Tag Archive for: easier

Cybercrime Has Gone Commercial (And It’s Easier Than Ever)


CEO and Co-Founder of Egress.

What level of IT skills would you need to infiltrate an enterprise organization? Some might assume you’d require at least intermediate (or even expert) skills to hack a major business. But in reality, all someone needs is an internet-connected device, a few hundred dollars and to know the right place to look.

Recent threat intelligence research published by Egress shows that cybercrime has truly gone commercial — and it’s simpler than ever for a wannabe cybercriminal to get started.

Phishing-As-A-Service (PhaaS)

A modern business doesn’t specialize in everything. It borrows (and pays for) the expertise of others to handle a multitude of operations. For example, you might have software bought or leased from a third party to handle accounting, cybersecurity or digital communication. Modern cybercrime gangs specialize to sell their knowledge and skills in a similar way.

Within the phishing-as-a-service (PhaaS) industry, different vendors offer services to other cybercriminals who don’t share the same skills or experience. Some might specialize in open-source intelligence (OSINT) or creating initial breaches into organizations. Others might develop ransomware or create phishing email templates.

Buyers can browse online marketplaces, make requests for specific products and leave their Telegram handles for more information. Sellers offer their products complete with customer feedback and reviews, plus we’ve even seen Black Friday sales tactics aiming to sweeten deals. Many of these marketplaces are hosted on the dark web — but not all of them. If someone wants to, they can pretty easily find one.

Lowering The Cybercrime Skills Barrier

It’s possible to infiltrate a major organization with few (or no) hacking skills. Phishing is the perfect crime for inexperienced cybercriminals, as all the scammer needs to do is wait for an insider to click on a link in a phishing email and download malware or enter credentials into a spoofed website. And they don’t even need to create the email template or back-end code — everything they need for a hack can be purchased in a “phishing kit.”

Phishing kits are popular…

Source…

Hacking a smart TV is easier than you think












Smart TVs are expected to be used by 32.8 million Japanese by 2026

LONDON, Sept. 30, 2021 /PRNewswire/ — According to Statista, 21.6 million households in Japan owned a smart TV in 2019 and it is expected to grow to 32.8 million by fiscal year 2026. However, many people do nothing to protect their smart devices.


In 2019, the FBI released a warning stating that smart TVs can make users vulnerable to surveillance and attacks by bad actors. Since then, user security technology has become more advanced, but internet-connected devices remain vulnerable.


“Like any device that regularly connects to the internet, smart TVs collect a lot of private data, which leads to a variety of privay and security concerns. But, unlike other smart devices, they cannot be equipped with the latest cybersecurity software (like antivirus), and that makes them even more vulnerable to cybercrime,” a digital security expert from NordVPN, Daniel Markuson, comments.




What should we be concerned about?

With smart TVs, the possibility of somebody actually watching or listening to users is much higher than with a traditional set. Hackers can access a smart TV’s camera and microphone through malware, which they can slip into the user’s TV if it is connected to Wi-Fi.

Tracking is another issue that users need to worry about. Like any smart device, smart TVs use a lot of trackers. Services like Netflix, Hulu, or HBO GO collect users’ data and track their streaming behavior to personalize their experience on the platforms.


In addition, if a smart TV is used for web browsing, it can be infected with various viruses too. Like computers, smart TVs run on software, but they don’t have the same strong antivirus and firewall systems installed.


How to improve your smart TV’s security?

  • Use strong passwords. If your TV is regularly or continually connected to the internet, make sure the device itself uses strong, hard-to-guess passwords.
  • Always update your TV’s software whenever a new version becomes available.
  • Secure your router. Along with any other IoT devices you might have, your smart TV will probably connect to the internet through a router in your house….

Source…

AWS Announces the Next Version of Amazon Aurora Serverless, a New Capability that Makes it Easier to Migrate from SQL Server to Amazon Aurora, and an Open Source Project to Help More Organizations Leave SQL Server for PostgreSQL


SEATTLE–()–Today at AWS re:Invent, Amazon Web Services, Inc. (AWS), an Amazon.com, Inc. company (NASDAQ: AMZN), announced the next version of Aurora Serverless, as well as a new capability that makes it easier for customers to migrate from SQL Server to Amazon Aurora PostgreSQL, and a new open source project that helps even more organizations migrate off legacy databases to open source alternatives. For customers that don’t want to deal with the work associated with self-managing database capacity, Amazon Aurora Serverless v2 scales to hundreds of thousands of transactions in a fraction of a second, delivering up to 90% cost savings compared to provisioning for peak capacity. AWS also announced Babelfish for Aurora PostgreSQL, a new capability for Amazon Aurora that allows customers to run SQL Server applications directly on Amazon Aurora PostgreSQL with little to no code changes. Finally, AWS shared its plans to open source Babelfish for PostgreSQL under the permissive Apache 2.0 license and make it available on GitHub. Together these innovations make Amazon Aurora even more attractive for a wide range of workloads, and bring the benefits of Amazon Aurora and PostgreSQL to more organizations. To get started, visit https://aws.amazon.com/rds/aurora/

Old-guard, legacy databases that have been developed and used for many decades typically require a well-trained and funded support staff to run and manage them. These commercial databases offer high performance and advanced availability features, but are expensive, complex to manage, and have high lock-in. Moreover, customers that are self-managing commercial databases are often at the mercy of old-guard database vendors and the brazen tricks they play, such as imposing arbitrary and punitive licensing terms. Today, more than a hundred thousand customers are choosing to run their database workloads on Amazon Aurora because it delivers the performance and availability of the highest-grade commercial databases at one tenth of the cost, making it the fastest-growing service in AWS history. In total, more than 350,000 databases have been migrated to AWS using AWS Database Migration Service (DMS). Today’s…

Source…

Android 12 will make using third-party apps easier while ensuring phone’s security isn’t compromised – Firstpost

Android 12 will make using third-party apps easier while ensuring phone’s security isn’t compromised  Firstpost
“android security news” – read more