logo
#

Latest news with #AnyDesk

Dickson County woman loses thousands to PayPal scam, deputies say
Dickson County woman loses thousands to PayPal scam, deputies say

Yahoo

time14-05-2025

  • Yahoo

Dickson County woman loses thousands to PayPal scam, deputies say

DICKSON COUNTY, Tenn. (WKRN) — The Dickson County Sheriff's Office is warning residents after an elderly woman lost approximately $40,000 to a scam. Investigators said the the woman received emails from what she believed to be PayPal on April 24 and 25, indicating a payment discrepancy. According to the sheriff's office, the woman called the number on the email, which was then redirected to a location in India. Report: Tennesseans lost millions in cryptocurrency scams last year, per FBI Officials shared some of the conversation between the victim and scammer during another phone call. 'We have to take it back from you, that's what I'm telling you. Your bank and our bank is connected. Our payment is going to your account,' said the man on the other end of the call. The man was reportedly able to look into the woman's financial data after she was convinced to download an app. Detectives said the scammers were then able to move money from one of her accounts to another one of her accounts. After telling the woman that PayPal accidentally sent her bank account an excess amount of money, the scammers demanded that she take $40,000 out of her account to pay it back. 'They had her download an app on her mobile device, AnyDesk is the app they had her download, and with that app they gain remote access to your phone and anything on your phone, which in this case was her banking info,' said DCSO Captain Jennifer Caruthers. Retired IRS agent imprisoned for bilking elderly woman of life savings The victim reportedly withdrew the money from her bank and sent it to the scammers via a Crypto machine at a local market. Officials said the scammers called the woman the following day for more money. However, this time deputies were listening in on the conversation. 'I already sent you the money; I'm not following,' said the victim on the call. 'Yes, I know that you have sent the money. You got a confirmation too,' replied the person on the other end of the call. 'They continued calling because when they had access to her bank account through that mobile app, they realized there were more funds available,' explained Caruthers. The sheriff's office said they set up a sting operation after the victim refused to send more money, which led to the arrest of Roshandice McCullough of Texas. According to investigators, McCullough was sent by the scammers as a courier to meet the victim at her bank. 'It's an active investigation, hoping it will lead to someone above her and someone above them,' said Caruthers. 'There will be other countries involved; there will be other states involved.' McCollough has yet to speak with investigators. However, authorities told News 2 that she was arrested in Killeen, Texas for similar charges, adding that Texas officials want to prosecute her as soon as her court case is done in Dickson County. The Dickson County woman has not recovered her $40,000, according to deputies. 'Do not pay anyone over a phone, don't go to a Bitcoin machine and make a large transaction like this, 9 times out of 10 it is a fraudulent charge,' warned Caruthers. McCollough was booked in Dickson County Jail and charged with theft over $10,000. Experts say to avoid falling victim to a scam, always log into your PayPal account directly through the website and do not click on links or numbers, which can be fake. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Top 10 Software Solutions That Users Say Boost Productivity, Revealed by Info-Tech Research Group
Top 10 Software Solutions That Users Say Boost Productivity, Revealed by Info-Tech Research Group

Yahoo

time25-04-2025

  • Business
  • Yahoo

Top 10 Software Solutions That Users Say Boost Productivity, Revealed by Info-Tech Research Group

Info-Tech Research Group has revealed the top ten software solutions that have made the most positive impact on user productivity over the last year. Recognized as "Productivity Champions," these tools were selected based on user feedback collected through the firm's SoftwareReviews platform. From automation to AI-powered assistance, the list includes solutions that have helped organizations streamline workflows, improve operational efficiency, and achieve stronger performance across various sectors. TORONTO, April 25, 2025 /PRNewswire/ - Info-Tech Research Group has unveiled its list of the top ten software solutions that delivered the most significant productivity impact for organizations over the last year. Recognized as Productivity Champions, these solutions were identified and ranked using data from Info-Tech's SoftwareReviews platform, the global research and advisory firm's proprietary solution for collecting, analyzing, and publishing feedback on enterprise software performance. Eligible products were chosen from over 270 categories published by SoftwareReviews. The top ten Productivity Champions list for this year includes solutions from such software categories as automation, remote connectivity, cloud infrastructure, digital collaboration, and AI-powered assistance. High-productivity software solutions contribute to better decision-making, faster execution, and stronger performance across the board. In environments where time and resources are limited, software that drives productivity is a key factor in achieving sustainable success. In fact, how a software platform enables organizational productivity is one of the most important factors for users recommending their tools to their peers. Info-Tech identified the top solutions by evaluating real end-user feedback and collecting up to 130 data points on software performance. These results are aggregated into the net promoter score (NPS), a widely recognized metric that measures user sentiment and customer satisfaction based on the likelihood of users recommending a product or service. The firm's methodology emphasizes that the rankings are based exclusively on genuine user reviews without the influence of analysts or vendors. Top 10 Productivity Champions The following ranked list of software solutions has been recognized by users for their exceptional ability to enhance productivity across organizations. These tools stood out for consistently helping users work more efficiently and achieve stronger results. Selected based on user feedback, each solution played a key role in driving performance and supporting the day-to-day execution of organizational priorities. Microsoft Power Automate, + 100 NPS, allows users to create secure, no-code workflows with integrated data loss prevention and identity management. Smartsheet, + 100 NPS, enables users to plan, track, automate, and report on work, helping teams move from idea to impact quickly. AnyDesk, + 100 NPS, facilitates latency-free desktop sharing, stable remote control, and fast and secure data transmission between devices. Kudos, + 98 NPS, enables team members, managers, and leadership to stay connected, collaborate, and coach. TeamViewer, + 98 NPS, facilitates secure remote connectivity to IT systems for instant, reliable support. Microsoft Azure Virtual Machines, + 98 NPS, migrates critical workloads to Azure infrastructure, supporting SQL Server, SAP, Oracle, and high-performance apps on Azure Virtual Machines. Publer, + 98 NPS, is a social media management platform for scheduling, collaborating, and analyzing posts across multiple platforms from one place. CMW Platform, + 98 NPS, drives digital transformation by streamlining operations with BPMN 2.0, API integrations, drag-and-drop tools, and patented features. UiPath Business Automation Platform, + 98 NPS, where automation turns AI's promise into real-world impact. ChatGPT, + 98 NPS, helps gain insights, automate tasks, and witness the future of AI all in one place. "As organizations face growing pressure to do more with less, software solutions that boost productivity are becoming essential," says Emily Wright, senior research analyst at Info-Tech Research Group. "Solutions that streamline workflows and enhance efficiency are critical for keeping teams agile, helping organizations stay competitive, and enabling them to navigate challenges while accelerating growth." Info-Tech's Productivity Champions list is intended to guide organizations in selecting software solutions that drive efficiency and performance. By highlighting tools that consistently boost productivity and streamline workflows, this list highlights solutions that have a tangible impact on organizational success, enabling teams to work smarter and achieve more. User assessments of software categories on Info-Tech Research Group's SoftwareReviews platform provide an accurate and detailed view of the constantly changing market. Rankings are informed by the data from users and IT professionals who have intimate experience with the software throughout the procurement, implementation, and maintenance processes. For more information about Info-Tech's SoftwareReviews, the Data Quadrant, or the Emotional Footprint, or to access resources to support the software selection process across a variety of categories, visit About Info-Tech Research Group Info-Tech Research Group is one of the world's leading research and advisory firms, proudly serving over 30,000 IT and HR professionals. The company produces unbiased, highly relevant research and provides advisory services to help leaders make strategic, timely, and well-informed decisions. For nearly 30 years, Info-Tech has partnered closely with teams to provide them with everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations. To learn more about Info-Tech's divisions, visit McLean & Company for HR research and advisory services and SoftwareReviews for software buying insights. Media professionals can register for unrestricted access to research across IT, HR, and software and hundreds of industry analysts through the firm's Media Insiders program. To gain access, contact pr@ For information about Info-Tech Research Group or to access the latest research, visit and connect via LinkedIn and X. About SoftwareReviews SoftwareReviews is a division of Info-Tech Research Group, a world-class technology research and advisory firm. SoftwareReviews empowers organizations with the best data, insights, and advice to improve the software buying and selling experience. For buyers, SoftwareReviews' proven software selection methodologies, customer insights, and technology advisors help maximize success with technology decisions. For providers, the firm helps build more effective marketing, product, and sales processes with expert analysts, how-to research, customer-centric marketing content, and comprehensive analysis of the buyer landscape. View original content to download multimedia: SOURCE Info-Tech Research Group Sign in to access your portfolio

North Korea-aligned DeceptiveDevelopment targets freelance developers with infostealers, ESET Research discovers
North Korea-aligned DeceptiveDevelopment targets freelance developers with infostealers, ESET Research discovers

Mid East Info

time27-02-2025

  • Mid East Info

North Korea-aligned DeceptiveDevelopment targets freelance developers with infostealers, ESET Research discovers

Since 2024, ESET researchers have observed a series of malicious North Korea-aligned activities, where the operators, posing as software development recruiters, entice the victims with fake employment offers. Subsequently, they try to serve their targets with software projects that conceal infostealing malware. ESET Research calls this activity cluster DeceptiveDevelopment. This North Korea-aligned activity is currently not attributed by ESET to any known threat actor. It targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers. 'As part of a fake job interview process, the DeceptiveDevelopment operators ask their targets to take a coding test, such as adding a feature to an existing project, with the files necessary for the task usually hosted on private repositories on GitHub or other similar platforms. Unfortunately for the eager work candidate, these files are trojanized: Once they download and execute the project, the victim's computer gets compromised,' explains ESET researcher Matěj Havránek, who made the discovery and analyzed DeceptiveDevelopment. DeceptiveDevelopment's tactics, techniques, and procedures are similar to several other known North Korea-aligned operations. Operators behind DeceptiveDevelopment target software developers on Windows, Linux, and macOS. They steal cryptocurrency primarily for financial gain, with a possible secondary objective of cyberespionage. To approach their targets, these operators use fake recruiter profiles on social media. The attackers don't distinguish based on geographical location, instead aiming to compromise as many victims as possible to increase the likelihood of successfully extracting funds and information. DeceptiveDevelopment primarily uses two malware families as part of its activities, delivered in two stages. In the first stage, BeaverTail (infostealer, downloader) acts as a simple login stealer, extracting browser databases containing saved logins, and as a downloader for the second stage, InvisibleFerret (infostealer, RAT), which includes spyware and backdoor components, and is also capable of downloading the legitimate AnyDesk remote management and monitoring software for post-compromise activities. In order to pose as recruiters, the attackers copy profiles of existing people or even construct new personas. They then either directly approach their potential victims on job-hunting and freelancing platforms, or post fake job listings there. While some of these profiles are set up by the attackers themselves, others are potentially compromised profiles of real people on the platform, modified by the attackers. Some of the platforms where these interactions occur are generic job-hunting ones, while others focus primarily on cryptocurrency and blockchain projects and are thus more in line with the attackers' goals. The platforms include LinkedIn, Upwork, We Work Remotely, Moonlight, and Crypto Jobs List. Victims receive the project files either directly via file transfer on the site, or through a link to a repository like GitHub, GitLab, or Bitbucket. They are asked to download the files, add features or fix bugs, and report back to the recruiter. Additionally, they are instructed to build and execute the project in order to test it, which is where the initial compromise happens. The attackers often use a clever trick to hide their malicious code: They place it in an otherwise benign component of the project, usually within backend code unrelated to the task given to the developer, where they append it as a single line behind a long comment. This way, it is moved off-screen and stays mostly hidden. 'The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,' concludes Havránek. For a more detailed analysis and technical breakdown of DeceptiveDevelopment, check out the latest ESET Research blogpost, 'DeceptiveDevelopment targets freelance developers,' on Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

North Korea-aligned DeceptiveDevelopment Targets Freelance Developers with Infostealers
North Korea-aligned DeceptiveDevelopment Targets Freelance Developers with Infostealers

Channel Post MEA

time27-02-2025

  • Channel Post MEA

North Korea-aligned DeceptiveDevelopment Targets Freelance Developers with Infostealers

ESET researchers have observed a series of malicious North Korea-aligned activities. The operators, posing as software development recruiters, entice the victims with fake employment offers. Subsequently, they try to serve their targets with software projects that conceal info-stealing malware. ESET Research calls this activity cluster DeceptiveDevelopment. This North Korea-aligned activity is currently not attributed by ESET to any known threat actor. It targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers. 'As part of a fake job interview process, the DeceptiveDevelopment operators ask their targets to take a coding test, such as adding a feature to an existing project, with the files necessary for the task usually hosted on private repositories on GitHub or other similar platforms. Unfortunately for the eager work candidate, these files are trojanized: Once they download and execute the project, the victim's computer gets compromised,' explains ESET researcher Matěj Havránek, who made the discovery and analyzed DeceptiveDevelopment. DeceptiveDevelopment's tactics, techniques, and procedures are similar to several other known North Korea-aligned operations. Operators behind DeceptiveDevelopment target software developers on Windows, Linux, and macOS. They steal cryptocurrency primarily for financial gain, with a possible secondary objective of cyberespionage. To approach their targets, these operators use fake recruiter profiles on social media. The attackers don't distinguish based on geographical location, instead aiming to compromise as many victims as possible to increase the likelihood of successfully extracting funds and information. DeceptiveDevelopment primarily uses two malware families as part of its activities, delivered in two stages. In the first stage, BeaverTail (infostealer, downloader) acts as a simple login stealer, extracting browser databases containing saved logins, and as a downloader for the second stage, InvisibleFerret (infostealer, RAT), which includes spyware and backdoor components, and is also capable of downloading the legitimate AnyDesk remote management and monitoring software for post-compromise activities. In order to pose as recruiters, the attackers copy profiles of existing people or even construct new personas. They then either directly approach their potential victims on job-hunting and freelancing platforms, or post fake job listings there. While some of these profiles are set up by the attackers themselves, others are potentially compromised profiles of real people on the platform, modified by the attackers. Some of the platforms where these interactions occur are generic job-hunting ones, while others focus primarily on cryptocurrency and blockchain projects and are thus more in line with the attackers' goals. The platforms include LinkedIn, Upwork, We Work Remotely, Moonlight, and Crypto Jobs List. Victims receive the project files either directly via file transfer on the site, or through a link to a repository like GitHub, GitLab, or Bitbucket. They are asked to download the files, add features or fix bugs, and report back to the recruiter. Additionally, they are instructed to build and execute the project in order to test it, which is where the initial compromise happens. The attackers often use a clever trick to hide their malicious code: They place it in an otherwise benign component of the project, usually within backend code unrelated to the task given to the developer, where they append it as a single line behind a long comment. This way, it is moved off-screen and stays mostly hidden. 'The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,' concludes Havránek. 0 0

Ukrainska Pravda's YouTube channel is back following massive cyberattack
Ukrainska Pravda's YouTube channel is back following massive cyberattack

Yahoo

time29-01-2025

  • Yahoo

Ukrainska Pravda's YouTube channel is back following massive cyberattack

On 28 January, the editors of the Ukrainska Pravda YouTube channel reported on social media that they had been hacked and lost access. All Ukrainska Pravda videos and the archive are now available to view as usual. The day before, hackers attempted to access editorial servers containing financial documents through remote access via AnyDesk on behalf of the CERT-UA cyber incident response team. "The systematic nature of the online attacks on Ukrainska Pravda's resources may indicate that the hackers' goal is to affect the regularity of publication of high-profile material. We are currently working with experts to strengthen the cyber defence of all our media outlets so that our audiences receive consistent and timely information as usual," said Sevgil Musaieva, editor-in-chief of Ukrainska Pravda. Background: Ukrainska Pravda was attacked on 18 February 2024 and access to the news outlet's official X (Twitter) account was lost. On 24 February 2022, anonymous Telegram channels spread reports that Ukrainska Pravda's main website had been hacked, which was not true. The editorial office would like to remind readers of the importance of digital security and urges everyone to regularly change their passwords to more complex ones and to use two-factor authentication. If you would like to support Ukrainska Pravda, join the Ukrainska Pravda Club. Support UP or become our patron!

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store