Search This Blog

Preserving Email Privacy: How to Block Hidden Read Receipts and Enhance Security


Disabling Read Receipts: Taking Control of Your Email Privacy

In today's fast-paced tech-dominated world, the pressure to respond to emails and messages immediately can be overwhelming. But what if you want to reclaim your time and manage it on your terms? One way to do that is by ensuring your emails are more private, and a key step in achieving this is to disable read receipts.

Tech expert Jon Morgan, CEO of Ventures Smarter, explains that blocking hidden read receipts can be a crucial step in preserving your email activity's privacy and preventing others from knowing whether you've read their messages or not. He provides a simple guide to help you achieve this:

The first step is to disable read receipts in your email client or service. While the process may vary depending on the email platform you use, you can usually find this option in the settings or preferences section. Look for a setting related to read receipts or message tracking, and disable it. By doing so, your email client won't send read receipts to the sender, allowing you to maintain your privacy and respond at your own pace.

Reviewing Privacy Settings: Enhancing Email Security and Anonymity

Disabling read receipts is just the beginning. To bolster your email privacy, it's important to review the privacy settings of your email account. Many email services offer various privacy options that can further protect your communication from prying eyes. Jon Morgan advises paying attention to features such as blocking external images or preventing remote content from loading automatically.

By enabling these settings, you can prevent senders from receiving notifications when you open their emails or download images. This step adds an extra layer of confidentiality to your communication and reduces the risk of unintentionally revealing your activity to the sender. Take the time to explore your email service's privacy options and customize them according to your needs.

Using Email Clients with Advanced Privacy Features: Safeguarding Your Communication

In your quest for enhanced email privacy, it's worth considering using an email client or application that prioritizes privacy and security. Certain email clients offer advanced features like encrypted messaging, blocking read receipts, and additional privacy controls. Making the switch to such a client can significantly enhance your email security and provide you with more control over your personal information.

Before choosing an email client, Jon Morgan recommends conducting thorough research to find one that aligns with your specific privacy requirements and preferences. Look for a client that not only offers robust privacy features but also aligns with your desired user experience. By selecting a privacy-focused email client, you can take another step towards safeguarding your communication.

Offline Reading and Other Privacy Measures: Ensuring Complete Email Confidentiality

If you truly want to ensure complete privacy in your email communication, Jon Morgan suggests reading your emails offline, without an internet connection. By disconnecting from the internet while reading your messages, you eliminate the risk of triggering read receipts or tracking requests that could be sent back to the sender. This step guarantees that your email activity remains entirely private and allows you to read and respond to messages on your terms.

Disabling remote content loading in your email client's settings adds an extra layer of protection. By default, many email clients automatically load remote content, such as images, when you open an email. However, this feature can be exploited to track whether you've read the message. To counter this, disable remote content loading in your email client. This ensures that the sender won't receive any notifications when you open their email or load external images, further preserving your privacy.

For an added level of security, Jon Morgan suggests considering the use of a virtual private network (VPN). A VPN encrypts your internet connection, making it difficult for anyone to track your online activities, including your email interactions. By utilizing a VPN, you can protect your privacy and prevent tracking attempts, thus safeguarding your email communication.

Implementing these privacy measures gives you back control over your time and allows you to manage your emails without feeling overwhelmed or rushed. By disabling read receipts, adjusting privacy settings, using email clients with advanced features, and considering offline reading and VPN usage, you can enjoy a heightened level of email security and privacy while navigating the digital landscape.

New Information-Stealing Malware Campaign Targets Online Sellers

Online sellers have become the latest targets of a new information-stealing malware campaign that aims to compromise their sensitive data. Security researchers have discovered a strain of malware called Vidar being deployed in this campaign, with attackers using various methods to distribute the malicious software.

Vidar is a well-known information-stealing malware that has been active since at least 2018. It is designed to collect sensitive data from infected systems, including login credentials, financial information, and other personal details. The malware operates by monitoring the victim's activities and capturing keystrokes, taking screenshots, and even recording audio if necessary.

In this recent campaign, attackers have specifically focused on online sellers, recognizing the potential financial gain from stealing their login credentials and gaining unauthorized access to their e-commerce platforms. By compromising online seller accounts, attackers can manipulate product listings, redirect payments, and exploit customer data for fraudulent purposes.

The distribution methods employed in this campaign are diverse. They range from phishing emails containing malicious attachments or links to infected websites that host exploit kits. Once the malware is successfully installed on the victim's system, it remains silent and works stealthily in the background, gathering valuable information without the user's knowledge.

To protect against this type of threat, online sellers and individuals should implement robust cybersecurity practices. These include regularly updating operating systems and software to patch known vulnerabilities, employing strong and unique passwords for all online accounts, and being cautious when opening email attachments or clicking on suspicious links.

Furthermore, it is crucial to educate employees and individuals about the risks of phishing attacks and social engineering techniques commonly used by cybercriminals. By raising awareness and promoting a security-conscious mindset, organizations can significantly reduce the likelihood of falling victim to such malware campaigns.

Security solutions, including robust antivirus and anti-malware software, should be installed and kept up to date to detect and mitigate any potential threats. Regular system scans should also be conducted to identify and remove any malicious files or software.

The discovery of this new information-stealing malware campaign serves as a reminder that cybercriminals are continuously evolving their tactics and targeting specific industries for financial gain. Online sellers, in particular, should remain vigilant and implement strong security measures to safeguard their valuable data and protect their customers from fraud and identity theft.


Casepoint Investigates Alleged Breach After Hackers Claimed Theft of Government Data


US-based legal technology platform, Casepoint has apparently investigated a potential cybersecurity incident following claims of threat actors, who have hacked the platform claiming terabytes of sensitive data.

Casepoint offers legal advice for governmental organizations, businesses, and law firms in litigation, investigations, and compliance. The company has a number of well-known clients, including the U.S. Department of Defense (DoD), Marriott Hotels, the Securities and Exchange Commission (SEC), the U.S. Courts, and the Mayo Clinic.

Vishal Rajpara, the CTO and co-founder of Casepoint, released a statement in which he declined to confirm but otherwise did not seem to refute rumors that the ALPHV ransomware gang was responsible for the attack. BlackCat, the Russia-based ransomware gang claims to have stolen two terabytes of confidential data from Casepoint, which included data from the US government and “many other things you have tried so hard to keep,” the gang stated.

Some of the data stolen, according to TechCrunch, included private information from a Georgia-based hospital, a legal document, a state-sponsored ID and an internal document apparently issued by the FBI. However, the FBI is yet to confirm the allegations made by TechCrunch.

Following Casepoint’s acknowledgment of the investigation, ALPHV updated on the issue in a statement published on May 31. The firm also shared what seems to be the login details for the company’s software.

Rajpara published a statement on the issue, saying “Casepoint remains fully operational and have experienced no disruption to our services[…]the third-party forensic firm that we have engaged is currently running scans and deploying advanced endpoint detection monitoring tools and will be looking for signs of suspicious activity.” “We are early on in our investigation and are committed to keeping our clients informed as we learn more.”

However, Rajpara declined to comment on whether the business has technological resources to identify the data that was accessed or exfiltrated or whether it has been contacted by the ALPV ransomware organization with any communications, such as a ransom demand. 

ALPHV Gang

The ALPHV gang has previously claimed to have attacked NextGen Healthcare, a U.S.-based maker of electronic health record software, and Ring, a video surveillance firm owned by Amazon. Despite the hackers' denials that they were connected to the gang, data obtained from Western Digital was also hosted on ALPHV's leak site.

Some other known victims of the ALPHV gang include Bandai Namco, Swissport, and the Munster Technological University in Ireland.  

UK Mental Health Charities Imparted Facebook Private Data for Targeted Ads

 

Some of the largest mental health support organisations in Britain gave Facebook information about private web browsing for its targeted advertising system. 

The data was delivered via a monitoring mechanism installed in the charities’ websites and includes details of URLs a user visited and buttons they clicked across content linked to depression, self-harm and eating disorders. 

Additionally, it included information about the times visitors saw pages to access online chat tools and when they clicked links that said "I need help" in order to request assistance. Some of the pages that caused data sharing with Facebook were particularly targeted towards youngsters, such as a page for 11 to 18-year-olds that provided guidance on how to deal with suicidal thoughts. 

Details of conversations between charities and users or messages sent via chat tools were not included in the data sent to Facebook during the Observer's analysis. All of the charities emphasised that they took service user privacy very seriously and that such messages were confidential.

However, it frequently involved browsing that most users would consider private, such as information about button clicks and page views on websites for the eating disorder charity Beat as well as the mental health charities Mind, Shout, and Rethink Mental Illness. 

The data was matched to IP addresses, which are typically used to identify a specific person or home, and, in many cases, specifics of their Facebook account ID. The tracking tool, known as Meta Pixel, has now been taken down from the majority of charity' websites. 

The information was discovered following an Observer investigation last week that exposed 20 NHS England trusts sharing data with Facebook for targeted advertising. This data included browsing activity across hundreds of websites related to particular medical conditions, appointments, medications, and referral requests.

Facebook says it makes explicit that businesses should not use Meta Pixel to gather or distribute sensitive data, such as information that could expose details about a person’s health or data belonging to children. It also says it has filters to weed out sensitive data it receives by mistake. However, prior research has indicated that they don't always work, and Facebook itself acknowledges that the system "doesn't catch everything".

The social media giant has been accused of doing too little to oversee what information it is being supplied, and faced questions over why it would allow some entities – such as hospitals or mental health organisations – to send it data in the first place.

Breaching Nature's Firewall: The Convergence of the Climate Change Crisis and Cyberattacks

 



Corporate strategies are being transformed by ESG considerations – which are now becoming a permanent feature of the economic services sector as they transform corporate strategies. A change in ESG practices cannot be brought about by internal or external pressures if stakeholders do not perceive that the changes can be financially beneficial. The evidence for this is unrefutable; the financial performance of companies that introduce sustainable principles is always strong over the long run if they implement sustainable practices. In addition to reducing costs, increasing productivity, and increasing demand, ESG and financial performance have some links. 

Climate change and cybercrime have similarities worth mentioning. Both groups pose increasing threats. These kinds of risks threaten the safety and security of our basic resources, such as water, energy, and infrastructure. 

It is possible that cyber-attacks and weather events, such as hurricanes, could have serious real-world consequences. ESG disclosure is becoming one of the most important factors for companies operating within the financial services industry. As the public's, investors, and the state's concerns grow, this is becoming an increasingly important issue. 

ESG-oriented regulations have increased considerably in the UK and globally as a result of the increasing number of regulations focusing on ESG. 

A company with ample resources and the ability to respond quickly to these unexpected challenges is more likely to be able to overcome them without being exposed to security risks. 

There will be an increase in cyber threats to their users as a result of this. Despite this, many companies need more resources and capacity to react appropriately and effectively to devastating weather events. This leaves weak spots in their defense system that can be exploited by hackers in case of disasters. 

There is an apparent link between these two threats – and cyber-security – that have enveloped our planet for years now. 

As a way of highlighting the connection between climate change and cybersecurity, Chloe Messdaghi, CEO and Founder, of Global Secure Partners, stated that climate change and cybersecurity are related to the same thing, but that connection is complex and multifaceted. Climate change is leading to greater cyber-threat opportunities. 

Societies rely on technology to combat and mitigate climate change. Technology plays a crucial role in improving resource management and sustainability efforts, from renewable energy systems to smart grids to connected devices. Although increasing dependence on technology is a good thing, it also brings new avenues to hack and get access to sensitive information. Cybercriminals have been able to gain entry into new areas through technological advancements, providing them with a wider attack surface from which to attack and exploit targets. If they succeed in their cyberattacks, there can be severe consequences for hackers who fail to penetrate renewable energy systems and smart grids, such as blackouts, disrupted services, and cascading effects on society.

Amongst the strongest indications that the green energy sector is growing, we can point to the occurrence of cyberattacks that are targeting it. Cybercriminals are becoming more and more interested in renewable energy systems as they become the backbone of economic operations in the future. The energy infrastructure is a critical component of society and the collapse of it could result in a blackout that would have catastrophic consequences.

It has become increasingly complex and interconnected for businesses to navigate an increasingly complex world in which they are confronted with two major challenges: cyber threats and global climate change. Breach of security may cause companies to suffer financial losses, damaging their reputations, and compromising customer information. 

There is a significant risk of operational disruption and supply chain issues arising from the effects of climate change, such as extreme weather events and a shortage of resources. For businesses to meet these challenges effectively, understanding the interplay between these challenges becomes imperative. This includes implementing resilience strategies to mitigate climate risks and cybersecurity policies to protect against evolving threats. Business continuity and sustainability can both be severely compromised in the event neither of these issues is addressed and they do not get resolved appropriately. 

There is no doubt that a cyberattack on the Colonial Pipeline in May 2021 represents a convergence between the climate change crisis and cyberattacks. This critical infrastructure was shut down, leading to panic buying, fuel shortages, and an increase in pollution emitted along the US East Coast. This was due to the shutdown of critical infrastructure. There was a severe cyber-attack on critical systems as a result of the incident, with climate change worsening the threat. 

A key point highlighted was that there was potential for data manipulation and the political ramifications that might result from upsetting an infrastructure that is essential to society. This example highlights the urgent need to develop integrated approaches to tackle the challenges posed by climate change as well as cyberattacks. 

Cyber security and climate change are both unaccountable, as is the lack of accountability for them. The problem of climate change is difficult to diagnose because everything plays a role, so it is extremely difficult to pinpoint who is responsible. 

Financial services face several challenges and opportunities related to climate change and cybersecurity. With climate catastrophes and their occurrences becoming more frequent and more severe, financial institutions must be prepared to deal with the associated risks, such as disruptions in their operations, supply chains, and investments, due to climate-related events. They must strengthen their cybersecurity defenses to protect sensitive data and protect themselves against all evolving cyber threats. 

It is possible to enhance resilience and risk assessment by embracing innovative technologies like AI and blockchain. For climate change to be mitigated and financial systems to be protected, collaboration between stakeholders is crucial. This includes incorporating climate risk into financial decision-making processes and fostering information sharing when developing robust strategies.

This Cryptocurrency Tracking Firm is Employing AI to Identify Attackers

 

Elliptic, a cryptocurrency analytics firm, is incorporating artificial intelligence into its toolkit for analyzing blockchain transactions and risk identification. The company claims that by utilizing OpenAI's ChatGPT chatbot, it will be able to organize data faster and in larger quantities. It does, however, have some usage restrictions and does not employ ChatGPT plug-ins. 

"As an organization trusted by the world’s largest banks, regulators, financial institutions, governments, and law enforcers, it’s important to keep our intelligence and data secure," an Elliptic spokesperson told Decrypt. "That’s why we don’t use ChatGPT to create or modify data, search for intelligence, or monitor transactions.”

Elliptic, founded in 2013, provides blockchain analytics research to institutions and law enforcement for tracking cybercriminals and regulatory compliance related to Bitcoin. Elliptic, for example, reported in May that some Chinese shops selling the ingredients used to produce fentanyl accepted cryptocurrencies such as Bitcoin. Senator Elizabeth Warren of the United States used the report to urge stronger regulations on cryptocurrencies once more.

Elliptic will employ ChatGPT to supplement its human-based data collecting and organization procedures, allowing it to double down on accuracy and scalability, according to the company. Simultaneously, large language models (LLM) organize the data.

"Our employees leverage ChatGPT to enhance our datasets and insights," the spokesperson said. "We follow and adhere to an AI usage policy and have a robust model validation framework."

Elliptic is not concerned about AI "hallucinations" or incorrect information because it does not employ ChatGPT to generate information. AI hallucinations are occasions in which an AI produces unanticipated or false outcomes that are not supported by real-world facts.

AI chatbots, such as ChatGPT, have come under fire for successfully giving false information about persons, places, and events. OpenAI has increased its efforts to resolve these so-called hallucinations in training its models using mathematics, calling it a vital step towards establishing aligned artificial general intelligence (AGI).

"Our customers come to us to know exactly their risk exposure," Elliptic CTO Jackson Hull said in a statement. "Integrating ChatGPT allows us to scale up our intelligence, giving our customers a view on risk they can't get anywhere else."


Unveiling DogeRAT: The Malware Exploiting Counterfeit Netflix, Instagram, and YouTube

 


In a recent study, Indian analysts discovered a powerful malware known as DogeRAT. This malware infects several devices and targets a wide range of industries.

Social media apps spread this malicious software by pretending to be popular Android applications such as YouTube, Netflix, Instagram, and Opera Mini.  The operators of DogeRat are running a malicious campaign in which hackers try to steal information from victims, including banking details. They are also trying to control their devices to harm them. 

In this digital era, smartphones have become an integral part of our everyday lives. With the help of a few taps on the screen, it is possible to perform multiple tasks on the device. Even though smartphones are becoming more popular, many people are still unaware of the dangers lurking online. 

Furthermore, cybercriminals are continually devising innovative tactics to deceive even the smartest and most tech-savvy individuals when it comes to cybercrime. A number of these criminals have created dangerous counterfeit apps that mimic popular brands' logos, typefaces, and interfaces, creating worrisome counterfeit versions of popular apps. 

False applications, such as these, are loaded with malware designed to steal sensitive information about users. It has been reported that DogeRAT malware has been disguised to appear as legitimate mobile applications, such as a game, productivity tools, or entertainment apps, including Netflix, YouTube, and so on. It is disseminated through social networking sites and messaging apps, such as Telegram, where it is distributed. 

It is a new Android virus that infects Android smartphones and tablets using open-source software to spy on businesses and steal sensitive data such as financial information and personal information. 

When malware is installed on a victim's device, it has the potential to steal sensitive information, including contacts, messages, and other personal information. Even when a device has been infected, hackers can even gain remote access to the device, which can then be used to conduct malicious activities, such as spam messages, payments that are not authorized, modifying files, viewing call records, and even taking photos using the infected device's rear and front cameras. 

In addition to the modified Remote Access Trojans (RATs), they are now repurposing malicious apps and distributing them to spread their scams. It is not only cost-effective and simple to set up these campaigns, but they also result in significant profits because they only take a bit of time to execute. 

A guide to protecting against malware threats

In the past few months, malware attacks have been noticeable, even though they are not novel. To protect your device from malware, being aware of and precautionary against the latest threats is essential. 

Depending on the device you use, you need to consider some points to protect your device's data and your personal information from malware attacks, such as:

There are warnings about links and attachments that could contain malware or lead to malicious websites, so be careful about which links and attachments you open. 

The most effective defense against malware is to keep your software updated. Update your operating system and applications regularly to ensure security vulnerabilities are protected. 

Make sure your security solutions are reliable. Buy antivirus tools to protect your computer from malware and other threats. 

Do not click on links or open attachments in emails that seem too unbelievable to be true or suspicious: Be aware of suspicious messages and offers, and take precautions to avoid clicking on them. 

You need to become familiar with malware to protect yourself against cyberattacks, so you need to learn about some common attack techniques.   

Taking proactive measures and exercising caution are the most effective ways for individuals to combat this threat effectively, so using precaution is imperative. It is necessary to source applications exclusively from trusted and verified platforms and conduct in-depth authentication of developers and maintain vigilance regarding suspicious links, emails, and messages to ensure such elements are avoided.

To ensure overall security, it is essential to keep up to date with device updates, operating system upgrades, and antivirus software updates as often as possible. 

Moreover, it is strongly recommended that cyber-security practices are implemented, including utilizing strong passwords and enabling two-factor authentication as well as implementing strong and unique passwords. 

Users can significantly reduce their susceptibility to malware such as 'DogeRAT' by staying informed about emerging cybersecurity threats. This is done by consistently applying these precautionary measures to protect themselves from cyber threats.

RBI Announces Draft Norms to Ensure Security of Payment System Operators


Reserved Bank of India (RBI), India’s central bank and regulatory body is all set to enhance the safety and security of digital payments amidst the raising cyber risks, the draft regulations for payment system operators (PSOs) announced on Friday.

The draft, Master Directions on Cyber Resilience and Digital Payment Security Controls for PSO, proposes a governance mechanism for the identification, analysis, monitoring, and management of cybersecurity risks.

RBI confirms that these norms will be implemented from April 1, 2024, for large non-bank-PSOs. For medium-sized non-bank PSOs, the norms will be implemented by April 1, 2026, as for the smaller ones, the deadline is April 1, 2028.

The key responsibility of the draft circular will be designated to a sub-committee of the board that must meet at least once every quarter.

"The PSO shall formulate a board-approved Information Security (IS) policy to manage potential information security risks covering all applications and products concerning payment systems as well as management of risks that have materialised," the draft note said.

“The directions will also cover baseline security measures for ensuring system resiliency as well as safe and secure digital payment transactions[…]However, they shall endeavour to migrate to the latest security standards. The existing instructions on security and risk mitigation measures for payments done using cards, Prepaid Payment Instruments (PPIs) and mobile banking continue to be applicable as hitherto,” the RBI noted.

What are the Draft Norms? 

As per the proposed norms, the PSO will define relevant key risk indicators (KRIs) to identify possible risk events and key performance indicators (KPIs) to evaluate the efficacy of security controls.

According to the RBI, the PSO must conduct cyber-risk assessment exercises pertaining to the launch of new products, services, and technologies along with initiating innovative changes in infrastructure or processes of existing products and services. The central bank is seeking feedback on the draft norms by June 30.

In order to manage potential information security risks involving all applications and products related to payment systems, the PSO has been asked to develop an Information Security (IS) policy that has been authorized by the board.

According to the proposed norms, the PSO was required to create a business continuity plan (BCP) based on several cyber threat scenarios, including the most unlikely but conceivable occurrences to which it might be subjected. To manage cyber security events or incidents, the BCP should be evaluated at least once a year and include a thorough response, resume, and recovery plan.

Moreover, a senior-level executive like the chief information security officer (CISO) will be in charge of implementing the information security policy and the cyber resilience framework as well as continuously reviewing the overall IS posture of PSO. According to the draft norms, the PSO must implement safeguards to keep its network and systems safe from external assaults.

The PSO must also implement a thorough data leak prevention policy to ensure the confidentiality, integrity, availability, and protection of business and customer information (both in transit and at rest), in accordance with the importance and sensitivity of the information held or transmitted.  

Conti's Legacy: Ransomware's Evolution and Future Threats

Ransomware has been a persistent and highly lucrative threat in the cybersecurity landscape, and one group that has garnered significant attention is Conti. Known for their sophisticated tactics and high-profile attacks, Conti has left a lasting impact on the cybersecurity community. However, recent developments indicate that Conti's legacy is undergoing a transformation, with spinoffs refining their attack strategies and raising concerns about the future of ransomware.

Conti first emerged in 2020 and quickly gained notoriety for its highly effective and profitable ransomware operations. The group targeted a wide range of industries, including healthcare, manufacturing, and finance, leveraging advanced techniques to breach networks and encrypt valuable data. Their success was attributed to their ability to exploit vulnerabilities in organizations' security infrastructure and their aggressive extortion tactics.

However, recent reports suggest that Conti's original group may have disbanded or rebranded, leading to the emergence of spinoffs carrying on their legacy. These new entities, operating under different names, have refined their attack strategies and continue to pose a significant threat to organizations worldwide.

One notable aspect of these spinoffs is their focus on data exfiltration alongside encryption. Instead of merely encrypting files and demanding a ransom, they now steal sensitive data before encryption, increasing their leverage by threatening to expose confidential information if the ransom is not paid. This approach not only amplifies the financial pressure on victims but also raises concerns about potential data breaches and regulatory implications.

To make matters worse, these spinoffs have also adopted a more targeted approach, carefully selecting victims based on their perceived ability to pay a significant ransom. By focusing on organizations with deep pockets or critical infrastructure, they maximize their chances of success and potential profit. Additionally, they have become more adept at evading detection by using sophisticated obfuscation techniques and employing anonymous communication channels.

The evolution of Conti's legacy highlights the need for organizations to remain vigilant and proactive in their cybersecurity measures. This includes implementing robust security controls, conducting regular vulnerability assessments, and educating employees about the risks and best practices for preventing ransomware attacks. It is also crucial for organizations to establish and regularly test incident response plans to minimize the impact and downtime in the event of an attack.

Furthermore, collaboration among law enforcement agencies, cybersecurity firms, and the private sector is essential to disrupt the operations of ransomware groups and bring their members to justice. By sharing threat intelligence and coordinating efforts, the global community can work towards dismantling these criminal networks and mitigating the widespread damage caused by ransomware attacks.

US Air Force Denies AI Drone Attacked Operator in Test


The recent Future Combat Air & Space Capabilities Summit hosted by the Royal Aeronautical Society in London brought together experts, industry leaders, and military personnel worldwide to discuss the future of combat air and space capabilities. 

The two-day conference covered various topics, including lessons from the war in Ukraine, resilience and agile operations, AI, cyber warfare, and speculative fiction's role in predicting the future. Among the many highlights, one topic that generated significant interest was the use of AI in military drones. In particular, a controversial incident involving an AI drone attacking its operator during a test drew attention, leading to subsequent denial by the US Air Force.

The Growing Significance of AI in Military Operations:

As technology continues to advance, the integration of artificial intelligence into military systems has become increasingly prevalent. AI-powered drones, for instance, offer numerous advantages in terms of enhanced situational awareness, autonomous decision-making, and operational efficiency. However, this growing reliance on AI also raises concerns regarding autonomous systems' potential risks and ethical implications.

The Alleged AI Drone Attack

During the summit, a session on AI and autonomous systems included a presentation by Lt Col Johnny Resman of the Swedish Air Force. He discussed the lessons learned from the war in Ukraine and the potential dangers of Russia's use of AI in military operations. Lt. Col Resman claimed that if Russia were to maintain its foothold in Ukraine, it could turn the "Iron Curtain into an Iron Dome" by employing an integrated air and missile defense system from the Kola Peninsula to the Black Sea.

Controversy Surrounding the Test Incident

Amidst the discussions on AI and military operations, an incident involving an AI drone allegedly attacking its operator was brought up during a Q&A session. The news spread quickly, sparking concerns about the reliability and safety of AI-controlled systems. Reports suggested that a test conducted by the US Air Force resulted in the drone targeting its operator.

US Air Force Denial

The US Air Force swiftly responded to the allegations, denying that an AI drone had attacked its operator during a test. They clarified that the incident had been misreported, emphasizing that the safety measures prevented any harm to the operator. The Air Force assured the public that thorough investigations were conducted to address the incident and that steps were taken to ensure the reliability and safety of AI systems used by the military.

The Importance of AI Safety Measures

The incident serves as a reminder of the critical need for robust safety measures when implementing AI in military operations. While AI technology offers significant benefits, its integration must prioritize human safety and accountability. Stringent testing protocols, fail-safe mechanisms, and comprehensive training programs should be in place to minimize the risks associated with AI-powered systems.

Ethical Considerations and International Cooperation

The rapid advancement of AI in military applications raises ethical concerns that need to be addressed. The need for clear regulations and guidelines governing the development and deployment of AI in military operations is paramount to prevent unintended consequences and potential abuses. Discussions during the summit highlighted the importance of international collaboration and interoperability in ensuring the responsible and ethical use of AI in warfare.

The Future Combat Air & Space Capabilities Summit provided a platform for experts, military personnel, and industry leaders to delve into the future of combat air and space capabilities. The controversial incident involving an AI drone allegedly attacking its operator drew significant attention, leading to the US Air Force's swift denial. 

The incident underscores the importance of prioritizing safety measures and ethical considerations when integrating AI into military operations. Moving forward, international cooperation and clear regulations will be crucial in harnessing the potential of AI while ensuring responsible and accountable use in the defense sector. 

Threat Actors Launch a New Wave of Mass-Hacks Against Business File Transfer Tool

 

Security experts are raising the alarm after hackers were detected using a recently identified vulnerability in a well-known file transfer tool that is used by thousands of organisations to start a new wave of massive data exfiltration assaults. 

The flaw affects Progress Software's MOVEit Transfer managed file transfer (MFT) software, which enables businesses to transmit huge files and datasets over the internet. Ipswitch is a subsidiary of Progress Software.

Last week on Wednesday, Progress acknowledged that it had found a vulnerability in MOVEit Transfer that "could lead to escalated privileges and potential unauthorised access to the environment," and it advised customers to turn off internet traffic to their MOVEit Transfer environments. 

All consumers are being urged to promptly apply patches that are now accessible by Progress. 

The U.S. cybersecurity agency CISA is also advising U.S. organisations to implement the required patches, follow Progress' mitigating recommendations, and look for any malicious behaviour. 

The popularity of popular enterprise systems has made corporate file-transfer technologies an increasingly appealing target for hackers who want to steal data from numerous victims. 

The impacted file transfer service is used by "thousands of organisations around the world," according to the company's website, but Jocelyn VerVelde, a representative for Progress through an outside public relations firm, declined to specify how many organisations use it. More than 2,500 MOVEit Transfer servers are visible on the internet, according to Shodan, a search engine for publicly exposed devices and databases. Most of these servers are based in the United States, but there are also many more in the United Kingdom, Germany, the Netherlands, and Canada. 

Security researcher Kevin Beaumont claims that the vulnerability also affects users of the MOVEit Transfer cloud platform. According to Beaumont, some "big banks" are also thought to be MOVEIt customers and at least one disclosed instance is linked to the U.S. Department of Homeland Security. Several security firms claim to have already seen indications of exploitation.

According to Mandiant, "several intrusions" involving the exploitation of the MOVEit vulnerability are under investigation. Charles Carmakal, the chief technical officer of Mandiant, acknowledged that Mandiant had "seen evidence of data exfiltration at multiple victims." 

According to a blog post by cybersecurity firm Huntress, one of its clients has observed "a full attack chain and all the matching indicators of compromise." 

Meanwhile, the security research company Rapid7 said that it has seen indications of data theft and misuse from "at least four separate incidents." According to Rapid7's senior manager of security research, Caitlin Condon, there is evidence that suggests attackers may have started automated exploitation. 

While the exact start date of exploitation is unknown, threat intelligence firm GreyNoise claims to have seen scanning activity as early as March 3. The company advises customers to check their systems for any signs of possible unauthorised access that may have happened during the last 90 days. 

The perpetrator of the widespread MOVEit server exploitation is still unknown. 

The attacker's actions were "opportunistic rather than targeted," according to Rapid7's Condon, who also speculated that this "could be the work of a single threat actor throwing one exploit indiscriminately at exposed targets."

Terminator Antivirus Killer: Vulnerable Windows Driver Masquerading as Threat

 

Spyboy, a threat actor, has been actively advertising the "Terminator" tool on a hacking forum predominantly used by Russian speakers. The tool supposedly possesses the ability to disable various antivirus, XDR, and EDR platforms. However, CrowdStrike has dismissed these claims, stating that the tool is merely an advanced version of the Bring Your Own Vulnerable Driver (BYOVD) attack technique. 

According to reports, Terminator allegedly has the capacity to evade the security measures of 24 distinct antiviruses (AV), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) solutions. These include well-known programs such as Windows Defender, targeting devices operating on Windows 7 and later versions.

Spyboy, a seller specializing in software, offers a range of products designed to bypass security measures. Their software is available at various price points, starting at $300 for a single bypass and going up to $3,000 for a comprehensive all-in-one bypass solution.

"The following EDRs cannot be sold alone: SentinelOne, Sophos, CrowdStrike, Carbon Black, Cortex, Cylance," the threat actor says, with a disclaimer that "Ransomware and lockers are not allowed and I'm not responsible for such actions."

To utilize Terminator, the "clients" need to have administrative privileges on the targeted Windows systems and must deceive the user into accepting a User Account Controls (UAC) pop-up when executing the tool.

However, according to a CrowdStrike engineer's Reddit post, Terminator employs a technique where it places the legitimate and signed Zemana anti-malware kernel driver, known as zamguard64.sys or zam64.sys, into the C:\Windows\System32\ folder with a randomly generated name consisting of 4 to 10 characters.

Once the malicious driver is written to the disk, Terminator loads it to exploit its kernel-level privileges and terminate the user-mode processes of antivirus (AV) and endpoint detection and response (EDR) software running on the targeted device.

The exact method by which the Terminator program interacts with the driver remains unclear. However, a proof-of-concept (PoC) exploit was made available in 2021, which exploits vulnerabilities in the driver to execute commands with Windows Kernel privileges. This capability could be utilized to terminate security software processes that are typically safeguarded.

According to a VirusTotal scan, currently only one anti-malware scanning engine has detected a driver as vulnerable. To assist defenders in identifying this vulnerable driver used by the Terminator tool, Florian Roth, the head of research at Nextron Systems, and threat researcher Nasreddine Bencherchali have shared YARA and Sigma rules that can be used.

This method is commonly employed by threat actors who aim to evade security software on compromised machines. They achieve this by escalating privileges, installing vulnerable Windows drivers, executing malicious code, and delivering additional harmful payloads.

These attacks, known as Bring Your Own Vulnerable Driver (BYOVD) attacks, involve dropping legitimate drivers with valid certificates onto victims' devices. These drivers can operate with kernel privileges, effectively disabling security solutions and taking control of the system.

Various threat groups, including financially motivated ransomware gangs and state-sponsored hacking organizations, have utilized this technique for several years. Recently, security researchers at Sophos X-Ops discovered a new hacking tool called AuKill being used in the wild. This tool disables EDR software by utilizing a vulnerable Process Explorer driver before launching ransomware attacks in BYOVD scenarios.

'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft


The United Arab Emirates has recently become a target of SMS campaigns that seek to deceive residents and extract their personal and payment information. This particular campaign, known as PostalFurious, initially targeted individuals in the Asia-Pacific region before expanding its reach to the UAE. It operates by impersonating postal services, using SMS messages to deceive unsuspecting victims into revealing sensitive data.  

The investigations carried out by Group-IB have linked both campaigns to a phishing ring called PostalFurious, known for its Chinese-speaking language. This group, active since 2021, possesses the capability to swiftly establish extensive network infrastructures, frequently changing them to evade detection by security systems. 

Additionally, the group employs access-control techniques to bypass automated detection and blocking mechanisms. Also, the evidence suggests that PostalFurious operates on a global scale, extending its activities beyond the Middle Eastern initiative under scrutiny. 

As part of this campaign, fraudulent SMS messages are being used to gather payment details by deceiving recipients into believing they need to pay fees for tolls and deliveries. The URLs included in these text messages direct individuals to counterfeit payment pages adorned with the logos and names of well-known postal service providers in the country. 

Since April 15 of this year, the scam SMS messages have been distributing shortened URLs that lead to counterfeit payment pages. Initially, the campaign impersonated a UAE toll operator, but on April 29, a new version was launched, this time mimicking the UAE postal service. Interestingly, the phishing domains for both versions were hosted on the same servers. The SMS messages were sent from phone numbers registered in Malaysia and Thailand, along with email addresses via iMessage. 

These pages illicitly request personal information, including names, addresses, and credit card details. Notably, the phishing pages can only be accessed from IP addresses located within the UAE, further targeting residents of the country. 

Anna Yurtaeva, a senior cyber investigation specialist at Group-IB's Digital Crime Resistance Center in Dubai, has confirmed that the group is exclusively targeting members of the public. Previously the group victimized users of Singapore and Australia

"They launch widespread SMS phishing campaigns, and we are aware of cases where messages have been sent to UAE residents who are not users of the services. From our analysis of the source code and infrastructure of the PostalFurious website, we see that the gang aims to steal payment credentials and personal data from victims," she said. 

Data Theft: Significance, Impacts, and Consequences 

The Significance of Data Theft: 

  • Primary Driver: Corporate data theft stems primarily from the pursuit of financial gain, accounting for a minimum of 86% of breaches. 
  • Exploiting Weaknesses: Attackers exploit security vulnerabilities by stealing and selling data to other malicious actors, maximizing their gains. 

Impacts on Businesses: 

  • Costly Breaches: Data breaches incur substantial costs, with the average breach exceeding $1.2 million in 2018, indicating a 24% increase from the previous year. 
  • Small Business Vulnerability: Smaller organizations with limited resources face heightened risks, as 60% of them go out of business within six months of an attack. 

Broader Consequences: 

  • Ransomware Extortion: Cybercriminals may hold an organization's data hostage, with paying the ransom not guarantee a resolution. 
  • Expensive Recovery: Data recovery and system patching post-breach entail significant expenses. 
  • Reputational Damage and Customer Loss: Data theft leads to customer attrition, while brands with a history of breaches struggle to attract new business. 
  • Legal Liabilities: Mishandling of data exposes companies to potential lawsuits from affected customers. 
  • Downtime and Reduced Productivity: Breaches render systems unusable, causing downtime and hampering employee productivity. 
  • Regulatory Penalties: Non-compliant organizations face substantial financial penalties for failing to meet security mandates. 
In a new development, it was discovered not only PostalFurious but there is also another campaign with a similar theme that has emerged. Referred to as "Operation Red Deer," is designed to specifically target Israeli engineering and telecommunications companies. The campaign involves a persistent stream of phishing messages that skillfully impersonate Israel's postal service, adding to the credibility of the attacks. These ongoing events highlight the need for robust mechanisms and quick responses. 

The Unintended Consequences of Netflix's Password Sharing Ban

Netflix Password Sharing Ban

Netflix's recent ban on password sharing may have initially appeared as a step forward for cybersecurity. However, emerging data suggest that this policy change has led some users to explore alternative streaming options on the Dark Web.

In addition to losing subscribers, Netflix inadvertently created a breeding ground for cybercriminals. This blog delves into the repercussions of the password-sharing ban, including compromised accounts sold at discounted prices and a surge in phishing attacks exploiting the confusion among users.

Netflix's Password Sharing Ban and its Fallout 

On February 8, Netflix implemented a new household policy in several countries, including Canada, New Zealand, Portugal, and Spain. The immediate backlash was severe, with over a million Spanish subscribers canceling their Netflix accounts by the end of the following month.

But where did these viewers turn to? Some opted for Dark Web offerings rather than mainstream alternatives like Hulu. Researchers from Check Point noted that the ban had created an ideal environment for cybercriminals, enticing former account holders with heavily discounted Netflix deals obtained through compromised user credentials.

Risks and Pitfalls in Dark Web Deals 

Hackers promoting "full access" to Netflix for a mere 190 Indian rupees (approximately $2.30 or €2.15) on Telegram channels caught the attention of cybersecurity experts. However, the discounts offered were too good to be true. 

Check Point researchers discovered instances where users either failed to gain access or had their permits revoked after a short period. These cybercriminals exploited the compromised accounts they had hijacked, leaving unsuspecting users disappointed and potentially susceptible to further cybersecurity threats.

Exploiting User Vulnerability: Phishing Attacks 

Taking advantage of the confusion and vulnerability among Netflix users, cybercriminals launched social engineering attacks. Phishing emails with deceptive subjects such as "Your suspension notification" or "Update required — Netflix account on hold" flooded inboxes, originating from email addresses impersonating Netflix. 

Omer Dembinsky, data group manager at Check Point Software, warned that users lured by these scams might unwittingly divulge their credentials on fraudulent websites, subsequently enabling attackers to resell their compromised accounts on the Dark Web.

The Unexpected Solution 

Ironically, the researchers from Check Point suggested that adhering to Netflix's new guidelines could help prevent the trafficking of secondhand Netflix accounts. They recommended that users implement the very measures that Netflix had previously criticized: restricting shared access to their accounts. 

While it remains uncertain whether Netflix's ban on password sharing will ultimately enhance or hinder security in the long run, this episode highlights the unintended consequences that businesses may face when implementing policy changes affecting their users.

Netflix's attempt to combat password sharing has inadvertently opened the door to cybercriminals and undermined user trust. The migration of disenchanted users to Dark Web offerings, coupled with an increase in phishing attacks exploiting the confusion, showcases the unintended consequences of this policy change. 

This scenario serves as a reminder to businesses that policy alterations can have unforeseen cybersecurity implications. As the dust settles, it remains to be seen whether Netflix's measures will indeed enhance security or inadvertently compromise it further.

Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace

 

The free version of Google Workspace lacks event logging, which can be exploited by attackers to download data from Google Drive without any trace of their unauthorized activity, researchers reported in recent findings. 

Mitiga researchers identified a significant "forensic security deficiency" in the widely used productivity application. This deficiency occurs because log generation is only available for users with a paid enterprise license for Workspace. As stated in a recent blog post by Mitiga on May 30, this situation exposes enterprises to insider threats and the risk of potential data leaks. 

A forensic security deficiency refers to a specific weakness or gap in the security measures of a system that hinders effective forensic analysis and investigation. In simpler terms, it means there is a flaw in the system's ability to gather and provide critical information necessary to understand and respond to security incidents. 

Event logging is the process of recording and storing detailed information about events or actions that occur within a system or application. It involves capturing data such as user activities, system events, errors, and other relevant information. 

The purpose of event logging is to provide a trail of recorded events that can be used for troubleshooting, security analysis, auditing, and compliance purposes. Users who have a paid license, like Google Workspace Enterprise Plus, have access to "drive log events" that provide visibility into Google Drive activity. 

These log events track actions such as copying, deleting, downloading, and viewing files. However, users with the default Cloud Identity Free license do not have this visibility. 

“Google Workspace provides visibility into a company’s Google Drive resources using ‘Drive log events,’ for actions such as copying, deleting, downloading, and viewing files. Events that involve external domains also get recorded, like sharing an object with an external user,” Mitiga explained. 

As a result, organizations using the free license cannot detect potential data manipulation and exfiltration attacks promptly. This limitation hinders their ability to effectively assess the extent of data theft, or even determine if any data has been stolen at all. 

“We recommend Google Cloud customers use VPC Service Controls and configure organizational restrictions in Google Cloud Storage buckets for exfiltration protection. Between this and appropriately configured cloud audit logs, customers can rest assured that their data is secure...” 

“…While improving log forensics hasn’t been an issue raised by our customers, we are continually evaluating ways to improve customers’ insight into their storage. The highlighted forensics gap in the blog is one of those areas we are examining,” a Google Cloud spokesperson reported.

Music Streaming Royalties To Be Examined by The UK Government

 


Since the early days of the music industry, musicians, writers, and other creatives have spoken out about the unfairness of royalty share payments. This is when their works are played on Spotify and Apple Music. There will be a discussion of these issues within the government after an investigation was conducted in 2019. 

To investigate suggestions that the music streaming industry is not remunerated fairly for artists, the government is investigating the streaming industry. Musicians and artists are worried that they are not receiving as much money as record labels when their tracks are played on streaming services like Spotify, as there are concerns that their tracks may be stolen. 

It is essential to provide high-quality metadata for a track in the era of digital music to ensure that the people who contributed to the creation of a track are accurately credited and compensated. This is the most effective way to ensure music makers are properly credited. The metadata for songwriters and their works, however, lacks precision and completeness. It is often out of date or incomplete, especially regarding specifics. In some cases, insufficient or incorrect metadata can cause a significant delay in creators' payment for the use of their work. In some cases, no payment to the creators at all. 

There have recently been meetings brought together by experts from across the UK music industry. These meetings were to develop positive steps for improving music metadata for everyone involved. 

Despite many aspects of metadata provision working well, and positive steps taken by several industry participants to improve it, there are still significant challenges to be overcome in several areas. To achieve this, it is essential that data is collected from creators promptly and that industry-standard identifiers are adopted and made accessible, particularly regarding metadata associated with work and songwriters. This is especially true of the links between sound recordings and musical works. 

The report has also stated that there have been reports that session musicians have not been paid for streams. This issue will be investigated by a working group of industry representatives tasked with looking into these concerns. There has been an investigation by the government into streaming music since 2019, and an imbalance in royalties was discussed in 2021 as the cause of the investigation. 

A member of the Digital, Culture, Media, and Sport (DCMS) Select Committee, who is investigating the music industry on behalf of the government, has said that she considers this a "welcome step towards understanding the frustrations of musicians and songwriters whose pay often falls below a fair level." 

Despite this, she added, the talk shop should produce concrete change and not just an opportunity for "talking heads to talk". Nile Rodgers, a guitarist, producer, and songwriter who helped create the music for the film Goodfellas, will be addressing the government in 2020. Among the royalties record labels receive as a result of streaming services, he said that they should keep up to 82% of the proceeds.

Earlier this year, Sir John Whittingdale, the minister for creative industries, described the project as a way of offering the UK an "enriching career opportunity".

As he went on to say, "This exceptional agreement on streaming metadata is an important step forward in making sure the contributions and creativity of UK musicians in the digital age are considered and fairly compensated for their contributions and creativity." 

Former chief economist at Spotify, Will Page, said music business officials are at the moment debating the way the money is being allocated in the industry. According to Page, if artists get to receive even 1% of what is generated in the United Kingdom through streams, they are also entitled to receive any cash generated there. 

A certain amount is not paid to the artist every time a song is heard on Spotify, because the artist is not paid a certain amount per instance that the song is played. 

Depending on the way the music is streamed and the rights that are held by labels or distributors, royalties that artists receive may differ depending on the agreement they have with the label or distributor or the way their music is distributed. 

To conclude, the UK government's decision to investigate streaming royalties for music is a great step forward in the direction of resolving long-standing issues regarding the streaming of music. 

As a result of digital streaming platforms, how music is consumed has changed greatly in recent years. However, it has also brought forth several challenges, especially when it comes to fair compensation for songwriters and artists who work on those platforms. 

With the government's initiative to examine streaming royalties, the government recognizes that right now, in this rapidly evolving landscape, it is critical to ensure that revenues are distributed more equitably. Record labels and streaming platforms have been criticized for disproportionately benefitting from the current royalty model, which is described as a rip-off. A songwriter or artist who is creating a song may receive minimal compensation for their work, while the artists receive no compensation at all. 

Taking this action by the UK government is a strong statement that the government is listening to the concerns of artists, songwriters, and musicians. It also states that their concerns are addressed. Throughout the document, all parties involved in the music industry are urged to create an ecosystem that supports sustainable and fair business. This is where everyone can survive and thrive. 

As part of the investigation, existing legislation on music streaming royalties will likely be examined in detail. In addition, license agreements and the dynamics of power between stakeholders and the industry.

Furthermore, the company might also explore alternative models, such as user-centric payment systems. These systems aim to ensure that royalties are distributed directly based on an individual user's listening habits, rather than pooling their revenues and distributing them randomly to each user.

It is anticipated that the outcome of this investigation will ultimately lead to reshaping the music industry in a way that is more transparent and equitable for artists and songwriters while also creating a more competitive environment for them. If there were reforms to reflect the value of creative work and to provide artists with more sustainable income streams resulting from that, that would be of great benefit to all. 

No doubt finding a solution to this complex issue will not be easy, however, and that will prolong the issue. There will also be a need for careful deliberation and collaboration between the interests of artists, songwriters, streaming platforms, and consumers in balancing these interests. Although, it is a positive development to see the UK government take action to address these concerns, which may have a lasting impact on the global music industry in the long run. 

Having made this decision, the UK government has achieved a significant milestone in its ongoing efforts to transform the music ecosystem into a more sustainable and fairer one exemplified by its decision to examine music streaming royalties. In essence, it is a step towards ensuring that artists and songwriters receive their fair share of revenues in the digital age, and to foster and sustain an industry that is thriving both for creators and for consumers, benefiting both of them.

Which Country Ranked the Highest in the Global National Privacy Test?


Apparently, it has turned out that what is known to be the world’s smallest country has also been named the most literate in terms of cybersecurity: Vatican City.

As per the National Privacy Test carried out by one of the most acclaimed VPN services, NordVPN, The Holy See topped, with eight other top ten nations all being European. On the world leaderboard, the UK came in at number 35.

NordVPN says the test is "designed to evaluate aspects of an individual's online life, including their understanding of cybersecurity in theory and their ability to recognize online threats and react accordingly."

European Countries Dominate

Vatican City respondents received 72 points in the test, the highest of any other country, according to data accumulated since 2020 with nearly 140,000 respondents from 192 countries answering to 20 questions. 

The residents "demonstrated an excellent awareness of digital risks and how to avoid them," notes NordVPN. However, the firm also criticized the residents’ digital habits, mentioning that they need to up their online services and privacy tools in order to maintain their security. 

The second place was secured by Finland, followed by the Czech Republic. As per the reports, when compared to Vatican City, both countries have poorer results in areas pertaining to the test, namely digital habits, digital privacy awareness, and digital risk. 

Status of the Non-European Countries 

Singapore was the only non-European country making it in the top ten, ranking seven with 69 points. The other Asian countries followed were Malaysia and the UAE, both scoring 67 points. Moreover, the US ranked 21st globally with a score of 67, leaving behind Canada in all the test aspects.

New Zealand took first place in the Oceanic region with 68 points, while Australia came in second with 63 points. New Zealand outperformed other nations in every category. Meanwhile, with 67 points, Brazil took first place in Latin America, two points ahead of its closest competitors, Argentina and Colombia. However, Colombia outperformed Argentina in terms of digital dangers (84 to 80) and behaviors (49 to 47).

Moreover, the global average score turned out to be 65, with respondents performing their best when identifying and avoiding digital dangers, scoring an average of 82 points. The average score for knowing how to avoid malware was 69 points, while only 47 points were awarded for knowing how to properly secure data utilizing privacy tools and internet services.  

What B2C Service Providers can Learn From Netflix's Accidental Model

 

Netflix made a policy error last month that might provide consumers with long-term security benefits. For other business-to-consumer (B2C) firms wishing to enhance client account security, this unintentional pro-customer safety action may serve as a lesson. 

On May 23, the streaming giant made its new "household" policy available to US consumers. Accounts will now be limited (with few exceptions) to a single Wi-Fi network and associated mobile devices. After months of stagnation and investor apprehension, it's a shot in the arm to treat the aftereffects of COVID and promote user growth. By banning the widespread practise of password sharing, the restriction may unintentionally enhance streamers' account security. 

"Sharing a password undermines control over who has access to an account, potentially leading to unauthorized use and account compromise," stated Craig Jones, vice president of security operations at Ontinue. "Once shared, a password can be further distributed or changed, locking out the original user. Worse yet, if the shared password is used across multiple accounts, a malicious actor could gain access to all of them. The practice of sharing passwords can also make users more susceptible to phishing and social engineering attacks."

With this new policy, Netflix is demonstrating how businesses may encourage or simply force its users to adopt better login practices, whether on purpose or not. However, changing client behaviour for the better isn't always as easy as it looks. 

Use of the gold biometric standard restricted for cloud services 

The mobile phone business is one area of tech that has long since found out how to assist users in logging in safely without sacrificing their experience.

Smartphone users have been selecting simple passcodes for years simply out of laziness or forgetfulness. When Apple debuted TouchID for the iPhone 5S in 2013, drawing inspiration from the Pantech GI100, things started to change. FaceID will soon make it even simpler for consumers to check in securely without slowing down anything, even if facial recognition technology wasn't nearly available at that point.

Even if biometric login is ideal, most businesses lack access to a ready-made solution, according to John Gilmore, head of research at DeleteMe.

"'Face unlock' on iPhones is an example of how this can be done in practice, but it is contingent on a specific device. For services which rely on users being able to access a service on multiple platforms, it is not yet feasible," he explained.

The main issue is that secure authentication frequently reduces usability when it comes to services. 

"Online services tend to resist implementing stronger security protocols because they see that it complicates the user experience. If you create a multistep barrier to entry, such as two-factor authentication (2FA), it is less likely people will actually engage with your platform," Gilmore added. 

Does this arrangement compel service providers to be clunky or unreliable? Experts argue against this. 

How to promote better account security behaviours

Both a carrot and a stick can be used for motivation. Epic Games, the maker of the online game Fortnite, is one business that has achieved success in the former. Epic developed new in-game awards for players who enabled two-factor authentication (2FA) on their accounts after a succession of security problems that affected thousands of the game's (sometimes very young) users. 

Never before have so many children "boogied down" over good internet behaviour! 

Consider Twitter as a case study in practise. Twitter said on February 15 that SMS-based 2FA would only be available to paid members. The decision was received with mixed feelings in the cybersecurity world because it seemed to discourage the usage of a crucial second layer of security, as explained by Darren Guccione, CEO and co-founder of Keeper Security. Although SMS 2FA is still an option, Twitter has switched to using the authenticator app or security key as the default for ordinary accounts. 

All of these instances show that businesses have a significant amount of control over how their customers interact with their security. All of these instances show that businesses have a significant amount of control over how their customers interact with their security.

In the end, Guccione says, "the ethical responsibility falls on the leaders of these companies to support and usher in changes that will ultimately protect their customers."