• Smart Intel Briefing
  • Posts
  • The Cybersecurity Crucible - Forging Hard Targets – 30 October 2023 | KD Sec & Tech Secure

The Cybersecurity Crucible - Forging Hard Targets – 30 October 2023 | KD Sec & Tech Secure

Unveiling the Latest in Cybersecurity: From Apple's Ecosystem to Microsoft's Updates & Scams to Evade

Introduction

Hello, Hard Targets!

Welcome back, Hard Targets! We're thrilled to have you with us for another edition of our newsletter. Before we dive into the content, we'd like to draw your attention to the stunning artwork featured in this issue. Each piece is meticulously crafted to resonate with the theme and essence of our newsletter.

For our art aficionados, we offer Artwork Insider Access. As a premium subscriber, you get:

  • Exclusive Artwork Access: Dive into a collection of artwork that remains unseen in our main issues.

  • Behind-the-Scenes Insights: Understand the story behind each artwork. Discover the inspiration, challenges, and evolution of each piece.

  • Early Access to New Releases: View our upcoming artwork before it's released to the general public.

  • Special Discounts on Merchandise: Enjoy exclusive discounts on our range of merchandise, from prints to apparel.

If you're joining us for the first time, we extend a warm welcome and encourage you to become a part of our community. Subscribe here to ensure you never miss out on our valuable insights.

Why is this newsletter a must-read? Because in a world teeming with cyber threats, we aim to transform our readers into "Hard Targets" - individuals who are not just aware but are also prepared and resilient against cyber threats. Our content is curated to provide you with the latest in cybersecurity, ensuring you're always a step ahead.

We're committed to keeping you updated semi-weekly, with releases every Monday and Friday. This ensures you're always in the loop with the rapidly evolving world of cybersecurity.

For those who wish to wear their "Hard Target" status with pride, we have exclusive Hard Targets Merchandise. From apparel to accessories, there's something for every Hard Target out there.

In this issue, we'll be delving into the latest cybersecurity news, tips, and threats. From the Apple ecosystem to Microsoft's latest updates, and not forgetting the scams to be wary of, we've got you covered.

Stay safe, stay informed, and remember – always be a Hard Target!

Thanks to Beehiiv for hosting this newsletter. Sign up for other newsletters here.

Cybersecurity Pop Quiz

Test Your Cybersecurity Knowledge with Our Quick Quiz. Let's See If You're a True Hard Target!

Question 1: Which of the following best describes the principle of "Chain of Custody" in digital forensics?

  • a) The sequence in which data packets are transmitted over a network.

  • b) A series of processes to ensure evidence remains intact and unchanged.

  • c) The hierarchy of command within a cybersecurity team.

  • d) The encryption algorithms used to secure a data chain.

Question 2: In the context of cybersecurity, what does the term "Air Gap" primarily refer to?

  • a) The space between two firewalls in a network.

  • b) A network that is physically isolated from unsecured networks.

  • c) The time delay between a security breach and its detection.

  • d) A method to cool down servers in a data center.

Question 3: Which of the following is NOT a primary technique used in digital steganography?

  • a) Embedding messages within images.

  • b) Encrypting data using public key infrastructure.

  • c) Concealing data within audio files.

  • d) Hiding information within video frames.

Answers:

  1. b) A series of processes to ensure evidence remains intact and unchanged.

  2. b) A network that is physically isolated from unsecured networks.

  3. b) Encrypting data using public key infrastructure.

Cybersecurity News and Emerging Technology

Boeing Faces LockBit Ransomware Attack

Source: CyberNews

Summary: Boeing, the aerospace giant, recently fell victim to a ransomware attack orchestrated by the LockBit group. The attackers managed to breach Boeing's security defenses and encrypt a significant portion of their data. While Boeing's commercial airplane production was not directly impacted, the attack did affect their internal operations. The LockBit group is known for its aggressive tactics, often targeting large corporations and demanding hefty ransoms. Boeing is currently working with cybersecurity experts to mitigate the effects of the attack and restore their systems.

What’s the importance of this article? This article underscores the vulnerabilities that even large, well-established corporations face in the realm of cybersecurity. The fact that a group like LockBit can successfully target a company of Boeing's stature is a stark reminder of the evolving threats in the digital world. It emphasizes the need for continuous vigilance and proactive measures in cybersecurity.

How could this affect me? While the direct impact on individual consumers might be minimal, such attacks can have cascading effects on industries and economies. Delays in production, potential hikes in prices due to recovery costs, or even concerns about the safety of products can arise. For stakeholders or individuals invested in such companies, there could be financial implications. Moreover, it's a reminder for everyone to ensure their digital assets, whether personal or professional, are adequately secured.

Elon Musk Gives X Employees One Year to Replace Your Bank

Source: The Verge

Summary: Elon Musk envisions X as the epicenter of your financial universe, managing every monetary aspect of your life. By the end of 2024, he anticipates launching these features, emphasizing their potency during a recent all-hands call with X employees. Musk's ambition extends beyond simple transactions; he envisions a platform where bank accounts become redundant. The company is in the process of securing money transmission licenses across the US to offer these services. Musk's broader vision for X is reminiscent of his early endeavors with X.com, which later merged into PayPal. His aspiration is to transform X into an "everything app," similar to multifunctional apps like WeChat.

What’s the importance of this article? This article underscores Elon Musk's ambitious plans to revolutionize the financial sector by integrating comprehensive financial services into the X platform. His vision of creating an "everything app" could potentially change the way users interact with financial platforms, making them more integrated and user-friendly.

How could this affect me? If Musk's vision comes to fruition, users might experience a seamless financial ecosystem within the X platform. This could mean more integrated services, easier transactions, and potentially eliminating the need for separate bank accounts. However, trusting a single platform with one's entire financial life might also raise concerns about security and data privacy.

How the Lenovo Yoga Book 9i Beat the Mighty MacBook Pro to Our Laptop of the Year Award

Source: TechRadar

Summary: The Lenovo Yoga Book 9i has been recognized as the "Laptop of the Year" at the TechRadar Choice Awards 2023. This laptop stands out with its dual 13.3-inch 2.8K OLED screens, offering users a unique dual-screen Windows 11 desktop experience. The device also comes with a detachable keyboard, allowing for a traditional laptop feel. When the keyboard is placed on the bottom screen, it transforms the remaining screen space into a large touchpad. The Yoga Book 9i is powered by a 13th-generation Intel Core i7-1355U, 16GB of RAM, and up to 1TB of SSD storage. Despite its powerful specs and dual screens, the laptop offers impressive battery life, lasting almost 10 hours with both screens on.

What’s the importance of this article? The article emphasizes the innovative design and features of the Lenovo Yoga Book 9i, which has managed to stand out in a market dominated by traditional laptop designs. Its dual-screen setup, combined with powerful hardware, makes it a game-changer in the laptop industry.

How could this affect me? If you're in the market for a new laptop, the Lenovo Yoga Book 9i offers a unique dual-screen experience that can enhance productivity. Its impressive battery life and powerful specs make it suitable for both work and entertainment. However, its premium price point might be a consideration for potential buyers.

Use This Hidden Google Feature to Detect and Delete Your Personal Information in Search

Source: CNBC

Summary: Google offers a lesser-known feature that notifies users when their personal details, such as phone numbers, emails, or addresses, appear in search results. This proactive approach allows users to request the removal of such information from Google Search. While the data isn't deleted from the internet, its visibility on Google Search is reduced, making it harder for individuals to find it. Users can set up alerts by logging into their Google account, navigating to myactivity.google.com/results-about-you, and following the provided steps to add their personal details.

What’s the importance of this article? The article sheds light on a valuable tool provided by Google that enhances user privacy. In an era where personal information can easily be misused or exploited, having the ability to monitor and control its visibility on the most widely used search engine is crucial.

How could this affect me? If you're concerned about your personal information appearing in Google search results, this feature can be a game-changer. By setting up alerts, you can take prompt action whenever your details surface online, ensuring better control over your digital footprint and enhancing your online privacy.

Intel Doesn’t Think That Arm CPUs Will Make a Dent in the Laptop Market

Source: Ars Technica

Summary: Chip giants like Qualcomm, Nvidia, and AMD are gearing up to introduce Arm chips for the consumer PC market. Qualcomm is set to lead with its Snapdragon X Elite and a new CPU architecture named Oryon by mid-2024. Meanwhile, Nvidia and AMD have their sights set on a 2025 release for their Arm chips tailored for Windows PCs. Despite the potential threat, Intel's CEO, Pat Gelsinger, remains unfazed. He pointed out that Arm and Windows client alternatives have historically played minor roles in the PC business. While Arm PCs have been around for over a decade, they haven't significantly impacted the laptop market. However, Apple's shift to its own Apple Silicon chips has been a notable exception, which has proven successful both in terms of hardware and software.

What’s the importance of this article? The article delves into the evolving landscape of the PC chip market, with major players venturing into Arm chips. While Intel remains a dominant force, the success of Apple's Silicon transition and the upcoming releases from Qualcomm, Nvidia, and AMD could reshape the dynamics of the industry.

How could this affect me? If you're a consumer in the market for a new laptop or PC, the rise of Arm chips could offer more diverse choices in terms of performance and efficiency. Moreover, if other chipmakers can replicate Apple's success with its Silicon chips, it might lead to a broader shift in the market, potentially affecting prices, performance, and features of future devices.

Boston Dynamics' Talking Robot Dogs Have Different Personalities Now, from '1920's Archaeologist' to 'Shakespearean Time Traveler'

Summary: Boston Dynamics has integrated OpenAI's ChatGPT into its iconic robot dogs, enabling them to speak in full sentences. These robot dogs, named Spot, now come with diverse personalities such as "1920's Archaeologist," "Precious Metal Cowgirl," "Nature Documentary," and "Shakespearean Time Traveler." One of the robots, with the personality "Josh," even exhibits a sarcastic and nihilistic tone. AI software company Levatas collaborated with Boston Dynamics to incorporate OpenAI's ChatGPT into Spot, utilizing Google Assistant's voice technology. This allows the robots to listen and verbally respond to humans. Beyond entertainment, this integration is designed to help the robots interpret data and convey it in a manner easily understood by the average individual. These robots have been deployed in various settings, from hospitals during the COVID-19 pandemic to agricultural fields in New Zealand.

What’s the importance of this article? The article showcases the advancements in robotics and AI integration, emphasizing the potential of robots to interact more humanely and effectively with their environment and users. The diverse personalities equipped in Boston Dynamics' robot dogs represent a significant leap in making robots more relatable and versatile in their interactions.

How could this affect me? As robotics and AI continue to merge, we might see more personalized and human-like interactions with machines in various sectors, from healthcare to agriculture. This could lead to more efficient and tailored user experiences but also raises questions about the ethical implications of giving machines human-like traits and personalities.

Cybersecurity General Tip of the Issue

Endpoint Security: Protecting Individual Devices in a Connected World

Summary: Endpoint security focuses on safeguarding individual devices, termed "endpoints", in our interconnected digital landscape. As we increasingly rely on a multitude of devices, from smartphones to laptops, ensuring the security of each becomes paramount.

Why is this important? In today's digital age, most individuals utilize multiple devices across various platforms. The rise of the Internet of Things (IoT) has expanded the realm of connected devices beyond just computers and phones. With the trend of remote work and Bring Your Own Device (BYOD) policies, personal devices often double up for professional use. This convergence makes each device a potential entry point for cyber threats, emphasizing the need for robust endpoint security.

How to Implement: Regularly scan your devices for vulnerabilities and ensure all software is up-to-date. Employ trusted security solutions tailored for each device type and operating system. Exercise caution when downloading files or apps, always opting for trusted sources. If using a device for both personal and professional tasks, consider creating separate user profiles or partitions to segregate data.

The Apple Ecosystem

Apple Watch's Best New Feature is Now Live

Source: TechCrunch

Summary: Apple has released watchOS 10.1, introducing the "Double Tap" feature for Apple Watch Series 9 and Apple Watch Ultra 2 owners. This feature allows users to interact with their smartwatch using a gesture-based method, where tapping the index finger and thumb together twice triggers specific actions. The Double Tap feature was the highlight of this update and offers a new way to engage with the watch, especially when the other hand is occupied. It is built upon AssistiveTouch, an accessibility feature previously available to Apple Watch users. The new version has various applications, from scrolling through notifications to pausing music or turning on the flashlight.

What’s the importance of this article? The introduction of the "Double Tap" feature signifies Apple's continuous efforts to enhance user experience and accessibility. It showcases the company's innovative approach to integrating gesture-based interactions, making the Apple Watch more user-friendly and versatile.

How could this affect me? If you own or plan to purchase an Apple Watch Series 9 or Apple Watch Ultra 2, this feature will provide a more seamless and hands-free interaction with your device. It can simplify tasks, especially when your hands are full, enhancing the overall utility of the watch.

How to Use StandBy: New Full-Screen Feature in iOS 17

Source: Fox News

Summary: Apple's iOS 17 introduces a new feature called "StandBy" that transforms your iPhone into a full-screen display when it's charging horizontally. This feature displays a clock face, weather updates, photos, and more on your screen while your phone is in landscape mode and charging. The idea is to allow users to view content from a distance when the iPhone is placed on its side during charging. StandBy also integrates with Siri and supports incoming calls, allowing users to interact with Siri and manage calls directly from the StandBy screen. Additionally, the feature adjusts to environmental conditions, dimming to red at night to reduce eye strain and conserve battery life.

What’s the importance of this article? The introduction of the "StandBy" feature in iOS 17 showcases Apple's commitment to enhancing user experience by maximizing the utility of the iPhone even when it's charging. It offers a blend of convenience, functionality, and aesthetics, making the charging process more interactive and informative.

How could this affect me? If you're an iPhone user, the StandBy feature can enhance your charging experience, providing you with a dynamic display of useful information and quick access to Siri and calls. It can serve as a nightstand display, giving you a glanceable view of the time, weather, and other data without needing to unlock your device.

How to Right-Click, Easily Add Emojis, and More with These Mac Keyboard Shortcuts

Source: USA TODAY

Summary: USA TODAY provides a comprehensive guide on various Mac keyboard shortcuts that can enhance the user experience. The article highlights the new "StandBy" feature in iOS 17, which turns the iPhone into a full-screen display when charging horizontally. It also delves into how to right-click on a Mac, given that Mac trackpads and mice don't have buttons. Users can either press Control while clicking or use two fingers on the trackpad. For emoji enthusiasts, the article provides a shortcut to open the emoji gallery on a Mac using control + command + space bar. Additionally, the article explains the Split Screen mode, which allows users to use two apps simultaneously by splitting the screen. Lastly, the article offers shortcuts for managing multiple open tabs and apps.

What’s the importance of this article? This article is a valuable resource for Mac users, offering a range of keyboard shortcuts that can streamline tasks and improve efficiency. Whether it's managing multiple apps, inserting emojis, or utilizing the Split Screen mode, these shortcuts can significantly enhance the Mac experience.

How could this affect me? If you're a Mac user, implementing these shortcuts can save you time and make your tasks more manageable. By familiarizing yourself with these shortcuts, you can navigate your Mac more efficiently, making multitasking easier and more intuitive.

Bonus: The Truth Behind iPhone Software Updates and Battery Degradation

Source: YouTube

Summary: A common misconception is that updating iPhone software allows Apple to deliberately slow down older phones, pushing users to buy new ones. In reality, the laws of chemistry dictate that batteries degrade over time, reducing their maximum power output. To prevent older iPhones with degraded batteries from shutting down unexpectedly, Apple decided to underclock the CPU. However, they did this without informing users, leading to conspiracy theories. After facing public backlash and a lawsuit, Apple now provides a setting for users to choose whether they want to run their old iPhones at full speeds, despite the risk of unexpected shutdowns. The video emphasizes that this behavior is inherent in the iPhone itself and not the software update. Users are encouraged to update their phones for security reasons and consider battery replacement for older, slower phones to regain speed.

What’s the importance of this article? This video dispels a widespread myth about Apple's intentions with software updates. It educates users about the real reasons behind potential slowdowns in older iPhones and emphasizes the importance of understanding battery degradation.

How could this affect me? If you own an older iPhone and have noticed a decrease in performance, understanding the actual reasons can help you make informed decisions. Instead of buying a new phone, you might just need a battery replacement to restore its speed. Additionally, it's crucial to keep your phone updated for security reasons.

The Apple Ecosystem Security Tip of the Issue

Endpoint Security: Protecting Individual Devices in a Connected World

Summary: Endpoint security refers to the protection of individual devices, such as computers, smartphones, and tablets, within a network. In today's interconnected world, where devices are constantly communicating with each other and accessing various networks, ensuring the security of each endpoint becomes crucial. This is because a vulnerability in one device can potentially provide a gateway for threats to infiltrate the entire network.

Why is this important? With the proliferation of devices and the increasing reliance on digital platforms, the number of endpoints that can be targeted by malicious actors has grown exponentially. Apple products, known for their robust security features, are not immune to threats. Ensuring endpoint security is not just about protecting individual devices but safeguarding the integrity of the entire ecosystem.

How to Implement:

  1. Regular Updates: Always keep your iOS, iPadOS, macOS, and watchOS updated to the latest versions. Apple frequently releases security patches to address vulnerabilities.

  2. Enable Firewall: On macOS, ensure that the built-in firewall is enabled to prevent unauthorized applications, programs, and services from accepting incoming connections.

  3. Limit Permissions: Only grant application permissions that are absolutely necessary. Regularly review and revoke permissions for apps that you no longer use.

  4. Use Trusted Software: Only download apps and software from trusted sources like the App Store.

  5. Enable Find My: For iOS and iPadOS devices, enable the 'Find My' feature. This not only helps in locating a lost device but also allows you to erase your device remotely in case it gets stolen.

  6. Two-Factor Authentication: Enable two-factor authentication for your Apple ID to add an extra layer of security.

  7. Regular Backups: Regularly backup your data using iCloud or to your Mac to prevent data loss in case of a security breach.

  8. Stay Informed: Regularly check Apple's security updates page to stay informed about any potential vulnerabilities and the steps Apple is taking to address them.

Remember, while Apple provides a range of tools and features to enhance security, the onus is also on the user to use these tools effectively and adopt safe digital habits.

Samsung & Android

Google Maps Now Uses AI to Find Where People Are Having Fun

Source: Gizmodo

Summary:
Google has introduced a new feature in Maps that suggests events and activities to users when they type "things to do" in the search bar. This feature utilizes artificial intelligence to analyze billions of photos shared by the Maps community, focusing on specific activities. The AI-driven feature aims to help users discover new spots that align with their interests. Initially launched in France, Germany, Japan, and the UK, it will be available to U.S. users this week. Additionally, Google has added other features like an expanded immersive view of cities, locating EV charging stations, and using AI for in-depth visualizations to create a 3D scene. Google's Lens feature also integrates AI with its "Search with Live View," allowing users to scan their surroundings for information about nearby landmarks.

What’s the importance of this article?
The article underscores Google's continuous efforts to enhance user experience on its Maps platform by integrating AI-driven features. By analyzing billions of user-shared photos, Google Maps can now provide personalized activity suggestions, making it easier for users to discover new places and events.

How could this affect me?
If you're a Google Maps user, this feature can offer personalized suggestions for activities and events based on your interests and the vast amount of data shared by the Maps community. It can simplify the process of finding new places to visit or things to do, especially when traveling or exploring a new city.

OnePlus Silently Equipped Open with a Feature Fold 5 Users Wish They Had

Source: PhoneArena

Summary:
The OnePlus Open, despite being more affordable than competitors like the Google Pixel Fold and the Samsung Galaxy Z Fold 5, boasts comparable specifications to the Fold 5. A user recently discovered that the OnePlus Open supports stylus input, contrary to OnePlus's initial claims. Both screens of the OnePlus Open work with a stylus, specifically the OPPO Pen, an accessory designed for the OPPO Find N2. This stylus also offers additional functionalities, such as taking screenshots. While the OnePlus Open lacks features like wireless charging and the same level of water protection as the Fold 5, its starting price of $1,699 makes it $100 cheaper than the Fold 5.

What’s the importance of this article?
The article highlights OnePlus's strategy of offering high-end features at a more affordable price point compared to its competitors. The discovery of the stylus support on the OnePlus Open underscores the device's value proposition, especially when considering its price relative to other foldable phones in the market.

How could this affect me?
If you're considering purchasing a foldable phone, the OnePlus Open offers a compelling alternative to pricier options like the Samsung Galaxy Z Fold 5. The added stylus support enhances its functionality, making it a versatile choice for users seeking a blend of performance, features, and affordability.

Android 14 Storage Bug: Users Locked Out of Devices

Source: OPP.Today

Summary:
Android 14, Google's latest operating system, is grappling with a significant storage bug that locks users out of their devices, especially those using the “multiple profiles” feature. This bug is likened to the effects of “ransomware” due to the inability of users to access their device storage. Initially thought to be exclusive to the Pixel 6, it's now known to affect a broader range of devices, including the Pixel 6, 6a, 7, 7a, Pixel Fold, and Pixel Tablet. Despite over 350 replies on Google's issue tracker, there's been no official response from Google. The bug has been labeled with a medium priority level of “P2” and remains unassigned. The primary profile, usually the most crucial, gets locked out due to this bug.

What’s the importance of this article?
The article brings to light a significant issue with Android 14, a widely used operating system. The storage bug not only disrupts the user experience but also raises concerns about data accessibility and device functionality. The lack of response from Google further accentuates the need for users to be aware and cautious.

How could this affect me?
If you're using or planning to upgrade to Android 14, especially on the mentioned devices, you might face challenges accessing your device storage. This can render your device nearly unusable, with issues ranging from boot loops, crashing apps, and an inability to view files. It's essential to stay informed and possibly delay the update until a fix is released.

Samsung & Android Security Tip of the Issue

Samsung & Android Security Tip of the Issue: Endpoint Security in the Android Ecosystem

Summary:
Endpoint security refers to the protection of individual devices, such as smartphones, tablets, and computers, from potential threats. In the context of the Android ecosystem, this means safeguarding devices running the Android operating system from malware, phishing attacks, and other malicious activities.

Why is this important?
The Android ecosystem, being open-source and widely used, is a prime target for cybercriminals. With the increasing number of apps available on the Play Store and third-party stores, the chances of encountering malicious software are higher. Endpoint security ensures that individual devices are fortified against these threats, preventing unauthorized access and data breaches.

How to Implement:

  1. Regular Updates: Always keep your Android device updated with the latest security patches released by Google or your device manufacturer.

  2. App Permissions: Be cautious about granting permissions to apps. Only give permissions that are necessary for the app to function.

  3. Download from Trusted Sources: Only download apps from the Google Play Store or trusted third-party stores. Avoid downloading APKs from unknown sources.

  4. Use Security Software: Install a reputable antivirus or security app that can scan for malware and block phishing websites.

  5. Encrypt Your Device: Use the built-in encryption feature to encrypt your device's data, making it inaccessible without the correct password or PIN.

  6. Two-Factor Authentication: Enable two-factor authentication for your Google account and other essential accounts to add an extra layer of security.

By implementing these practices, you can ensure that your Android device remains secure against potential threats, safeguarding your data and privacy.

Microsoft & Windows

Windows 11 Feature Slows Down SSDs by Up to 45 Percent: What You Can Do About It

Source: PCWorld

Summary: Microsoft's BitLocker software encryption for SSDs, activated by default in Windows 11 Pro, can reduce SSD performance by up to 45%. This is due to the constant encryption and decryption processes by the CPU during read and write operations. Many SSDs support hardware-based encryption, but Windows 11 Pro activates BitLocker's software-based encryption during installation. This decision likely stems from Microsoft's lack of control over hardware-based encryption code, which is managed by SSD manufacturers.

What’s the importance of this article? The article highlights a significant performance issue with Windows 11 Pro's default settings, which can drastically reduce SSD speeds. This is crucial for users to be aware of, especially those prioritizing system performance.

How could this affect me? If you're using Windows 11 Pro with BitLocker software encryption enabled, you might experience slower SSD performance. This can affect system responsiveness, application load times, and overall user experience.

What's New in Security in the Windows 11 September 26, 2023 Update

Summary: The Windows 11 2023 Update introduces several security enhancements. Notable features include a new page in the Settings app for managing passkeys for apps and websites, a "Presence Sensing" feature to control devices that detect user presence, and a new application for backing up apps, settings, and credentials to the cloud. The update also offers improvements for Windows Hello for Business and will warn users about unsafe passwords.

What’s the importance of this article? The article provides an overview of the latest security features and improvements in the Windows 11 2023 Update. These features aim to enhance user security, privacy, and data protection.

How could this affect me? If you're a Windows 11 user, these updates can offer you better security and privacy controls. Features like "Presence Sensing" can enhance device security, while the new backup application can ensure data safety. Being aware of these features allows you to make the most of the security enhancements provided by the update.

Windows 11 Now Lets You Write Anywhere You Can Type

Source: The Verge

Summary: Microsoft has introduced updates to Windows Ink, allowing users to write in any location where typing is possible on Windows 11. This handwriting-to-text conversion is now functional within search boxes and other Windows 11 elements where typing is typically required. This feature is currently available for US English, with more languages to be supported soon. Microsoft has also enhanced its handwriting recognition technology for better accuracy. Additionally, gestures have been introduced to delete, select, join, and split words, including a gesture to move text to a new line. This update also brings several bug fixes and improvements to Windows 11.

What’s the importance of this article? This article emphasizes Microsoft's commitment to enhancing user experience and accessibility on Windows 11. The integration of handwriting-to-text conversion across the OS demonstrates the company's innovative approach to making the platform more versatile and user-friendly.

How could this affect me? If you're a Windows 11 user, especially one who uses a stylus or has a touch-enabled device, this update can significantly improve your interaction with the OS. It offers a more intuitive way to input data, making tasks like searching and note-taking more efficient and seamless.

Microsoft & Windows Security Tip of the Issue

Endpoint Security: Safeguarding Microsoft Devices and Services

Summary: Endpoint security focuses on ensuring that endpoints or entry points of end-user devices like computers, mobile devices, and laptops are secured. This means that malicious activities are blocked from spreading across networks. Microsoft's ecosystem, which includes Windows OS, Office 365, and Azure among others, can benefit immensely from robust endpoint security measures.

Why is this important? With a vast number of businesses and individuals relying on Microsoft products and services, the potential risk of cyber threats is significant. Endpoint security ensures that each device connected to a network is scanned and verified, reducing the risk of potential breaches.

How to Implement:

  1. Use Microsoft Defender: Integrated into Windows, it offers comprehensive protection for your system.

  2. Regular Updates: Ensure that all Microsoft software, including Windows and Office, are regularly updated.

  3. Enable BitLocker: This encryption tool, available in Windows, encrypts the whole disk, which makes it harder for malicious actors to alter system files.

  4. Limit User Privileges: Not every user on a network needs to have administrative privileges. Limiting these can prevent the installation of malicious software.

  5. Educate and Train: Ensure that all users are aware of the risks and know how to identify potential threats, such as phishing emails.

By implementing these measures, users of Microsoft products and services can ensure a safer and more secure digital environment.

Scams to Watch Out For

Scams to Watch Out For at Airports and During Travel

Source: YouTube

Summary: The video highlights various scams that travelers might encounter, especially at airports. From fake airport employees trying to mislead travelers to taxi scams, the video emphasizes the importance of staying vigilant and informed. The narrator shares personal experiences and stories from friends to illustrate how these scams operate and offers tips on how to avoid falling victim to them.

Key Takeaways:

  • Airport Scams: Be wary of individuals posing as airport employees. Always double-check with official sources if you're unsure.

  • Taxi Scams: Always confirm the price before starting your journey. If a taxi meter is "broken" or isn't running, find a different taxi. Use official taxi booths at airports.

  • Ride-Sharing Misinformation: Taxi drivers might misinform you about the availability of services like Uber. Always check the app or do your research before believing such claims.

  • Distraction Scams: Be cautious of individuals trying to distract you, as this might be an attempt to pickpocket or scam you.

  • Rental Car Scams: Thoroughly inspect rental cars for any damage before signing any papers. Document any existing damage with photos or videos.

  • Airline Phone Scam: Scammers might list their phone numbers online, posing as customer service for airlines. Always ensure you're calling the official number.

  • General Advice: Stay vigilant, especially in unfamiliar environments. Do your research, ask questions, and trust your instincts.

Thank You, Hard Targets!

Thank you for taking the time to read this issue. Your continued support means the world to us, and we genuinely appreciate every single one of you. As we strive to grow and provide even better content and exclusive discounts on tech and security products, we have a small request. If you found value in our newsletter, please consider introducing a friend or family member to our community. Your recommendation can make a significant difference, and we're counting on you to help spread the word.

Don't miss out on our Artwork Insider Access. It's a unique opportunity to dive deeper into the creative process and stories behind our artwork. As a Hard Target, you deserve nothing but the best, and we're committed to delivering that with every issue.

Remember, being a Hard Target is not just about being informed; it's about being prepared, resilient, and always a step ahead in the world of cybersecurity.

Once again, thank you for your unwavering support. Let's continue to grow together and make the digital world a safer place for all.

Stay safe and always be a Hard Target!

Links

Kingdom Dominion Security

& Technology

Subscribe to Premium to read the rest.

Become a paying subscriber of Premium to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In.

A subscription gets you:

  • • Exclusive Artwork Access: Get your hands on all the additional artwork that didn't make it to the main issue. A unique collection curated just for our premium members.
  • • Behind-the-Scenes Insights: Understand the story behind each artwork. Discover the inspiration, the challenges, and the evolution of each piece.
  • • Early Access to New Releases: Be the first to view our upcoming artwork even before it's released to the general public. A sneak peek into our creative world.
  • • Special Discounts on Merchandise: Enjoy exclusive discounts on our merchandise, from prints to apparel. A token of appreciation for our premium members.

Reply

or to participate.