Hackers love Ryan Gosling. In fact, hackers use his name as bait more than any other celebrity. 

With that, the celebrated star of “Barbie” and umpteen other hit films tops our Hacker Celebrity Hot List for 2023. It’s our annual study that reveals which big-name celebrity searches most often link to malware and risky sites. And this year, we’ve evolved the list. It now includes celebs spotted in deepfake and other AI-driven content. 

With Gosling’s high profile this year, it comes as little surprise that he ranked so highly. As we reported earlier this year, “Barbie” was a huge hit for cybercriminals as well. They baited consumers with a rash of ticket scams, download scams, and other attacks that capitalized on the summer hit’s hype.  

Who made the Hacker Celebrity Hot List? 

Months later, searches for Gosling remain high. His portrayal of Ken has scored him a first-ever Billboard Hot 100 song with “I’m Just Ken.” Meanwhile, Ken and Barbie outfits rank among the most popular Halloween costumes for 2023. 

And if you’re wondering, Margot Robbie, who starred as Barbie to Gosling’s Ken, ranked number eight on our list. The full top ten breaks down as follows: 

  1. Ryan Gosling, Golden Globe winner and multiple Academy Award nominee.  
  2. Emily Blunt, critically acclaimed actor and star of this summer’s hit film, Oppenheimer. 
  3. Jennifer Lopez, pop culture icon, critically acclaimed singer, actor, and producer. 
  4. Zendaya, critically acclaimed actor and singer.  
  5. Kevin Costner, Academy Award-winning actor and director, and current star of the hit series, Yellowstone. 
  6. Elon Musk, business magnate and tech entrepreneur.  
  7. Al Roker, the “Today” show’s popular meteorologist, author, and journalist.  
  8. Margot Robbie, actor, producer, and multiple Academy Award and BAFTA award nominee, and the star of this summer’s hit film, Barbie. 
  9. Bad Bunny, multi-platinum album singer, and the first non-English-language singer to be named as Spotify’s most streamed artist of the year.  
  10. America Ferrera, actor and noted supporting star of this summer’s hit film, Barbie. 

What’s at risk when you search for these celebrities. 

The hackers behind these celebrity-driven attacks are after two primary things.  

  • They want you to hand over personal info so they can use it to commit identity fraud and theft. 
  • They want to infect your device with malware. That might include spyware that can steal personal info or ransomware that holds your device and its files hostage—for a price. 

Accordingly, they’ll pair celebrity names with terms like audio book, lyrics, deepfake, free ringtone, free movie, free download, MP4, among others—which generate results that lead to sketchy sites. 

In all, they target people who want to download something or get a hold of celebrity-related content in some form. Again, think of the “Barbie” movie scams earlier this year that promoted free downloads of the movie — but of course they were malware and identity theft scams. 

Searching for a celebrity name alone didn’t necessarily lead to a list of sketchy results. Our own Chief Technology Officer, Steve Grobman, described the risks well. “We know people are seeking out free content, such as movie downloads, which puts them at risk. If it sounds too good to be true, it generally is and deserves a closer look.” Yet hackers know how hungry people are for celebrity content, and unfortunately some people will go ahead and click those links that promise celebrity-filled content, despite the risks. 

Who else made the Hacker Celebrity Hot List? 

Further rounding out the list, we found several big names from sports and popular culture. 

Argentine soccer player Lionel Messi comes in at number 18 on the list, who recently made the move to Miami’s Major League Soccer team. Recent retiree and all-time American football great Tom Brady clocked in at number 19, and Travis Kelce, American football tight end for the Kansas City Chiefs, came in at number 22. NBA star Steph Curry at number 23, while Aaron Rogers, another American football legend, came in at number 31. And Serena Williams, a dominant force on the court and in culture, ranked at number 32.  

Reality and pop culture favorites also made the top 50, with Andy Cohen of “Real Housewives” fame taking the number 11 slot, followed by Kim Kardashian at number 24, and Tom Sandoval at number 40 on the list. 

And for the Swifties out there, Taylor Swift ranked 25 on our list this year. 

Also making the list — AI scams. 

Thanks to readily available AI tools, cybercriminals have increased both the sophistication and volume of their attacks. It’s no different for these celebrity-based attacks. 

According to McAfee researchers, one such AI-driven trend is on the rise: deepfakes. For example, Elon Musk. He hit number six on our list, and our researchers found a significant volume of malicious deepfake content tied to his name — often linked with cryptocurrency scams.   

Taking a sample set of the top 50 list, McAfee researchers discovered between 25 to 135 deepfake URLs per celebrity search. While there are instances of malicious deepfakes, many celebrity deepfakes fall into recreational or false advertising use cases right now. However, there is growing evidence that future deepfakes could turn deceptive — deliberately passing along disinformation in a public figure’s name. 

Staying safe while searching for celebs — and in general. 

You have every reason, and every right, to search for and enjoy your celebrity content safely. A mix of a sharp eye and online protection can keep you safe out there. 

  • Go with outlets and websites you can trust. When it comes time to get your celebrity news, look for names you know. Reliable sources that have been around. The reality is that it’s not tough for hackers and scammers to quickly spin up their own (completely bogus) “celebrity news” sites. In fact, it’s rather easy, thanks in part to AI that can generate phony articles that otherwise look real.  
  • Stick with legitimate streaming and download services. Whether you want to spin something from Taylor Swift’s latest album (Taylor’s version, of course) or stream movies from your favorite stars, use known and legitimate services. Yes, sometimes that means paying. Or putting up with a few ads. The illegal alternatives might be riddled with malware or ask for personal info that ends up right in the hands of hackers. 
  • Don’t “log in” or provide other info. If you receive a message, text, or email, or visit a third-party website that asks for info like your credit card, email, home address, or other login info, don’t give it out. Particularly if there’s a promise for “exclusive” content. Such requests are a common tactic for phishing that could lead to identity theft. 
  • Tell what’s real and what’s fake with online protection software. Comprehensive online protection software can keep celebrity scams and other scams like them at bay. First, our new McAfee Scam Protection uses smart AI to detect and warn you of scam texts and links sent your way, so you can tell what’s real and what’s fake. Second, web protection looks out for you while you search—identifying malicious links and even blocking them if you still click one by accident. Together, this is part of the full device, identity, and privacy protection you get with us. 

Whether it’s Ryan, J-Lo, or Bad Bunny – you can stay safe when you search. 

Hackers and scammers love riding the coattails of celebrities. By hijacking big names like Ryan, J-Lo, and Bad Bunny, they dupe plenty of well-meaning fans into downloading malware or handing over their personal info. 

Of course, that’s no reason to stop searching for those celebs. Not at all. Go ahead and enjoy your shows, music, and movies—and all the news, gossip, and tea surrounding them. That’s all part of the fun. Just do it with a sharp eye and the proper protection that has your back. 

Introducing McAfee+

Identity theft protection and privacy for your digital life


#McAfee #Hacker #Celebrity #Hot #List #Hackers #Love #Ryan #Gosling

Most of us believe hacking to be an event that happens to ‘the other person,’ often refusing to accept that it could very much be a reality for us as well. While hacking and social engineering might seem like concepts only prevalent in big-screen thrillers, the truth is they occur more frequently than we’d like to admit. Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.

To offer a real-life perspective, we’ll follow a conversation with an ethical hacker called ‘Oz.’ Ethical hackers, or ‘white hat’ hackers, are those who use their hacking skills to uncover security vulnerabilities and help implement protective measures against other malevolent hackers, known as ‘black hat’ hackers. Despite Oz’s assurance that he belongs to the white hat category, the following discourse will reveal how much information a hacker can come across based solely on your email address.

Dig Deeper: Are All Hackers Bad?

Communication with Oz: An Eye-Opener

Initiating communication with Oz took a toll on my nerves, considering the potential threat to my data privacy. For communication, Oz suggested using an email address, prompting me to create a separate email account solely for our conversations. Once the lines of communication were established, I posed my first question: “Suppose we met at a coffee shop, exchanged pleasantries, and all I left you with was my email address. What kind of information could you gather about me?”

An hour later, Oz responded with my work and home phone numbers, home address, birth date, and year. But the real shocker was a casual remark about my meeting with Lt. Governor Gavin Newsom, followed by a link to a picture I had no memory of sharing publicly. On clicking the link, I received another email from Oz, stating that he had discovered my preferred internet browser, my operating system, and my IP address, essentially knowing my geographical coordinates. At this point, it became crystal clear just how much information a hacker can unearth based on an email address alone. 

The Importance of Online Safety

The experience with Oz was a stark reminder of the importance of online safety. We often let our guards down, readily providing information and clicking on links without giving it a second thought. However, this is exactly the kind of behavior that hackers rely on for their activities. It is crucial to remember that the internet is a public space, and every piece of information we share can potentially be accessed and misused by malicious parties.

In the next sections of this guide, we’ll delve deeper into the mechanisms hackers use to derive information from an email and the measures you can take to secure your digital identity. The aim is to provide you with practical steps to ensure your online safety and maintain your privacy in the digital world.

The Mechanism Behind The Hacks

When you give out your email address to a hacker, they have a significant amount of information at their fingertips. Understanding the mechanisms that hackers employ to exploit your online presence is essential to appreciate the gravity of the online safety challenge. When a hacker gains access to your email address, they effectively open the door to a wealth of information about you. Let’s find out how this works:

  • Reverse Email Lookup: The first step for a hacker after acquiring your email address is often to perform a ‘reverse email lookup.’ This process involves using your email address to trace any associated social media accounts. Many individuals use the same email address for various online platforms, making it relatively easy for hackers to link your digital footprint across different sites. Once they’ve identified your social media profiles, they can glean valuable insights into your personal life, interests, and potentially even more sensitive information you’ve chosen to share publicly on these platforms.
  • Email-Tracking Apps: Hackers can employ sophisticated email-tracking applications or techniques to gather even more information. These tools are designed to surreptitiously monitor your email interactions. 
  • IP Address Tracking: When you open an email, it often contains hidden elements that reveal your IP address. This information can be used to determine your approximate geographical location. Hackers can gain insights into where you are located, potentially compromising your physical safety or facilitating further cyberattacks.
  • Activity Monitoring: Email-tracking apps can notify the hacker when you open the email, providing them with a timestamp of your activity. This information can be used to deduce when you are most active online, which can be exploited for phishing attacks or other malicious activities.
  • Link Interaction Tracking: By embedding tracking pixels or unique links within emails, hackers can discern which links you click on and even monitor your actions on linked web pages. This level of surveillance allows them to understand your interests, preferences, and potential vulnerabilities. In the case of the Oz experiment, clicking on what appeared to be a harmless link had far-reaching consequences, as the hacker was able to monitor subsequent online behavior, leading to the exposure of additional personal information.

Dig Deeper: Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine

Knowing these tactics highlights the importance of practicing caution and diligence when it comes to email and online interactions. Safeguarding your digital identity requires a combination of awareness, security measures, and privacy-conscious practices. It also underscores the need for robust cybersecurity measures on both individual and organizational levels to protect against these types of intrusive and potentially harmful activities.

Protecting Your Digital Identity

Knowing all this, it is imperative to find ways to protect yourself from such intrusions. In addition to knowing what makes hackers tick, there are several insights and practices you should consider to enhance your online security and privacy:

  • Strong Passwords: Create strong, unique passwords for each of your online accounts. Use a combination of letters, numbers, and special characters. Consider using a reputable password manager to generate and store complex passwords securely.
  • Two-Factor or Multi-Factor Authentication (MFA): Enable 2FA or MFA wherever possible. This adds an extra layer of security by requiring you to provide two or more forms of verification, such as a password and a fingerprint or a one-time code sent to your phone.
  • Regular Updates: Keep your operating system, software, and antivirus programs up to date. Cybersecurity vulnerabilities are often patched in these updates, so failing to update can leave you exposed.
  • Phishing Awareness: Educate yourself about phishing scams. Be wary of emails or messages requesting sensitive information, especially if they urge you to act urgently. Double-check the legitimacy of such requests with the supposed sender through a different channel of communication.

Dig Deeper: How to Spot Phishing Lures

  • Secure Wi-Fi: Ensure your home Wi-Fi network is password-protected and uses strong encryption. Avoid using public Wi-Fi for sensitive activities unless you are using a VPN (Virtual Private Network) for added security.
  • Regular Backups: Back up your important data regularly, and store backups offline or in the cloud. In case of a ransomware attack or data loss, you’ll have a safe copy of your information.
  • Social Engineering Awareness: Be cautious about what you share on social media. Cybercriminals often gather information from social profiles to craft convincing spear-phishing attacks. Limit the personal information you make public.
  • Email Verification: Verify email senders, especially when dealing with financial or sensitive matters. Look out for red flags such as misspellings or suspicious email addresses.
  • Safe Browsing Habits: Avoid visiting dubious websites or downloading files from untrusted sources. Use ad-blockers and ensure that your web browser settings are configured for enhanced privacy and security.
  • Security Software: In addition to antivirus software, consider using anti-malware and anti-spyware programs to bolster your defense against various types of threats. McAfee+ and McAfee Total Protection are your best options if you want to have an all-inclusive software security. 
  • Cybersecurity Education: Stay informed about the latest cybersecurity threats and best practices. Cybersecurity is an evolving field, and awareness is a powerful defense.
  • Incident Response Plan: Develop a plan for responding to security incidents. Know how to disconnect from the internet, contact authorities if necessary, and recover from an attack.

McAfee Pro Tip: For your peace of mind, get McAfee+, which comes with a $2M identity theft coverage and setup assistance, to make a sound incident response plan if your email got hacked and sensitive information got compromised. 

Remember that while it’s essential to take these precautions, no system is completely invulnerable. Cyber threats are continually evolving, so staying vigilant and proactive is crucial to maintaining your online security and privacy.

Conclusion

An email address might seem like a tiny part of your life, but in the wrong hands, it can lead to a significant breach of your privacy. It’s important to remember that the safety measures you take or fail to take can have real-world effects. Therefore, it’s crucial to keep a vigilant eye on your digital persona, how you navigate the World Wide Web, and who has access to your information. The key to internet safety lies within our control – cautious, knowledgeable, and proactive steps to protect your digital identity. At McAfee, we’re always here to remind you that the internet is only as secure as you make it.


#Give #Hacker #Email #Address..

Dina postingan ayeuna, urang nutupan sababaraha trik rékayasa sosial anu biasa dianggo ku cybercriminals pikeun nyerang perusahaan. Teras: sababaraha varian scam ngalibetkeun telepon dukungan téknologi palsu sareng email; serangan kompromi email bisnis; nyuhunkeun data ti agénsi penegak hukum palsu…

Halo, kuring ti dukungan téknologi

Skéma rékayasa sosial klasik nyaéta panggero pikeun karyawan perusahaan tina “rojongan téknologi”. Salaku conto, hacker tiasa nelepon dina sabtu minggu sareng nyarios sapertos kieu: “Halo, ieu mangrupikeun jasa dukungan téknis perusahaan anjeun. Kami mendakan kagiatan aneh dina komputer padamelan anjeun. Anjeun kedah langsung sumping ka kantor supados urang tiasa terang naon éta. Tangtosna, henteu seueur jalma anu hoyong angkat ka kantor dina sabtu minggu, janten jalma pangrojong téknologi “horéam” sapuk, “ngan sakali”, pikeun ngarobih protokol perusahaan sareng ngabéréskeun masalah tina jarak jauh. Tapi pikeun ngalakukeun ieu, aranjeunna peryogi kredensial login karyawan. Anjeun tiasa nebak sésana.

Aya variasi kana skéma ieu anu janten nyebar nalika migrasi massal ka padamelan jarak jauh nalika pandémik. Pangrojong téknologi palsu “perhatikeun” kagiatan anu curiga dina laptop korban anu biasa dianggo ti bumi, sareng ngusulkeun ngarengsekeun masalahna nganggo sambungan jarak jauh, ngalangkungan RAT. Sakali deui, hasilna cukup diprediksi.

Konfirmasi, konpirmasi, konpirmasi…

Hayu urang teraskeun topik dukungan téknologi palsu. Téhnik anu pikaresepeun katingal nalika serangan Uber dina usum gugur 2022, nalika peretas umur 18 taun junun kompromi sababaraha sistem perusahaan. Serangan éta dimimitian ku penjahat nampi inpormasi login pribadi kontraktor Uber tina wéb poék. Nanging, pikeun kéngingkeun aksés kana sistem internal perusahaan, masih aya masalah leutik pikeun ngalangkungan auténtikasi multi-faktor…

Sareng ieu dimana rékayasa sosial asup. Ngaliwatan sababaraha usaha login, hacker spams kontraktor hapless kalawan pamundut auténtikasi, lajeng ngirimkeun pesen ka kontraktor on WhatsApp dina kedok rojongan tech kalawan solusi diusulkeun pikeun masalah: pikeun ngeureunkeun aliran spam, ngan mastikeun. Ku kituna, halangan ahir pikeun jaringan Uber geus dihapus.

Ieu CEO di dieu. Abdi peryogi transfer artos menit ieu!

Hayu urang balik deui ka klasik deui: salajengna dina baris nyaéta jenis serangan disebut serangan kompromi email bisnis (BEC). Gagasan di tukangeunana nyaéta pikeun ngamimitian korespondensi sareng karyawan perusahaan, biasana posing salaku manajer atanapi mitra bisnis anu penting. Biasana, tujuan korespondensi nyaéta pikeun korban nransferkeun artos ka rekening anu ditunjuk ku penipu. Samentara éta, skenario serangan bisa rupa-rupa: lamun penjahat leuwih museurkeun infiltrating jaringan internal parusahaan, aranjeunna bisa ngirim korban kantétan jahat nu bener kudu dibuka.

Hiji cara atawa sejen, sadaya serangan BEC revolve sabudeureun kompromi email; tapi éta aspék téknis. Peran anu langkung ageung dimaénkeun ku unsur rékayasa sosial. Sanaos seueur surelek curang anu nargétkeun pangguna biasa sanés ngan ukur pikagumbiraeun, operasi BEC ngalibatkeun jalma-jalma anu berpengalaman dina korporasi ageung anu tiasa nyerat email bisnis anu masuk akal sareng ngabujuk panampi pikeun ngalakukeun naon anu dipikahoyong ku penjahat.

Dimana urang ninggalkeun?

Perlu dicatet sacara misah téknik serangan BEC anu parantos janten populer di kalangan penjahat cyber dina taun-taun ayeuna. Dipikawanoh salaku pangbajak paguneman, skéma ieu ngamungkinkeun para panyerang ngalebetkeun diri kana korespondensi bisnis anu aya ku cara niru salah sahiji pamilon. Sacara umum, hacks akun atanapi trik téknis henteu dianggo pikeun nyamur pangirim – sadayana anu dipikabutuh ku panyerang nyaéta kéngingkeun email nyata sareng nyiptakeun domain anu mirip. Ku cara ieu aranjeunna sacara otomatis kéngingkeun kapercayaan sadaya pamilon anu sanés, ngamungkinkeun aranjeunna sacara lembut ngarahkeun paguneman ka arah anu dipikahoyong. Pikeun ngalaksanakeun jinis serangan ieu, penjahat cyber sering ngagaleuh database korespondensi email anu dipaling atanapi bocor dina wéb poék.

Skenario serangan bisa rupa-rupa. Pamakéan phishing atawa malware teu maréntah kaluar. Tapi nurutkeun skéma klasik, hacker biasana nyoba ngabajak paguneman langsung patali jeung duit, preferably jumlah badag, asupkeun rinci bank maranéhanana dina momen katuhu, lajeng nyandak loot ka pulo tropis.

Conto pangbajak paguneman nyaéta anu kajantenan nalika transfer pamaén bal Leandro Paredes. Para penjahat cyber snuck kana bursa email handapeun kedok wawakil klub debut Paredes ‘, Boca Juniors, anu ngabogaan hak pikeun fraksi tina fee mindahkeun – € 520.000, nu fraudsters kantong sorangan.

Serahkeun data anjeun, ieu pulisi

Tren anu anyar, katingalina muncul dina taun 2022, nyaéta pikeun peretas ngadamel pamundut data “resmi” nalika ngumpulkeun inpormasi pikeun nyiapkeun serangan ka pangguna jasa online. Paménta sapertos kitu parantos ditampi ku ISP, jaringan sosial sareng perusahaan téknologi basis AS tina akun email anu diretas milik agénsi penegak hukum.

Kontéks saeutik bakal mangpaat di dieu. Dina kaayaan normal, meunangkeun data ti panyadia ladenan di Amérika Serikat merlukeun surat jaminan ditandatanganan ku hakim. Nanging, dina kaayaan dimana kahirupan atanapi kaséhatan manusa aya résiko, Permintaan Data Darurat (EDR) tiasa dikaluarkeun.

Sanajan kitu, bari dina kasus hiji pamundut data normal aya prosedur verifikasi basajan tur gampang-to-ngarti, aya ayeuna euweuh hal saperti keur EDR. Ku alatan éta, éta leuwih gampang yén pamundut misalna bakal dikabulkeun lamun sigana lumrah tur sigana asalna ti agénsi penegak hukum. Ku cara kieu, hacker tiasa nampi inpormasi ngeunaan korban tina sumber anu dipercaya sareng dianggo pikeun serangan salajengna.

Kumaha carana ngajaga ngalawan serangan rékayasa sosial

Sasaran sadaya metode serangan di luhur sanés sapotong hardware anu teu aya jiwa, tapi manusa. Janten, pikeun nguatkeun pertahanan perusahaan ngalawan serangan rékayasa sosial, fokusna kedah ka jalma. Ieu hartosna ngajar karyawan dasar-dasar cybersecurity pikeun ningkatkeun kasadaran kaamananna, sareng ngajelaskeun kumaha carana ngalawan sababaraha jinis serangan. Cara anu pangsaéna pikeun ngalakukeun ieu nyaéta ngalangkungan solusi pelatihan interaktif kami Kaspersky Automated Security Awareness Platform.


#Trik #rékayasa #sosial #umum #Blog #resmi #Kaspersky

Kumaha hacker hack telepon sélulér? Sababaraha cara. Sapertos aya cara pikeun nyegah éta kajadian ka anjeun.

Masalahna nyaéta telepon urang sapertos peti harta karun. Éta dieusian ku seueur data pribadi, sareng kami nganggo éta pikeun balanja, bank, sareng nanganan masalah pribadi sareng kauangan sanés-sadayana nilai luhur pikeun maling identitas.

Nanging, anjeun tiasa ngajagi diri sareng telepon anjeun ku terang naon anu kedah diperhatoskeun sareng ku ngalakukeun sababaraha léngkah saderhana. Hayu urang ngarecahna ku ningali sababaraha serangan anu langkung umum.

Jenis Hacking sareng Serangan Smartphone

software Hacking

Naha peretas nyolong kana telepon anjeun ku cara ngaksés telepon anjeun sacara fisik atanapi ku cara nipu anjeun pikeun masangna liwat aplikasi palsusitus web cryptic, atawa serangan phishing, hacking software bisa nyieun masalah pikeun anjeun ku sababaraha cara:

  • Log konci: Dina leungeun hacker, keylogging jalan kawas stalker ku snooping pikeun informasi bari Anjeun ngetik, ketok, komo ngobrol dina telepon.
  • Trojans: Trojan mangrupikeun jinis malware anu tiasa nyamar diri dina telepon anjeun pikeun nimba data penting, sapertos detil akun kartu kiridit atanapi inpormasi pribadi.

Sababaraha tanda kamungkinan hacking software dina telepon anjeun diantarana:

  • batré draining gancang teuing.
  • Télépon anjeun ngajalankeun rada sluggish atanapi panas.
  • Aplikasi eureun teu disangka-sangka atanapi telepon anjeun pareum teras hurungkeun deui.
  • Anjeun ningali data anu teu dipikanyaho, téks, atanapi biaya anu sanés dina tagihan anjeun.

Gemblengna, parangkat lunak hacking tiasa meakeun sumber daya sistem, konflik sareng aplikasi anu sanés, sareng nganggo data atanapi sambungan internét anjeun pikeun ngirimkeun inpormasi pribadi anjeun ka tangan peretas-sadayana tiasa nyababkeun sababaraha gejala anu didaptarkeun di luhur.

Serangan phishing

Ieu mangrupikeun bentuk serangan klasik. Nyatana, peretas parantos nempatkeun éta dina komputer urang mangtaun-taun ayeuna ogé. Phishing nyaéta tempat peretas nyamar perusahaan atanapi individu anu dipercaya pikeun kéngingkeun aksés kana akun anjeun atanapi inpormasi pribadi atanapi duanana. Sareng serangan ieu nyandak seueur bentuk, sapertos email, téks, talatah instan sareng saterasna, sababaraha di antarana katingali sah. Biasana pikeun aranjeunna nyaéta tautan ka situs palsu anu nyobian nipu anjeun pikeun nyerahkeun inpormasi éta atanapi anu masang malware pikeun ngadat alat anjeun atanapi ogé maok inpormasi. Diajar kumaha ngakuan serangan phishing mangrupa salah sahiji cara pikeun ngajaga diri tina jadi korban salah sahijina.

Bluetooth Hacking

Peretas profésional tiasa nganggo téknologi khusus anu milarian alat sélulér anu rentan sareng sambungan Bluetooth kabuka. Peretas tiasa ngalakukeun serangan ieu nalika dina jangkauan telepon anjeun, jarakna dugi ka 30 kaki, biasana di daérah anu pendudukna. Nalika peretas ngadamel sambungan Bluetooth ka telepon anjeun, aranjeunna tiasa ngaksés data sareng inpormasi anjeun, tapi éta kedah diunduh nalika teleponna aya dina jangkauan. Sakumaha anjeun tiasa ngumpul, ieu mangrupikeun serangan anu langkung canggih kalayan usaha sareng téknologi anu aub.

bursa kartu SIM

Dina Agustus 2019, CEO Twitter ngagaduhan kartu SIM na diretas ku scam swap kartu SIM. Swap kartu SIM lumangsung nalika hiji hacker ngontak panyadia telepon anjeun, pretends jadi anjeun, lajeng ménta kartu SIM ngagantian. Sakali panyadia ngirimkeun SIM anyar ka hacker, kartu SIM heubeul bakal dinonaktipkeun, sarta nomer telepon anjeun bakal éféktif dipaling. Ieu ngandung harti hacker geus nyokot kadali telepon, pesen jeung saterusna. Metoda Hacking Ieu merlukeun tugas sahingga bisa hirup kalawan hariwang tina impersonating batur, tapi evidently, éta kajadian ka CEO hiji parusahaan téhnologi utama. Ngajagi inpormasi pribadi sareng idéntitas anjeun sacara online tiasa ngabantosan nyegah peretas nyamar anjeun pikeun ngalakukeun ieu sareng kajahatan anu sanés.

Sapuluh tip pikeun nyegah telepon anjeun diretas

Sanaos aya sababaraha cara peretas tiasa asup kana telepon anjeun sareng maok inpormasi pribadi sareng penting, ieu sababaraha tip pikeun nyegah éta kajadian:

  1. Paké software kaamanan komprehensif dina telepon Anjeun. Salila sababaraha taun, urang biasa ngagunakeun ieu dina komputer sareng laptop urang. telepon urang? Teu loba teuing. Pasang parangkat lunak kaamanan dina smartphone anjeun mere Anjeun baris kahiji pertahanan ngalawan serangan, ditambah sababaraha fitur kaamanan tambahan disebutkeun di handap.
  2. Apdet telepon anjeun sareng aplikasi. Salian ti masang parangkat lunak kaamanan, ngajaga apdet mangrupikeun cara konci pikeun ngajaga anjeun sareng telepon anjeun aman. Pembaruan tiasa ngalereskeun kerentanan anu diandelkeun ku cybercriminals pikeun ngalaksanakeun serangan dumasar kana malware. Tambih Deui, aranjeunna tiasa ngabantosan telepon sareng aplikasi anjeun tetep lancar bari ngenalkeun fitur anyar anu mangpaat.
  3. Tetep langkung aman dina perjalanan nganggo VPN. Hiji cara penjahat bisa hack telepon anjeun ngaliwatan Wi-Fi umum, kayaning di bandara, hotél sarta malah perpustakaan. Jaringan ieu umum, hartosna kagiatan anjeun kakeunaan ka sadayana dina jaringan – perbankan anjeun, panggunaan kecap akses anjeun, sadayana. Salah sahiji cara pikeun ngajantenkeun jaringan umum janten pribadi nyaéta nganggo VPNanu tiasa ngajaga anjeun sareng sadaya anu anjeun laksanakeun tina jalma sanés dina éta hotspot Wi-Fi.
  4. Paké manajer sandi. Kecap akses anu kuat sareng unik nawiskeun garis pertahanan utama anu sanés. Tapi kalayan sagala akun anu urang gaduh, juggling puluhan kecap akses anu kuat sareng unik tiasa janten tugas – ku kituna godaan pikeun ngagunakeun (sareng nganggo deui) kecap konci anu langkung sederhana. Peretas resep ieu kusabab hiji kecap konci tiasa janten konci pikeun sababaraha akun. Sabalikna, cobian manajer sandi anu tiasa ngahasilkeun kecap konci éta pikeun anjeun sareng simpen ogé aman. Parangkat lunak kaamanan komprehensif bakal kalebet hiji.
  5. Hindarkeun stasiun ngecas umum. Ngecas di stasion umum sigana saderhana pisan sareng aman. Sanajan kitu, sababaraha hacker geus dipikawanoh pikeun “juice jack” ku cara masang malware kana stasiun ngecas. Lamun anjeun “buff”, aranjeunna “buff” kecap akses anjeun sarta inpo pribadi. Janten naon anu kedah dilakukeun ngeunaan kakuatan di jalan? Anjeun tiasa ningali pak kakuatan portabel anu anjeun tiasa tos ngeusi batre atanapi ngajalankeun batré AA. Aranjeunna geulis mirah tur gampang pikeun ngalacak.
  6. Nengetan telepon anjeun. Nyegah maling saleresna telepon anjeun ogé penting, sabab sababaraha hacks kajantenan kusabab teleponna ragrag kana panangan anu salah. Ieu mangrupikeun pasualan anu saé pikeun sandi atanapi PIN anu ngajagi telepon anjeun, ogé ngaktifkeun tracking alat supados anjeun tiasa mendakan telepon anjeun atanapi bahkan ngahapus jarak jauh upami diperyogikeun. Apple nyadiakeun pamaké ios kalawan pituduh hambalan-demi-hambalan pikeun jarak jauh ngusap alatJeungGoogle ogé nawiskeun pituduh pikeun pangguna Android.
  7. Énkripsi telepon anjeun. Énkripsi telepon anjeun tiasa nyalametkeun anjeun tina hack sareng tiasa ngajagi telepon anjeun, pesen sareng inpormasi penting. Pikeun mariksa naha iPhone énkripsi anjeun tiasa asup kana Touch ID & Kodeu aksés, gulung ka handap, sareng tingali upami panyalindungan data diaktipkeun (biasana otomatis upami anjeun gaduh kodeu aksés diaktipkeun). Pamaké Android gaduh énkripsi otomatis gumantung kana jinis telepon.
  8. Konci kartu SIM anjeun. Sapertos anjeun tiasa ngonci telepon anjeun, anjeun tiasa ngonci kartu SIM anu dianggo pikeun ngaidentipikasi anjeun, anu gaduh, sareng pikeun nyambungkeun anjeun ka jaringan seluler. Ku ngonci éta, jaga telepon anjeun teu dipaké dina jaringan naon waé salian ti anjeun sorangan. Upami Anjeun gaduh iPhone, Anjeun bisa ngonci eta ku nuturkeun ieu parentah basajan. Pikeun platform anu sanés, tingali halaman wéb produsén.
  9. Pareuman Wi-Fi sareng Bluetooth anjeun nalika henteu dianggo. Mikir eta salaku nutup panto muka. Aya sababaraha serangan anu tiasa dilakukeun ku peretas khusus sareng dilengkepan dina alat anu Wi-Fi sareng Bluetooth dibuka sareng tiasa dipanggihan. Nya kitu, sanajan teu hacking, sababaraha pangecér bakal ngalacak lokasi anjeun di toko nganggo téknologi Bluetooth pikeun tujuan pamasaran— janten mareuman éta ogé tiasa ngajagi privasi anjeun dina sababaraha kaayaan. Anjeun tiasa sacara gampil mareuman duanana tina setélan anjeun sareng seueur telepon anu ngamungkinkeun anjeun ngalakukeun éta tina ménu turun-handap dina layar utama ogé.
  10. Hindarkeun toko aplikasi pihak katilu. Google Play sareng Apple App Store gaduh léngkah pikeun marios sareng mariksa aplikasi pikeun ngabantosan kaamanan sareng kasalametanana. Situs pihak katilu henteu tiasa ngalaksanakeun prosés éta. Nyatana, sababaraha situs pihak katilu tiasa ngahaja janten host aplikasi jahat salaku bagian tina scam anu langkung ageung. Leres, penjahat cyber parantos mendakan cara pikeun ngahindarkeun prosés ulasan Google sareng Apple, tapi kasempetan pikeun ngaunduh aplikasi anu aman ti aranjeunna langkung ageung tibatan dimana waé. Salaku tambahan, Google sareng Apple gancang-gancang ngahapus aplikasi jahat nalika kapendak, ngajantenkeun tokona langkung aman.

Coba McAfee Mobile Security

Ngarasakeun alat sélulér anu langkung aman sareng panyalindungan sadaya-dina-hiji


#Kumaha #Hacker #Hack #Telepon #sareng #Kumaha #Nyegahna

Episode 291 tina The Transatlantik Cable Podcast dimimitian ku warta sabudeureun kaputusan panganyarna OpenAI pikeun ngurangan jumlah informasi eta babagi ngeunaan kumaha ChatGPT dilatih, ngabalukarkeun sababaraha hariwang yén éta henteu deui sakumaha kabuka sakumaha eta dirancang pikeun jadi.

Ti dinya diskusi ngalih ka carita panganyarna ngeunaan DEA (Administrasi Penegakan Narkoba) di Amérika sarta hacker anu rék ngamangpaatkeun parabot internal DEA urang. Sanggeus éta, warta ngeunaan ATM crypto hacked jeung carita anyar ti Securelist ngeunaan grup APT karek kapanggih, CommonMagic.

Épisode ieu ogé kalebet diskusi sareng Susi O’Neil of Kaspersky’s Brand Activation Studio pikeun ngobrol ngeunaan séri mini audio anu bakal datang anu judulna “Insight Story”. Séri ieu tujuanana pikeun ngabantosan pamimpin bisnis langkung ngartos téknologi digital sapertos AI, Metaverse, sareng seueur deui. Pikeun ngadangukeun episode hiji, anjeun tiasa ngadangukeun di dieu.

Upami anjeun resep kana naon anu anjeun déngé, punten pertimbangkeun ngalanggan.


#Transatlantic #Cable #Podcast #episode

Smartphone, tablet komo mobil jeung microprocessors Samsung Exynos aya dina resiko keur hacked jarak jauh. Pemburu bug di Google Project Zero nyarios yén anjeun ngan ukur peryogi nomer telepon korban.

Ieu disababkeun ku ayana 18 kerentanan dina prosesor radio baseband Exynos anu seueur dianggo dina Google, Vivo, Samsung, sareng seueur smartphone anu sanés. Opat di antarana kritis sareng ngamungkinkeun panyerang ngaéksekusi kode jarak jauh dina alat korban tanpa tindakan naon waé. Pikeun sésana, operator sélulér sorangan kedah ngalakukeun tindakan jahat, atanapi peretas peryogi aksés langsung kana alat éta.
Kerentanan ieu ngan ukur tiasa dibenerkeun ku pembaruan firmware – henteu acan dileupaskeun. Tapi samentawis éta, anjeun kedah ngajaga diri sareng telepon anjeun aman. Kabeneran, aya ukuran pelindung samentawis anu anjeun tiasa laksanakeun.

Naon BRP?

Prosesor radio baseband (BRP) mangrupikeun sapotong smartphone, tablet atanapi téknologi pinter sanés anu ngatur komunikasi sélulér nirkabel dina alat generasi kadua dugi ka kalima:

  • 2G – GSM, GPRS, EDGE;
  • 3G – CDMA, W-CDMA;
  • 4G – LTE;
  • 5G – 5G NR.

BRP biasana henteu kalebet fungsionalitas Wi-Fi atanapi Bluetooth.

Sakali chip dedicated, pikeun leuwih dasawarsa ayeuna geus ilahar terpadu jeung CPU. Nanging, BRP gaduh mémori sorangan sareng sistem paréntah anu rada rumit – kanyataanna, éta mangrupikeun prosésor khusus anu aktip tukeur data sareng CPU sareng mémori utama.

Kode laksana BRP ditulis kana eta ku nu ngajual, tur éféktif inaccessible mun aktip smartphone pikeun analisis atawa modifikasi. Pikeun CPU, BRP mangrupakeun kotak hideung, tapi boga aksés éksténsif kana mémori utama alat dimana data pamaké disimpen.

Aya seueur perusahaan anu ngahasilkeun CPU sareng BRP. Panangan Samsung anu ngadamel chip mémori sareng mikroéléktronik sanés disebut Samsung Semiconductor. Kulawarga chip andalannya, Exynos, dianggo dina seueur (sanaos henteu sadayana) smartphone sareng tablet Samsung.

Kerentanan dina Exynos

Panaliti Project Zero mendakan yén Exynos BRP salah ngolah rupa-rupa sinyal jasa anu ditampi ku pangguna tina jaringan sélulér. Sanggeus narima pesen erroneous, chip bisa freeze atawa, komo parah, ngajalankeun kode dimuat via pesen jahat. Dalapan belas bug anu aya hubunganana sareng salah urus sinyal jasa kapanggih, sanaos henteu sadayana dijelaskeun sacara rinci pikeun ngahalangan peretas.

Kusabab BRP ngatur sadaya komunikasi sareng jaringan sélulér, kode jahat tiasa dianggo pikeun rupa-rupa tujuan spionase: ti ngalacak geolokasi korban dugi ka ngadangukeun telepon atanapi maok data tina mémori smartphone. Dina waktos anu sami, kusabab éta kotak hideung, BRP ampir teu mungkin pikeun didiagnosis atanapi disinféktan, kecuali ku reflashing.

Chip anu kapangaruhan ku kerentanan nyaéta Exynos 850, 980, 1080, 1280, 2200, Exynos Modem 5123, Exynos Modem 5300, sareng Exynos Auto T5123.

Hanjakalna, padagang henteu salawasna ngungkabkeun detil ngeunaan chip mana anu dipasang dina alat mana. Ngagunakeun data sadia masarakat awam, kasebut nyaéta dimungkinkeun pikeun compile daptar lengkep alat nu kamungkinan ngagunakeun chipset ieu. Ieu ngawengku model handap:

  • Samsung Galaxy A04, A12, A13, A21s, A33, A53, A71, M12, M13, M33, S22;
  • Vivo S6, S15, S16, X30, X60, X70;
  • Google Pixel 6, 6a, 6 Pro, 7, 7 Pro;
  • Sakur kendaraan nganggo chipset Exynos Auto T5123.

Kumaha tetep aman

Cara utama pikeun ngajaga diri anjeun nyaéta ngapdet firmware BRP, anu biasana lumangsung salami apdet firmware pinuh dina smartphone. Salaku conto, Google parantos ngaluarkeun perbaikan bug pikeun Pixel 7 sareng 7 Pro salaku bagian tina pembaruan Maret na. Hanjakalna, Pixel 6 sareng 6 Pro masih rentan dina waktos ngeposkeun. Kami ngarékoméndasikeun nu boga Pixel masang firmware panganyarna ngaliwatan setélan smartphone maranéhanana tanpa reureuh.

Samsung ogé parantos ngaluarkeun pembaruan kode pikeun Exynos BRP, tapi éta henteu acan ngalereskeun sadaya kerentanan. Naon deui, anu ngical paralatan khusus anu ngandung chip ieu kedah mandiri ngarangkep perbaikan ieu kana firmware énggalna. Dina waktos ngeposkeun, firmware pikeun alat anu rentan sanés teu acan sayogi. Éta henteu kedah nyarios yén anjeun kedah pasang apdet ieu pas muncul.

Dugi ka waktos éta, panalungtik Project Zero nyarankeun nganonaktipkeun Voice over LTE (VoLTE) sareng sauran Wi-Fi dina smartphone nganggo Exynos BRP. Ieu tiasa ngirangan kualitas sauran sora sareng ngalambatkeun sambungan sauran, tapi moal aya pangaruhna kana laju sareng kualitas aksés internét. Dugi ka sékrési firmware anyar, éta bakal ngajagaan alat tina kamungkinan hacks, sanaos sababaraha fungsi anu leungit.


#Hacking #jauh #clickless #pikeun #Samsung #Google #jeung #Vivo #smartphone

For part big the time we spend in use connected computer _ to internet network, we start hear that we need a antivirus system for give security in use the internet. However no everyone has _ basics good understanding _ about antivirus definition, size from internet security , and not can separate link dangerous from safe link , then _ from that , a keeper who can work silently behind _ screen your computer really needed .

Very important even for people who say in follow guide up-to-date internet security and not haphazard in clicking link or visible attachments suspicious or for no visiting sites that are not Trusted in provide security. Even though you think already surf the internet online safe, don’t think that antivirus devices just sit quietly in the back screen and not To do nothing  Understanding Antivirus has more meaning large from just protection base from download device infected software.

There’s so many understanding of antivirus on the internet and that all depends from corner look antivirus provider regarding security cyber. each company own approach each for its customers  and as long as approach the work with ok , we must thank you love on the services they provide . No problem if you connected to the virtual world through computer personal, MAC, tablet or phone smart , the cheaters are getting intelligent with create various Street new kumpulan slot gacor every day for can hack system your digital . So what the hell device antivirus software and how does antivirus provide security in internet?

software antivirus

How Antivirus Works

When viruses and computer programs first dangerous appear, they still in very shape base. Temporary that, antivirus security is still very base. The first antivirus tool available just no more from just how to scanner work look for pattern from code and match to existing threats. Even when that no required great effort in execute a malicious file from computer, however from understanding of current antivirus this needed business extra for the same thing .

With appearance various new malware variant, for protect personal, business data or system computer government there is need big related technique level continued . Technique level carry on the it means that in tune with good old scan there is addition for could predict, find, delete and protect system from malware. let ‘s go see how understanding of antivirus can explained from activity.

  • On-Access Scan

As already _ explained slightly above, the antivirus system can work silently on the screen behind your device . Anytime _ you open a file, antivirus automatically fast will scan the file look for possibility the threat in it. _ This called with on-access scan or scan while the file is accessible, protection time real , and scan background back . Action name this fully depend from the product you use, but objective main still permanent same. When you open a file, the file possible seen will direct open (depending on ability your device) but actually antivirus system will scan the file more first , with fast look for malware threat that is in the file . If no find similarity with viruses, computer programs dangerous, or shape Other known infections , antivirus system later allow user for could access the file .

·       Heuristics

Function others running side by side with on-access scanning is heuristics . Function this is nice addition for understanding of antivirus and can looking for a possible threatening virus no is known moment it . Function heuristic this try for identify new malware or already modified, which can just seen no dangerous in sight first . Heuristics also monitor activity from various files, and if heuristic see if there is some files try for operate something code for another file system , write the code back , or copy code , heuristic will by direct give sign for the file as malware and will stop files from system operation . Although heuristic impressed as great antivirus features for run on the computer, function this no can set as security level highest , conversely , heuristicK will tagged every new file in system as a threat .

·       Scan System Complete 

Temporary you own on-access and heuristic scanning, scanning system complete possible seen as something function that can ignored . However objective from function this rather a little different with previous function already mentioned above. How to scan system complete this add understanding of antivirus, which is used for check whole system computer for see is no there are malicious files left before install antivirus device. With use kumpulan judi slot scan system by complete once in a while you can ensure that you use update newest inside antivirus system for check device your computer , and updates latest can also find a number of threats that have is inside system computer and not yet detected until you use scan this . This is a good tip for computer for scan system by full once in a while, though you feel that your computer walk with safe and smooth