Tag Archive for: OFFER

AT&T to Offer Samsung Galaxy A14 5G Starting Jan. 13


Get More Bang for Your Buck When the Samsung Galaxy A14 5G Arrives at AT&T

Beginning Jan. 13, New and Existing Customers can Purchase the Newest Samsung Galaxy A14 5G for $2/mo. with No Trade in Required1

What’s the news? Beginning Jan. 13, AT&T* is introducing the Samsung Galaxy A14 5G2 – the latest device in the A series line up. AT&T 5G is fast, reliable, and secure, and all AT&T unlimited plans3 include 5G access at no extra charge.

The new Samsung Galaxy A14 5G will be available online and in stores.

AT&T gives you more value for your new Samsung Galaxy A14 5G.

  • Unlimited Plans: With options like Unlimited Your WaySM – we give customers the choice to pick the perfect plan for each family member on the account. All our unlimited plans include AT&T 5G access and AT&T ActiveArmorSM mobile security.4
  • AT&T ActiveArmor: Our built-in security service is a combination of our 24/7 network protection that proactively detects and prevents threats, plus free, easy-to-use security apps and solutions.
  • International Travel with AT&T: Traveling abroad? Use your phone like you do at home with unlimited high-speed data, talk, and text, in 210+ destinations for $10/day.5 We’re also now including talk, text and high-speed data6 in 19 Latin American countries for customers on our Unlimited Premium plan at no extra cost.
  • myAT&T app: Download our free app with updated features like pre-order date calendar reminders to even simpler navigation that gets you to the new Samsung Galaxy A14 5G faster. Text myATT to 556699 for the link.  
  • AT&T Right To You: For a more personal, white glove delivery and expert setup service, try AT&T Right To You – you can pick when and where you want to receive your device. You can also enjoy free shipping with flexible returns, as well as same day pick-up, either in-store or curbside.7 

What about features?

Packed with appealing features like a vivid display, this modern sleekly designed phone is an amazing value for those looking for new and sophisticated without a designer price tag. A few additional features include:

  • 5G Connectivity: This smartphone is powered by fast, reliable, secure AT&T 5G and built with your security in…

Source…

Your data could be stolen by Chinese hackers through a fake gifting offer


Amid the festive cheer, companies offer significant discounts to buyers across all platforms as a part of various festive sale offers. However, scammers are using this as an opportunity to steal critical user data by duping them instead of offering free gifting offers. Cert-In (Indian Computer Emergency Response Team), India’s cyber-security team, has issued an advisory informing users against falling prey to scams offering gifts and offers.

How to avoid getting scammed

Cert-In wrote in the advisory, “Fake messages are circulated on various social media platforms (WhatsApp, Telegram, Instagram, etc.) that falsely claim a festive offer luring users into gift links and prizes. The threat actor campaign is mostly targeting women and asking to share the links among peers over WhatsApp/Telegram/Instagram accounts. The website links are mostly Chinese [.cn] domains and extensions such as .top and .xyz. These attack campaigns can effectively jeopardize the privacy and security of sensitive customer data and result in financial frauds.”

Cert-In stated that there had been various reported cases where the hackers targeted prominent brands and tricked customers into fraudulent phishing attacks and scams through a link or a message on multiple social media and messaging platforms. In addition, they offer a festive offer to attract buyers to follow the link to claim the gift coupon. The attackers then scam the unsuspecting victims into compromising their sensitive information, such as bank account details, passwords, and OTPs.

To prevent yourself from falling prey to these scams, do not browse unknown websites or click on untrusted links, never give away your login details or credit card details by email or SMS, use strong passwords, and do not share your OTP with anyone.

For more technology newsproduct reviews, sci-tech features and updates, keep reading Digit.in.

Source…

North Korean hackers offer fake jobs to distribute malware


Lazarus, a state-sponsored hacker group based in North Korea, is now using open-source software and creating fake jobs in order to spread malware, says Microsoft.

The well-known group of hackers is targeting many key industry sectors, such as technology, media entertainment, and defense, and it’s using many different kinds of software to carry out these attacks.

An image describing how the hacker group ZINC operates.
Microsoft

The next time you get a message on LinkedIn, you should be careful. Microsoft warns that the North Korea-based threat group has been actively using open-source software infected with trojans to attack industry professionals. Microsoft has determined that these social engineering attacks started in late April and continued until at least mid-September.

Lazarus, also referred to as ZINC, Labyrinth Chollima, and Black Artemis, is a state-sponsored military hacking group from North Korea. It’s said that it has been active since at least 2009, and since then it’s been responsible for a variety of large attacks, including phishing, ransomware campaigns, and more.

The group has been creating fake LinkedIn recruiter profiles and approaching suitable candidates with job offers at legitimate, existing companies. “Targets received outreach tailored to their profession or background and were encouraged to apply for an open position at one of several legitimate companies,” said Microsoft.

Once the victims were convinced to move the conversation over from LinkedIn to WhatsApp, which offers encrypted communication, the hackers moved on to the next step. During the WhatsApp conversation, the targets received infected software that allowed Lazarus to deploy malware on their systems.

The end goal for the hackers was to be able to steal sensitive information or obtain access to valuable networks. Aside from the malware — which was found in programs such as PuTTY, KiTTY, TightVNC, muPDF/Subliminal Recording, and Sumatra PDF Reader — the attacks were well-engineered on the social side of things, too, with LinkedIn profiles and companies picked to match the victim’s profession.

A depiction of a hacker breaking into a system via the use of code.
Getty Images

As noted by Bleeping Computer, ZINC has also carried out similar attacks by using fake social media personas to distribute malware….

Source…

US reveals ‘Target’ pic of Conti man with $10m reward offer • The Register


The US government is putting a face on a claimed member of the infamous Conti ransomware group as part of a $10 million reward for information about five of the gang’s crew.

The State Department announced the reward via the Rewards for Justice program’s Twitter account, saying it is looking for information about cybercriminals associated with Conti, Wizard Spider, or Trickbot. Wizard Spider in May was identified as the Russia-linked group behind Conti and Ryuk (which rebranded as Conti in 2020), as well as the Trickbot botnet.

The reward notice included the aliases of the alleged attackers – “Tramp,” “Dandis,” “Professor,”Reshaev,” and “Target” – and came with a photo of a man and a message underneath it that said, “Is this the Conti associate known as ‘Target’?”

conti

The suspect’s face, terrible dress sense and bottle choice. Click to enlarge

It’s the first time the US government has released a photo of a suspect allegedly connected with Conti, although suspected members of other criminal gangs have been pictured.

“The US Government reveals the face of a Conti associate for the first time!” the Rewards for Justice (which offers counterterrorism rewards for the US government) tweet said. “We’re trying to put a name with the face! To the guy in the photo: Imagine how many cool hats you could buy with $10 million dollars!”

US agencies have been putting a lot of money behind its efforts to dismantle the Conti operation and find the people behind it. In May, the State Department announced a reward of up to $15 million for information about the top leaders behind Conti and individuals that had participated in attacks using a variant of its malware.

At the time, the government agency said Conti was the costliest strain of ransomware on record, saying that as of January, there were more than 1,000 victims of attacks that involved Conti. Payouts from those attacks surpassed $150 million – which adds up to a huge stack of…

Source…