visualization

Question 2: In the context of cybersecurity, what does the term "Whitelisting" primarily refer to?

  • a) Allowing only specific software to run on a system.

  • b) Listing all the vulnerabilities of a system.

  • c) Granting all users access to a specific system.

  • d) Displaying all active connections on a network.

Question 3: What is the primary goal of a Security Operations Center (SOC) in an organization?

  • a) To provide IT support to employees.

  • b) To monitor and analyze the organization's security posture.

  • c) To handle the organization's financial transactions.

  • d) To manage the organization's website and social media.

Answers:

  1. b) Data encryption

  2. a) Allowing only specific software to run on a system.

  3. b) To monitor and analyze the organization's security posture.

Cybersecurity News and Emerging Technology

Qualcomm's New Audio Chip Uses Wi-Fi to Massively Extend Headphone Range

Source: Engadget

Summary: Qualcomm has unveiled the S7 and S7 Pro Gen 1 audio chips at the Snapdragon Summit in Hawaii. These chips boast six times the computing power of their predecessors and feature on-device AI capabilities. A standout feature of the S7 Pro is its micro-power Wi-Fi connectivity, which uses Qualcomm's Expanded Personal Area Network (XPAN) technology. This technology can automatically switch a device's connection, for instance, if a user moves too far from their phone while their earbuds are connected via Bluetooth, XPAN will switch the connection to a Wi-Fi access point. This ensures continuous audio playback even when moving around large areas. The chip can deliver 96kHz lossless audio and is compatible with 2.4, 5, and 6GHz bands. However, these features will only be activated when devices powered by the S7 and S7 Pro are paired with devices equipped with the new Snapdragon 8 Gen 3 mobile platform and Snapdragon X Elite.

What’s the importance of this article? This article highlights Qualcomm's innovation in the audio chip sector, emphasizing the potential for seamless audio experiences even when users move significant distances from their primary device. The introduction of XPAN technology can revolutionize the way we use wireless audio devices, especially in larger spaces.

How could this affect me? If you frequently use wireless audio devices, such as earbuds, this advancement could mean fewer interruptions and a more seamless audio experience, especially if you move around large areas like campuses or buildings. However, the full benefits would be realized once devices equipped with the new Snapdragon 8 Gen 3 mobile platform and Snapdragon X Elite become more prevalent in the market.

Qualcomm’s Snapdragon 8 Gen 3 Promises 30 Percent Faster CPU

Source: Ars Technica

Summary: Qualcomm has announced the Snapdragon 8 Gen 3, which is set to appear in most flagship Android devices by 2024. The chip promises a performance improvement of around 30%. It introduces a new "1:5:2" core arrangement, differing from the typical configuration. The Snapdragon 8 Gen 3 features one big core, five medium cores, and two small cores. The big core operates at 3.3 GHz, while the medium cores have varying frequencies. The CPU claims to be 30% faster and 20% more efficient. Built on a 4 nm process, the Adreno GPU is said to be 25% faster and more efficient. Qualcomm emphasized the chip's AI capabilities, suggesting that AI models like Llama 2 and Stable Diffusion can run locally on the chip. The Hexagon DSP/NPU is touted to be up to 98% faster and 40% more efficient.

What’s the importance of this article? The article underscores Qualcomm's advancements in chip technology, particularly in terms of performance and efficiency. The Snapdragon 8 Gen 3's unique core arrangement and enhanced AI capabilities signify a shift in mobile processing, potentially offering users faster and more efficient devices in the future.

How could this affect me? If you use or plan to purchase an Android device in 2024, you might experience enhanced performance and efficiency due to the Snapdragon 8 Gen 3. The chip's advancements could lead to smoother multitasking, better gaming experiences, and more efficient battery usage.

Sabotage Tool Takes on AI Image Scrapers

Source: Tech Xplore

Summary: Researchers from the University of Chicago have developed a tool named "Nightshade" that allows artists to counter AI web scraping operations that use their online works without authorization. Nightshade "poisons" graphics taken by AI companies to train image-generating models by subtly manipulating image pixels. These alterations, invisible to the naked eye, significantly change the output during AI training. For example, images of dogs might be transformed into cats during the training process. The tool's creation aims to protect content creators from web scrapers that disregard opt-out or do-not-crawl directives.

What’s the importance of this article? The development of Nightshade highlights the ongoing battle between content creators and AI companies that use online images without permission. As AI technologies become more prevalent, ensuring the rights and protections of artists and creators becomes crucial. Nightshade offers a way for creators to defend their works against unauthorized use.

How could this affect me? If you're an artist or content creator, tools like Nightshade can provide an added layer of protection against unauthorized use of your work. For consumers, it underscores the importance of ethical AI practices and the potential challenges in the AI industry regarding content rights and usage.

Best Early Black Friday Deals: Amazon, Walmart, Best Buy, and More

Source: ZDNet

Summary: As the holiday season approaches, major retailers like Amazon, Best Buy, and Walmart are already offering early Black Friday deals. Some of the notable deals include:

  • LG 65-inch Class C3 Series OLED 4K UHD Smart TV with a $900 discount.

  • Google Nest Hub 2nd Gen at 40% off.

  • GoPro HERO9 5K Streaming Action Camera with a $50 discount.

  • Dyson V11 Cordless Stick Vacuum at a $120 discount.

  • JBL Live 660NC Wireless Noise Cancelling Headphones with a $100 discount.

What’s the importance of this article? The article provides insights into the early Black Friday deals available from major retailers. It's a heads-up for consumers looking to make the most of the sales season, offering a glimpse of the discounts and products they can expect.

How could this affect me? If you're planning to make purchases during the Black Friday sales, this article gives you a head start on some of the deals available. It can help you plan your shopping and potentially save money on products you're interested in.

Snapdragon Claims Its New X Elite Processor Will Beat Apple and Intel

Source: The Verge

Summary: Qualcomm has unveiled its Snapdragon X Elite platform, which it claims to be its most potent computing processor to date. The chips, including the new Qualcomm Oryon, are built on a 4nm process and boast 136GB/s of memory bandwidth. These PCs are expected to ship in mid-2024. Qualcomm ambitiously asserts that the Snapdragon X Elite will outperform several Intel Core i7 processors on the Geekbench 6 benchmark. Furthermore, Qualcomm claims its chip will offer "50% faster peak multi-thread performance" than Apple's M2 chip. Additionally, Qualcomm introduced Snapdragon Seamless, a technology that allows devices across different platforms to interact seamlessly.

What’s the importance of this article? The article emphasizes Qualcomm's advancements in chip technology, suggesting a potential shift in the computing landscape. The Snapdragon X Elite's performance claims, if accurate, could reshape the competitive dynamics between major chip manufacturers.

How could this affect me? If you're considering purchasing a new device in the near future, the Snapdragon X Elite's capabilities might influence your decision, especially if you prioritize performance. Additionally, the introduction of Snapdragon Seamless could lead to more integrated and seamless experiences across devices.

Nation-State Hackers Exploiting Zero-Day in Roundcube Webmail Software

Summary: A threat actor named "Winter Vivern" has been exploiting a zero-day vulnerability in Roundcube webmail software since October 11, 2023, to access victims' email messages. This group, also known as TA473 and UAC-0114, aligns its objectives with Belarus and Russia and has been linked to attacks against Ukraine, Poland, and various government entities in Europe and India. The vulnerability, identified as CVE-2023-5631, is a stored cross-site scripting flaw that allows attackers to load arbitrary JavaScript code. Although a fix was released on October 16, 2023, the group has been using a phishing message with a Base64-encoded payload to exploit the flaw. The final JavaScript payload enables the exfiltration of email messages to a command-and-control server.

What’s the importance of this article? The article sheds light on the continuous threats posed by nation-state actors in the cyber realm. The exploitation of zero-day vulnerabilities, especially in widely used software like Roundcube, underscores the need for timely patching and robust cybersecurity measures.

How could this affect me? If you or your organization uses Roundcube webmail software, it's crucial to ensure that you've applied the latest patches to prevent potential breaches. Being aware of such vulnerabilities and the tactics used by threat actors can help in implementing preventive measures.

Cybersecurity General Tip of the Issue

VPN Usage: Safeguarding Your Online Activities Across Platforms

Summary: A Virtual Private Network (VPN) is a digital tool designed to enhance online privacy and security. By encrypting a user's internet connection, VPNs make it challenging for third parties to monitor or intercept their online activities.

Why is this important? With the increasing number of cyber threats and growing concerns about online privacy, safeguarding one's digital footprint is paramount. VPNs offer an added layer of protection, ensuring that sensitive data and online activities remain private, even on unsecured networks.

How to Implement:

  1. Choose a reputable VPN service provider. Research and select one that has strong encryption standards and a no-log policy.

  2. Download and install the VPN application on your device (Apple, Android, Windows, or Linux).

  3. Connect to a VPN server. Most VPN apps offer a range of server locations to choose from.

  4. Ensure the VPN connection is active whenever you're online, especially when using public Wi-Fi networks.

  5. Periodically check for and install updates to your VPN software to benefit from the latest security enhancements.

The Apple Ecosystem

Apple's 'Scary Fast' Event: What We Expect

Source: CNET

Summary: Apple's upcoming "Scary Fast" event has generated significant buzz in the tech community. While the company remains tight-lipped about the specifics, experts predict the unveiling of a new MacBook Pro model, potentially featuring the M2 chip. Other speculations include updates to the iPad Air and the introduction of a new Mac Mini. The event's name, "Scary Fast," suggests a focus on speed and performance, aligning with rumors of the M2 chip's capabilities.

What’s the importance of this article? Apple events always draw attention due to the company's influence in the tech industry. New product launches or updates can set market trends and influence consumer choices. The introduction of potentially faster and more efficient devices can shape the competitive landscape of the tech world.

How could this affect me? If you're an Apple user or considering purchasing Apple products, this event could introduce devices that might interest you. The potential performance enhancements suggested by the event's name could mean faster, more efficient devices that cater to both general consumers and professionals.

iOS 17.1 Features and Bug Fixes

Source: 9to5Mac

Summary: Apple's iOS 17.1 update brings a slew of new features and bug fixes aimed at enhancing user experience. Notable features include a revamped Weather app, enhanced FaceTime capabilities, and improved privacy settings. The update also addresses several bugs from the initial iOS 17 release, ensuring smoother device performance.

What’s the importance of this article? Regular iOS updates are crucial for Apple device users, offering new features and resolving potential security and functionality issues. Staying updated on these changes ensures that users can make the most of their devices and maintain optimal security.

How could this affect me? If you use an iPhone or other Apple devices running iOS, this update directly impacts your user experience. It's essential to be aware of the new features and improvements to utilize your device to its fullest potential and ensure you're protected from any known vulnerabilities.

Apple Raises Price of Apple TV to $9.99 a Month

Source: CNBC

Summary: Apple has announced a price increase for its Apple TV+ streaming service, moving from $4.99 to $9.99 per month. The company cites expanded original content offerings and increased production costs as primary reasons for the hike. Despite the price change, Apple believes its service offers competitive value, especially given the acclaim many of its original shows have received.

What’s the importance of this article? With the streaming wars intensifying, pricing strategies play a crucial role in attracting and retaining subscribers. Apple's decision to raise its price indicates confidence in its content lineup and its position in the market.

How could this affect me? If you're an Apple TV+ subscriber, this change will impact your monthly subscription cost. It's essential to evaluate the content offerings and decide whether the service continues to provide value at the increased price.

Apple Wants Vision Pro to Diagnose Mental Disorders, Report Says

Source: Gizmodo

Summary: Apple is exploring innovative applications for its Vision Pro mixed-reality headset, including the potential diagnosis and treatment of mental health conditions. The headset's advanced sensors and cameras could theoretically identify mood disorders like anxiety, depression, or PTSD by analyzing facial expressions and other personal data. Additionally, the device's eye-tracking technology might offer further insights into a user's emotional state. For therapeutic intervention, the Vision Pro could utilize specific sounds and visuals to induce positive emotional responses and alleviate symptoms.

What’s the importance of this article? This article highlights Apple's ambitious plans to intersect technology with mental health, a significant step that could revolutionize care in this critical sector. If successful, this initiative would not only mark a breakthrough in the application of mixed-reality technology but also significantly contribute to public health strategies by providing accessible, immediate, and personalized mental health support.

How could this affect me? If you or someone you know struggles with mental health, this technological advancement could potentially offer a new, more immediate form of support and treatment. It represents a move towards more holistic health devices and underscores the growing importance of mental health recognition and treatment in tech innovations. However, it also raises questions about privacy and the ethical implications of personal data use, which could impact consumer choices and public trust in such technologies.

The Apple Ecosystem Security Tip of the Issue

VPN Usage: Safeguarding Your Online Activities Across Apple Platforms

Summary: A Virtual Private Network (VPN) is a tool that encrypts your internet connection, ensuring that your online activities remain private and secure. By using a VPN, you can mask your IP address, making it difficult for third parties, including hackers and advertisers, to track your online behavior.

Why is this important? In the age of increasing cyber threats and data breaches, maintaining online privacy is paramount. Apple devices, known for their security features, can further benefit from the added layer of protection a VPN provides. Whether you're browsing on Safari, checking your emails, or using apps, a VPN ensures that your data is encrypted and your online footprint is minimized.

How to Implement:

  1. iOS & iPadOS: Go to Settings > General > VPN > Add VPN Configuration. Here, you can add the details of your VPN provider.

  2. macOS: Open System Preferences > Network > "+" icon in the bottom left > Interface dropdown, select VPN. Add the details of your VPN provider.

  3. watchOS: VPN settings are managed via the paired iPhone. Ensure the VPN is set up on your iPhone, and it will automatically work for the Apple Watch when the watch is connected to the iPhone.

  4. Once set up, ensure to turn on your VPN when accessing the internet, especially on public Wi-Fi networks. Many VPN services also offer apps on the App Store, making it easier to manage and activate your VPN.

Samsung & Android

Galaxy Book 4 Ultra and Snapdragon X Elite: A Perfect Pairing?

Source: SamMobile

Summary: Samsung's Galaxy Book 4 Ultra, when paired with the Snapdragon X Elite, promises a powerful combination. The article discusses the potential of this duo, highlighting the advantages of combining Samsung's hardware prowess with Snapdragon's performance capabilities. The Galaxy Book 4 Ultra, with its sleek design and advanced features, can greatly benefit from the Snapdragon X Elite's processing power, making it a formidable competitor in the laptop market.

What’s the importance of this article? The collaboration between Samsung and Snapdragon can redefine the standards for high-performance laptops. The combination of the Galaxy Book 4 Ultra's design and features with the Snapdragon X Elite's processing capabilities can set a new benchmark in the industry.

How could this affect me? For consumers in the market for a high-performance laptop, this combination offers a promising option. The synergy between the two products can deliver enhanced user experiences, from gaming to professional tasks, making it a worthy consideration for potential buyers.

Google Introduces AR Beauty Ads

Summary: Google has launched AR Beauty Ads, a new advertising product that allows beauty brands to promote their products using augmented reality (AR). These interactive ads offer virtual try-on capabilities, providing a more engaging way to showcase beauty products. Initially available for lip and eye makeup, foundation products will be added soon. Early tests indicate that users are more likely to spend time on a brand's website and consider purchases after engaging with these AR-enabled ads.

What’s the importance of this article? The introduction of AR Beauty Ads signifies a shift in online advertising, leveraging AR technology to offer a more interactive and personalized shopping experience. This can revolutionize the way consumers engage with beauty brands online.

How could this affect me? Consumers can now virtually "try on" beauty products before purchasing, offering a more informed and immersive shopping experience. This can lead to more confident purchasing decisions and potentially reduce product returns due to mismatched expectations.

Motorola's Rollable Smartphone: A Bracelet Transformation

Source: DesignBoom

Summary: At Lenovo Tech World ’23, Motorola unveiled a slap bracelet smartphone concept. This device, backed with orange fabric, attaches to a magnetized wrist strap and features a flexible FHD+ pOLED display. It can function as a standard Android phone, self-standing mode, or a wrist-worn watch accessory. Motorola aims to incorporate AI into this modern smartphone experience, enhancing daily tasks for users.

What’s the importance of this article? Motorola's innovative approach to smartphone design showcases the potential of flexible display technology. This concept blurs the lines between smartphones and wearables, indicating a possible direction for future mobile devices.

How could this affect me? For tech enthusiasts and early adopters, this presents a glimpse into the future of mobile devices. If this concept becomes a reality, users can have a versatile device that adapts to various scenarios, from communication to fashion accessory.

Samsung & Android Security Tip of the Issue

VPN Usage: Safeguarding Your Online Activities on Android and Samsung Devices

Summary: Virtual Private Networks (VPNs) are essential tools for enhancing online privacy and security, especially on platforms like Android and Samsung. These networks mask your IP address and encrypt your internet connection, making your online activities virtually invisible to prying eyes.

Why is this important? Android and Samsung devices, given their widespread usage, are frequent targets for cyberattacks. Using public Wi-Fi networks, accessing geo-restricted content, or even just regular browsing can expose users to potential threats. A VPN acts as a protective shield, ensuring your data remains confidential and secure.

How to Implement:

  1. Choose a Reputable VPN Service: Opt for well-reviewed VPN services that have a track record of protecting user privacy. Some popular options include NordVPN, ExpressVPN, and CyberGhost.

  2. Download and Install: Visit the Google Play Store on your Android or Samsung device. Search for your chosen VPN service and install its app.

  3. Setup and Connect: Open the VPN app, sign in or register, and follow the on-screen instructions to set it up. Once done, connect to a VPN server of your choice.

  4. Regularly Update: Ensure your VPN app is regularly updated to benefit from the latest security enhancements.

  5. Check Connection: Periodically verify that your VPN connection is active, especially when accessing sensitive information. Some apps offer a kill switch feature that disconnects the internet if the VPN connection drops, ensuring continuous protection.

  6. Optimize Settings: Dive into the VPN app settings. Opt for protocols like OpenVPN or WireGuard for optimal security and performance. Also, enable features like auto-connect when joining unsecured Wi-Fi networks for automatic protection.

Microsoft & Windows

Microsoft's Copilot AI Could Replace the Start Button in Windows 12

Source: Notebookcheck

Summary: Microsoft is hinting at significant changes with the upcoming Windows 12, expected to launch in 2024. The focus is on enhancing AI features, with the Copilot AI potentially replacing the traditional Start button. This shift aims to revolutionize user interactions, making the system more intuitive and integrated with various applications. The Copilot AI, still in beta on Windows 11, is set to become more efficient with future hardware support, promising smoother AI interactions.

What’s the importance of this article? This development marks a significant shift in traditional operating system design, emphasizing AI's role in everyday computing tasks. It shows Microsoft's commitment to innovation and adapting to the evolving technological landscape, where AI becomes a central component of user experience.

How could this affect me? For users, this change could mean a more streamlined, intuitive interaction with their systems, where tasks can be performed by expressing intent, potentially increasing productivity. However, it also implies a learning curve in adapting to new interaction models and potential concerns about privacy with AI's deeper integration into personal computing.

Microsoft CEO Reflects on the Missed Opportunity with Windows Phone

Source: PhoneArena

Summary: In a recent interview, Microsoft CEO Satya Nadella expressed regret over the company's decision to exit the mobile phone business, particularly concerning the Windows Phone. He believes that with more effort and innovation, they could have succeeded in the competitive market dominated by iOS and Android. The lack of popular apps and consistent development were significant factors in Windows Phone's downfall. The discussion also touched on the Surface Duo's struggles, highlighting Microsoft's continued challenges in the mobile sector.

What’s the importance of this article? This reflection by Microsoft's CEO underscores the competitive nature of the tech industry and the necessity for continuous innovation and adaptation. It serves as a lesson to tech giants and startups alike about the risks of entering established markets and the cost of missed opportunities.

How could this affect me? For consumers, this revelation highlights the ever-changing landscape of technology and brand options. It also suggests potential future shifts in the market, with implications for product support and availability of services. Users invested in Microsoft's ecosystem are reminded of the importance of market support for the longevity of product lines.

Android and Windows Devices Vulnerable to Flipper Zero Bluetooth Spam

Source: ZDNet

Summary: The Flipper Zero, a multi-purpose hacking device, has recently been updated with third-party firmware that allows it to target Android and Windows devices with Bluetooth spam. This capability was previously used to attack iPhones, causing them to crash. The new attack inundates Android devices with pop-up notifications and sends frequent system tray notifications to Windows devices if "Swift Pair" is enabled. While the attack doesn't lock up the device, it significantly hinders its usability.

Exploitation: The exploit requires the Flipper Zero to have a specific third-party firmware installed. Once equipped, an attacker can launch the 'BLE Spam' application and select the type of device they wish to target. The device then sends a series of Bluetooth requests or messages, causing disruptions in the targeted devices' normal operations.

Mitigation: The primary defense against this attack is to disable Bluetooth on your devices. Users can quickly turn off Bluetooth on Android devices using the Quick Settings menu. For Windows, users should disable the "Swift Pair" feature to prevent the spam notifications. Being cautious about the presence of unknown devices in public spaces can also help avoid such attacks.

Microsoft & Windows Security Tip of the Issue

VPN Usage: Safeguarding Your Online Activities Across Microsoft Platforms

Summary: Utilizing a Virtual Private Network (VPN) is more critical than ever, especially in the interconnected ecosystem of Microsoft products. A VPN creates a private network from a public internet connection, masking your IP address so your online actions are virtually untraceable. Most importantly, it establishes secure and encrypted connections, providing greater privacy than even a secured Wi-Fi hotspot.

Why is this important? In the digital age, privacy violations and cyber threats don't just come from shady online activities. Every day internet users are at risk of snooping, data breaches, and personal data sales. For Microsoft users, who might be operating on various devices and platforms, maintaining privacy across all activities, whether it's on a Windows PC, Surface tablet, or through Microsoft's various online services, is paramount.

How to Implement:

  1. Choose a reliable VPN service: Consider subscription-based services that have been vetted for security and privacy. Free VPNs might be tempting but often lack comprehensive security features.

  2. Download and install: Once you've selected a service, download the VPN application on your Windows or Surface device. Most services offer step-by-step installation guidance.

  3. Connect and configure: Launch the VPN application and sign in. Select a server to connect to, or let the application choose the most optimal server. You can adjust settings like auto-start on boot, kill switch (to block all internet traffic if the VPN disconnects unexpectedly), and choose which applications can bypass the VPN.

  4. Stay updated: Regularly update the VPN application to ensure the latest security features are active. Also, keep your device's operating system updated.

By implementing a VPN, users can ensure that their internet browsing, file downloads, and online communications remain private and secure across all their Microsoft devices.

Scams to Watch Out For

Scams on TikTok: What Users Need to Know

Source: YouTube

Summary: The video highlights the increasing number of scams on TikTok, a platform that has gained immense popularity with over a billion users since its inception in 2017. With a significant portion of its user base being young adults and teenagers, the platform has become a hotspot for scammers targeting this demographic. The video discusses various scams, from fake giveaways to bogus products, and provides tips on how to identify and avoid them.

Key Takeaways:

  • Demographics at Risk: About a third of TikTok users are aged 18 to 24, but many scams target even younger individuals, around the age of 14.

  • Top Scams Identified:

    • Easy Money Offers and Fake Giveaways: Scammers often impersonate celebrities to lure users into believing they can win money or prizes by liking, following, or sharing an account.

    • Celebrity Accounts: These fake accounts aim to gain followers and may convince users to invest in cryptocurrency under the guise of charitable donations.

    • Romance Scams: Users should be wary of individuals who quickly declare their love and then ask for money or gifts.

    • Phishing Scams: These scams promise users growth on TikTok, like more followers or account verification. They often involve bot accounts that mimic real users.

    • Bogus Products and Services: Since the launch of TikTok Shop, there has been a rise in vendors selling products at reduced prices. However, the actual product might not match the advertisement or might not exist at all.

  • Spotting Fake Accounts: Look for subtle clues like minor misspellings or extra characters in a web address.

  • Safety Measures: Before purchasing a product, check the seller's website and other social media channels. If a brand name is involved, visit the official website to verify the deal. Users can also set their TikTok account to private and allow only friends to send messages.

  • Reporting Scams: If scammed, users should report the incident to TikTok and change their account password immediately.

Thank You, Hard Targets!

Thank you for taking the time to read this issue. Your continued support means the world to us, and we genuinely appreciate every single one of you. As we strive to bring you the best content and insights in the cybersecurity realm, your engagement and feedback help us grow and improve.

I have a small request: if you found value in our newsletter, please consider introducing a friend or family member to our community. Encourage them to subscribe before our next issue. We're counting on you, our dedicated Hard Targets, to help us expand our reach. This not only helps us offer better content but also enables us to negotiate exclusive discounts on tech and security products and services for our subscribers. And if you’ve made it this far, there is a chance that you’ll actually share the newsletter. The biggest newsletters all say the same thing, out of a million subscribers, there are only 1% who actually take the time to share the content with others.

Don't miss out on our Artwork Insider Access, where we showcase some of the most captivating and thought-provoking cybersecurity-themed art. It's a unique blend of creativity and awareness that we're sure you'll love.

Remember, by staying informed and vigilant, you continue to be a Hard Target in the digital realm. Thank you once again for your unwavering support. Stay safe and see you in the next issue!

Links

Kingdom Dominion Security

& Technology

Subscribe to Premium to read the rest.

Become a paying subscriber of Premium to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In.

A subscription gets you:

  • • Exclusive Artwork Access: Get your hands on all the additional artwork that didn't make it to the main issue. A unique collection curated just for our premium members.
  • • Behind-the-Scenes Insights: Understand the story behind each artwork. Discover the inspiration, the challenges, and the evolution of each piece.
  • • Early Access to New Releases: Be the first to view our upcoming artwork even before it's released to the general public. A sneak peek into our creative world.
  • • Special Discounts on Merchandise: Enjoy exclusive discounts on our merchandise, from prints to apparel. A token of appreciation for our premium members.

Reply

or to participate.