Maze Ransomware Operators Leaked 2GB of Financial Data from Bank of Costa Rica (BCR) – Disposable mail news

Bank of Costa Rica (BCR) has been receiving threats from the threat actors behind Maze ransomware who have stolen credit card details from the bank, the ransomware gang started publishing the encrypted financial details this week.

The Banco de Costa Rica is one of the strongest state-owned commercial banks operated in Costa Rica, starting from humble origins of mainly being a private commercial bank, it expanded to become a currency issuer and one of the most renowned baking firms in Central America contributing largely in the financial development of the nation.

The hacker group behind the data leak have demanded a ransom from Banco de Costa Rica at various occasions, however, to their dismay they observed a lack of seriousness in the way the bank dealt with these previous leaks and it served as a primary reason that motivated the latest data leak, according to an interview with Maze ransomware operators.

As per the claims made by the attackers, Banco de Costa Rica’s network remained insecure till February 2020; it was in August 2019 when they first compromised the bank’s network and the second attempt was made in the month of February 2020 to see how the security has been improvised – if at all so.

The 2GB of data published by the Maze ransomware attackers on their leak site contains the details of at least 50 Mastercards and Visa credit cards or debit cards, a few being listed more than once.

As per the statements given by Brett Callow, a threat analyst with Emsisoft to ISMG, “Like other groups, Maze now weaponizes the data it steals,”

“The information is no longer simply published online; it’s used to harm companies’ reputations and attack their business partners and customers.”

“The Maze group is a for-profit criminal enterprise who are out to make a buck,” Callow says. “The credit card information has been posted for one of two reasons: Either to pressure BCR into paying and/or to demonstrate the consequences of non-compliance to their future victims,” Callow further told.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Online education take a boost in lockdown – Disposable mail news

Sandeep Gupta from California, a technology manager is taking an online course in artificial intelligence as a way “to try to future-proof your working life.”

Dr. Robert Davidson, an emergency-room physician from Michigan took up an online master’s degree course in public health.

Online learning has seen a rise in children and college students as a way to keep up with their studies during lockdown but interestingly they are not the only ones to turn to online education. Millions of adults working in various fields have subscribed to online courses as a way to stay ahead and make use of leisure time. This period could mark a renaissance for online learning business.

Coursera, an online learning platform developed by Stanford University saw 10 million new users from March to May, seven times in comparison to last year(according to pace). Other websites like Udacity and edX also saw a jump in users.

 “Crises lead to accelerations, and this is the best chance ever for online learning,” the co-founder and chairman of Udacity, Sebastian Thrun said. 

Coursera, Udacity, and edX were developed as an online learning project a decade ago called massive open online courses (MOOCs) but the experiment was not quite a success as few individuals completed the courses and were largely free.

 MOOCs mission to “democratize education” is now taking shape, earlier when they have launched thousands of students enrolled but hardly few completed the free courses. Though courses that were not free and provided a degree saw more completions and results.

“Active learning works, and social learning works. And you have to understand that teaching online and learning online are skills of their own” said Anant Agarwal, founder, and chief executive of edX.

A few years ago apps like Udacity were on the verge of drowning and their market was slowing down but through treil and error, they learned that these courses need to be focused on skill learning as that’s where the market is and now the popular courses are in tech field like coding, analytics, and AI.

People are turning this lockdown crisis into their advantage by building skills via online learning. As schools and collages tilt towards online education, the paradigm of education is evolving rapidly.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

World’s Top 10 Notorious Female Hackers List 2020 (Updated) – 10 minute mail

Most of us only know Men Hackers. But do you know about Female Hackers? Only a few of us know that there are many and notorious female hackers around the world, and that is why many are surprised to hear that there are a handful of women that have found a place in this world. It remains an evolving, multi-billion dollar industry as some hackers are often blamed for causing irreparable damage while others are simultaneously credited for some of the biggest breakthroughs in technology. These most Hottest Female Hackers in the world can reach several milestones in ethical hacking or black hacking also.

World's Most Hottest Female Hackers Ever on internet - iTechhacks

World’s Most Hottest Female Hackers Ever on internet – iTechhacks

Inside Tech: In short Hacks, Here you going to meet world’s top 10 Hot & Beautiful female hackers and chance to know about them. About their achievements, about their hacking skills and everything that a female hacker done in her life. 

Its Sounds good, So in the case of men you all show no interest but when the talk comes in case of girl hackers you’re very curious to know about them about their lifestyles etc. whether Hacker will be a men or women doesn’t matter because they are doing same things with computer and internet, they play with security daily and find bugs in very popular sites that’s why they are pretty famous on the internet. So today after long research on top Hottest Female Hackers, itechhacks listed top 10 Most Hottest and Beautiful Female Hackers in the World of Hacking. Before going to read about these girl hacker must read about white hackers and black hacker

*. World’s Top 10 White Hat Hackers – All-Time Best

*. World’s Top 10 Best Black Hat Hackers

Meet World’s Top Most Beautiful Female Hackers

Let’s have a look at some of the Hottest, beautiful and notorious female hackers all-time best and the impact they have on the world. As the told you in above No matter what a hacker may be, they are known for their resourcefulness and their knowledge of complexity theory. The girl hackers listed below have been credited with some of the biggest breakthroughs that changed the perception about hacking.

Must Read: Top 10 Best Hacking Movies Must Watch

#1. Adeanna CookeMost Hottest Female Hacker Ever!

Adeanna Cookie Sexiest Female Hackers, beautiful hacker of the world - itechhacks.com
Adeanna Cookie

Adeanna Cooke is a former Playboy model. Adeanna Cooke is famous for her ethical hacking skills and is a self-trained hacker. Her story of being a famous hacker when one of his old friends wanted to make money by placing her face on another body without clothes with a photo montage. But, when she saw the naked photos on some random unauthorized websites, she immediately took the matter in her own hand and hacked the website without informing or asking for help from the authorities.

Adeanna Cookie Hot Female Hacker, Top Girl Hacker, best Girl Hacker Sexiest Female Hackers in the world - itechhacks.com
Adeanna Cooke

After this event, Cooke was named “Hacker Fairy” and found her calling within the hacking industry. She now helps professional models and other women from being taken advantage of online. This incident made her very strong and she becomes a very famous female hacker.

#2. Xiao Tian – China Girl

Xiao Tian -- Sexiest Female Hackers - itechhacks.com
Xiao Tian

Xiao Tian became famous in forming the group “China Girl Security Team”, a group of hackers, especially for women, At The Age of 19, Tian quickly expanded the group to just over 2,200 members, all of which were female girls looking for a community in which they would feel welcome.

This female hacking organization now has ties to some of the most infamous hacking groups throughout the world and has become one of the largest Chinese-based hacking groups.

#3. Anna Chapman.

Anna Chapman Sexiest Female Hackers - itechhacks.com
Anna Chapman – Hottest Female Hackers

Chapman is a Russian hacker who was residing in New York City and was born on February 23, 1982. She arrested in New York city when she was found with nine others under the charge of working for the Illegals Program spy organization under the Russian Federation’s external intelligence agency.Anna-Chapman-hot

As the Anna Chapman alleged guilty to one count of conspiracy to act as an agent of a foreign government without notifying the United States General Attorney and was deported to Russia on July 8, 2010, as part of the treaty exchange of prisoners between the United States and Russia.

#4. Ying Cracker

ying cracker sexiest female hacker
Ying Cracker

Ying Cracker is a professionally Professor at Shanghai, China. We cal her “Most Beautiful Female Hacker” Because she is one of the hacker show teaches student ” How To Start Hacking” and many more like “How To Hack Computer”.When it comes to the world of female hackers, Ying Cracker can be seen as the professor that gives students their first taste of this unique field.

Ying-Cracker Sexiest Female Hackers
Ying Cracker

Since she became popular in a Forum known asChinese Hottie Hackers” where she got a large fan base. She is an expert in hacker software writing and charges good money for courses on simple and for high-end hacking tools.But, the most interesting thing is that her achievements changed her surname to CRACKER. And her name put as Ying Cracker.

#5. Kristina Svechinskaya

Kristina-Svechinskaya hottest » itechhacks sexiest female hackers
Kristina Svechinskaya

The full name of Kristina Svechinskaya is “Kristina Vladimirovna Svechinskaya”, born in the city of Irkutsk. Her name is most popular when we talk about hackers. She hacked many servers of banks and get millions of dollars. As her light blue eyes and her remarkable Russian beauty, made her one of the “Most Hottest Female Hackers ”, when she was arrested in New York, USA, in early October 2010, for being accused of integrating a network of Internet fraud, where malware and viruses, trojans were used to steal $35 million from the several US bank accounts and using false passports.

#6. Joanna Rutkowska

Joanna rutkowska Sexiest Female Hackers
Joanna Rutkowska

Joanna Rutkowska is further proof that not all hackers are bad, and few specialists have done more for operating system security than this notorious hacker. Rutkowska shocked the world in the August 2006 Black Hat Briefing Convention in Las Vegas. In front of a crowd, Rutkowska demonstrated two simple methods for hacking into the Windows Vista beta. She also revealed a Blue Pill technique that allowed her to transfer a running operating system onto a virtual machine well before the worldwide use of virtual machines and virtual servers within the private sector.She continues to give lectures at conferences and works closely with some of the biggest software and hardware designers in the industry including Windows.

#7. Raven Adler

adler Most Sexiest Female Hacker » iTech Hacks

Adler was the first woman to ever present at the DefCon’s hacker conference. She continues to design hack-detecting systems, test and audit hacking detector systems for large federal agencies. She now works as a senior security consultant for a number of companies and continues to give lectures and regularly publish her work in industry magazines.

#8. Gigabyte

Gigabyte iTech Hacks » Tech Hacks Most Sexiest Female Hacker
Gigabyte

Her real name is Kim Vanvaeck. Gigabyte was born and brought up in Belgium.While many of the top female hackers are known for their legal work within the security sector, Gigabyte is on the opposite end of the spectrum.Recently, Vanvaeck was arrested just outside of her hometown of Mechelon near Brussels but was released within 24 hours on bail. She is currently accused of stealing and destroying private data and is facing 3 years in prison and over 100,000 Euros in fines.

#9. Natasha Grigori

Natasha GriGori Sexiest Female Hackers
Natasha Grigori

Grigori started her career as a hacker in the 1980s but she did not receive fame until the early 1990s with a bulletin-board website for amateur programmers and hackers. With this site, she helped others share, release, and hack various forms of software. One of Grigori’s largest projects was centred on software that will automatically glean information from tens of thousands of suspected URLs and track those that are sending and receiving data with those websites. Unfortunately, Natasha Grigori lost her battle with severe illness on November 11, 2005, but ACPO has been left behind as a viable and effective organization that continues to operate today.

#10. Jude Milhon

Sexiest Female Hackers
Jude Milhon Female Hacker

Jude Milhon started her career as a computer programmer in 1967 only to later form a hacking group known as Cyberpunks. She was also a member of Computer Professionals for Social Responsibility. Throughout her life she wrote several books as well as contributed to a number of magazines within both the hacking industry and the computer programming industry.

You Must Like This:

*. Top 10 Best Hacking Tools for Hackers

*. Top 15 Best General Knowledge Android Apps

*. Top 10 Best Grey Hat Hackers

Final Words:

You can read more stories and tales of these beautiful girl hackers from outer source.So above is the big list of World’s Beautiful, Hottest and Most Hottest Female Hackers. i know you like them very much. Please Don’t forget to share these Beautiful hackers with your friends. Stay Connected for more latest updates through tech hacks.

Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

From Agent.BTZ to ComRAT v4: A ten‑year journey – 10 minute mail

Turla has updated its ComRAT backdoor and now uses the Gmail web interface for Command and Control

ESET researchers have found a new version of one of the oldest malware families run by the Turla group, ComRAT. Turla, also known as Snake, is an infamous espionage group that has been active for more than ten years. We have previously described many campaigns attributed to this group.

ComRAT, also known as Agent.BTZ and to its developers as Chinch, is a Remote Access Trojan (RAT) that became infamous after its use in a breach of the US military in 2008. The first version of this malware, likely released in 2007, exhibited worm capabilities by spreading through removable drives. From 2007 to 2012, two new major versions of the RAT were released. Interestingly, both employed the well-known Turla XOR key:

1dM3uu4j7Fw4sjnbcwlDqet4F7JyuUi4m5Imnxl1pzxI6as80cbLnmz54cs5Ldn4ri3do5L6gs923HL34x2f5cvd0fk6c1a0s

Until mid-2017, the Turla developers made a few changes to ComRAT, but these variants were apparently still derived from the same code base.

Then, in 2017, we noticed that a very different version of ComRAT had been released. This new version used a completely new code base and was far more complex than its predecessors. Here are the main characteristics of this malware family:

  • ComRAT v4 was first seen in 2017 and known still to be in use as recently as January 2020.
  • We identified at least three targets: two Ministries of Foreign Affairs and a national parliament.
  • ComRAT was used to exfiltrate sensitive documents. The operators used public cloud services such as OneDrive and 4shared to exfiltrate data.
  • ComRAT is a complex backdoor developed in C++.
  • ComRAT uses a Virtual FAT16 File System formatted in FAT16.
  • ComRAT is deployed using existing access methods, such as the PowerStallion PowerShell backdoor.
  • ComRAT has two Command and Control channels
    • HTTP: It uses exactly the same protocol as ComRAT v3
    • Email: It uses the Gmail web interface to receive commands and exfiltrate data
  • ComRAT can perform many actions on the compromised computers, such as executing additional programs or exfiltrating files.

Attribution to Turla

Based on the victimology and the TTPs, we believe that ComRAT is used exclusively by Turla. There are a few elements linking ComRAT v4 to Turla:

  • It uses the same internal name, Chinch, as the previous versions
  • It uses the same custom C&C protocol over HTTP as ComRAT v3
  • A part of the network infrastructure is shared with another Turla malware family, Mosquito
  • It was dropped by, or has dropped other, Turla malware families:
    • A customized PowerShell loader
    • The PowerStallion backdoor
    • The RPC backdoor

Insight into attacker’s activity

During our investigation, we were able to gain insights about what Turla operators were doing on the compromised machines.

The main use of ComRAT is stealing confidential documents. In one case, its operators even deployed a .NET executable to interact with the victim’s central MS SQL Server database containing the organization’s documents. Figure 1 is the redacted SQL command.

Figure 1. SQL command to dump documents from the central database (partially redacted)

These documents were then compressed and exfiltrated to a cloud storage provider such as OneDrive or 4shared. Cloud storage is mounted using the net use command as shown in Figure 2.

Figure 2. Command to mount a OneDrive folder using net use (partially redacted)

In addition to document stealing, the operators also run many commands to gather information about the Active Directory groups or users, the network, or Microsoft Windows configurations such as the group policies. Figure 3 is a list of commands executed by Turla operators.

Figure 3. Basic recon of the compromised machine

Finally, we also noticed that Turla operators are aware of and try to evade security software. For instance, they regularly exfiltrate security-related log files in order to understand whether their malware samples have been detected. This shows the level of sophistication of this group and its intention to stay on the same machines for a long time.

Technical analysis

According to its compilation timestamp, which is likely genuine, the first known sample of ComRAT v4 was compiled in April 2017. The most recent iteration of the backdoor we’ve seen was, to the best of our knowledge, compiled in November 2019.

Based on ESET telemetry, we believe that ComRAT is installed using an existing foothold such as compromised credentials or via another Turla backdoor. For instance, we’ve seen ComRAT installed by PowerStallion, their PowerShell-based backdoor we described in 2019.

The ComRAT installer is a PowerShell script that creates a Windows scheduled task and fills a Registry value with the encrypted payload.

ComRAT v4 has several components:

  • an orchestrator, injected into explorer.exe. It controls most of ComRAT functions including the execution of backdoor commands.
  • a communication module (a DLL), injected into the default browser by the orchestrator. It communicates with the orchestrator using a named pipe.
  • a Virtual FAT16 File System, containing the configuration and the logs files.

Figure 4 is an overview of ComRAT’s architecture.

Figure 4. Summary of ComRAT architecture

ComRAT v4 has two different C&C channels: HTTP (known internally as legacy), which (surprise surprise) uses the HTTP protocol, and email (known internally as mail), which uses the Gmail web interface.

In the latter mode and using cookies stored in the configuration, it connects to the Gmail web interface in order to check the inbox and download specific mail attachments that contain encrypted commands. These commands are sent by the malware operators from another address, generally hosted on a different free email provider such as GMX.

A detailed technical analysis of all ComRAT’s components is available in the white paper.

Conclusion

ComRAT v4 is a totally revamped malware family released in 2017. Its developers took inspiration from other Turla backdoors, such as Snake, to build a very complex piece of malware.

Its most interesting feature is the use of the Gmail web UI to receive commands and exfiltrate data. Thus, it is able to bypass some security controls because it doesn’t rely on any malicious domain. We also noticed that this new version abandoned the use of COM object hijacking for persistence, the method that gave the malware its common name.

We found indications that ComRAT v4 was still in use at the beginning of 2020, showing that the Turla group is still very active and a major threat for diplomats and militaries.

A full and comprehensive list of Indicators of Compromise (IoCs) and samples can be found in the full white paper and in our GitHub repository.

For a detailed analysis of the backdoor, refer to our white paper. For any inquiries, or to make sample submissions related to the subject, contact us at [email protected].

MITRE ATT&CK techniques

Tactic Id Name Description
Execution T1086 PowerShell A PowerShell script is used to install ComRAT.
Persistence T1053 Scheduled Task ComRAT uses a scheduled task to launch its PowerShell loader.
Defense Evasion T1027 Obfuscated Files or Information The ComRAT orchestrator is stored encrypted and only decrypted at execution.
T1055 Process Injection The ComRAT orchestrator is injected into explorer.exe . The communication DLL is injected into the default browser.
T1112 Modify Registry The ComRAT orchestrator is stored encrypted in the Registry.
Discovery T1016 System Network Configuration Discovery Operators execute ipconfig and nbstat .
T1033 System Owner/User Discovery Operators execute net user .
T1069 Permission Groups Discovery Operators execute net group /domain .
T1082 System Information Discovery Operators execute systeminfo .
T1083 File and Directory Discovery Operators list the content of several directories. Example: dir /og-d “%userprofile%AppDataRoamingMicrosoftWindowsRecent*.*” .
T1087 Account Discovery Operators execute net user and net group .
T1120 Peripheral Device Discovery Operators execute fsutil fsinfo drives to list the connected drives.
T1135 Network Share Discovery Operators execute net view .
Collection T1213 Data from Information Repositories The Operators use a custom tool to exfiltrate documents from an internal central database.
Command and Control T1024 Custom Cryptographic Protocol ComRAT uses RSA and AES to encrypt C&C data.
T1043 Commonly Used Port ComRAT uses ports 80 and 443.
T1071 Standard Application Layer Protocol ComRAT uses HTTP and HTTPS.
T1102 Web Service ComRAT can be controlled via the Gmail web UI.
Exfiltration T1002 Data Compressed The documents are compressed in a RAR archive.
T1022 Data Encrypted The RAR archive is encrypted with a password.
T1048 Exfiltration Over Alternative Protocol Data is exfiltrated to cloud storage, mounted locally using the net use command.



Matthieu Faou


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Crooks threaten to leak customer data stolen from e‑commerce sites – 10 minute mail

A hack-and-extort campaign takes aim at poorly secured databases replete with customer information that can be exploited for further attacks

A number of e-commerce websites from multiple continents have had their customer databases stolen as an unknown seller is offering at least 1.62 million rows of personal records for sale on a public website. The online stores – based in Germany, the United States, Brazil, Italy, India, Spain, and Belarus – have also received ransom notes, with the cybercriminals threatening to release the data if the retailers don’t pay up within 10 days.

According to BleepingComputer – which broke the story and listed some of the hacked merchants – the loot may actually be far larger than what has been put up for sale. The siphoned information varies depending on the ransacked retailer and includes email addresses, hashed passwords, postal addresses, gender and dates of birth.

Cybercriminals can use this Personally Identifiable Information (PII) for all manner of nefarious activities, including identity theft or targeted phishing attacks. The least you as a customer can do is to change your password on the site(s) and keep an eye out for suspicious emails.

It remains unclear who the thieves are, but apparently they targeted unsecured or ill-secured servers that can be found on the public web. They copied the stores’ SQL databases and now demand a ransom of 0.06 bitcoin (some US$537 at today’s rate) within 10 days on pain of publishing or using the data as they see fit.

The attackers also offer unspecified proof, which one might assume is a sample of the data. Some of the shops may have taken them up on their word, since the hackers’ BTC wallets have recently recorded transactions amounting to 5.8 bitcoin (approximately US$52,000).

Speaking of which, paying the ransom to a cybercriminal may prove to be a leap of faith, since you have no way of knowing if they won’t sell your data onwards even if they return it. Ransomware victims may face a similar conundrum, as discussed in this article.

BleepingComputer estimates that around 31 stolen databases have been put up for sale. Based on the number of abuse reports filed against the hackers’ bitcoin addresses, the site believes it to be just a fraction of the overall number. The most recent database is from March and each listing contains a sample of the data, so that potential buyers can check the wares.

Given the wealth of personal data that they may store on their customers, e-commerce sites pose a juicy target for bad actors. Hack-and-extort campaigns, meanwhile, are by no means a novel approach and high-profile incidents have affected, for example, well-known names in the entertainment industry, including HBO in 2017. Just days ago, an entertainment law firm also fell victim to a similar attack.



Amer Owaida


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

(Working) Couchtuner Alternatives of 2020 – 10 minute mail

Couchtuner: Undoubtedly, Couch Tuner is one of the best sites to stream video online for FREE. But, The movies and content available in the couchtuner euphoria site are not as broad as other sites are providing. However, there are various similar sites like couch tuner available on the internet. So let’s have a look at these CouchTuner Streaming Series Alternatives of 2020.

Top 5 Sites like Couch Tuner: Alternatives To Couch Tuner

Alternatives To CouchTuner

The Internet is one of the finest media for movies and TV series lovers. Internet of these days has had the most amazing impacts on almost all aspects of our life, such as creating a new world of communities and enabling people to access all kinds of information and services on the scale.

In other words, we can say that people can access almost everything through the internet. One such interesting service provided by the internet to its users is called online streaming TV. Before we got a huge response on Best Free Movie Streaming and Downloading Websites and One such useful website which offers this facility to the Internet users if known as CouchTuner. Below, we have explained more about this website in brief.

Is CouchTuner safe?

People of these days are familiar with online TVs, and Couch Tuner resembles the same. Couch tuner is one of the leading online movie streaming sites. Most of the people love to watch new movies and TV shows on this website.

If you are one among them, then you may come across most of the sites like CouchTuner. Who would not love to watch the new movies and TV series for free? Thus, CouchTuner has grabbed people’s attention and has become quite popular.

Also Read: Top 10 Best Alternatives to Coke and Popcorn 2020

Movie, TV, and Web series:

With the help of some sites like CouchTuner, people can easily search for their new movies and TV series. Some people would love to watch new movies, whereas some would like to watch TV series. The reason behind the popularity of sites like CouchTuner to watch TV series is that the people of these days are running beyond the hectic life schedule, and they do not find time to watch the TV series.

This option paves the way for those people. The continuity is the most important factor when it comes to watching TV series, and one can access this through the online TV series. Even though we have many options with the Couch Tuner, some would need to have wide alternatives. Thus, we have come up with the list of some of the best websites which can replace Couch Tuner.

Is CouchTuner Down?

Yes, Couchtuner is down. But you can check its all working alternatives inorder to stream high-quality content.

Also Read: Top 7 Best Alternatives to Photoshop Free Of 2020


#1 Hulu:

How To Get Free Hulu Plus Account & Get Free Access
How To Get Free Hulu Plus Account & Get Free Access

According to the research, Hulu has considered the greatest place for the people who would like to enjoy watching online TV series. This easy platform brings many latest TV shows and movies including classic shows. One can simply enjoy watching the movies with HD prints without interruption of Ads. You can also access Hulu accounts for free.

#2 Alluc:

Is Alluc.ee Dead? Top 15 Alluc.ee Alternatives

We can simply name Alluc as the best place to find new movies at a faster rate. This place always brings the links to the best sources that allow everyone to watch many movies. If you are in need of watching movies that are still in the theater, you can even get it here. Browse for amazing new movies here to get started.

Also Read: Is Alluc.ee Dead? Top 15 Alluc.ee Alternatives

#3 Putlocker:

The best alternative of couch tuner. If you are searching for movies from some places like Couch Tuner, it is also better to look into Putlocker. Once you wish to watch movies in Putlocker, you can simply click to the link and start watching into it. There is no need of creating an account, and you will not interrupt with stupid advertisements.

#4 The Dare TV:

This alternative brings you almost all TV series. We can simply mention this as the best medium for TV series lovers.

Likewise, one can own up to many alternatives to the CouchTuner. Once you do not have leisure time to watch new movies in the theater, you can simply click a link and start watching movies wherever you are. CouchTuner.eu

Last but not least, This big online streaming giant comes into play after all these sites. You can access Netflix free accounts and enjoy the premium Netflix shows a lifetime.

#6 Solar Movie

SOLAR MOVIES
SOLAR MOVIES

One of the most popular alternatives to CouchTuner is Solar Movie. On Solar Movie website, you will get a huge list of movies and TV Shows of all types. The User Interface of the site is well-designed and is very simple to use. You need to register on the website and you can rate movies and TV Shows. One can save their favourite movies to watch it later. Using this website to watch movies is completely free, you don’t need to pay any money. No personal information is needed while you use the site for the first time. All the content on Solar Movie website is provided by third parties.

VISIT SOLAR MOVIE WEBSITE

#7 Prime Wire

PrimeWire
PrimeWire

Primewire website is the best online streaming site where the user can watch all the latest movies for free. Yes, the website is free to use and it won’t ask any money. You can choose the video resolutions as multiple options are available. All the users of Primewire website rate the individual mirrors which are based on the quality. It is good if you create a user account on this site before you use. Once you create an account read the guide on the screen and watch movies online.

VISIT PRIME WIRE WEBSITE

#8 AZ Movies

AZ Movies website has the collection of so many movies which also has oldest movie from the year 1915 and the movie was directed by Charlie Chaplin. However, the site looks like paid streaming service, but actually, the website is free to use. A group of Movie and TV Show runs this site who wants to share movies and shows with everyone. It is an interesting site to watch movies.

VISIT AZ MOVIES WEBSITE

#9 Movie Watcher

A Free movie streaming site where the user can watch movies and TV Shows online for free. You don’t need to register to use this site. Movie Watcher has different genres of movies like action, adventure, animation, comedy, biography, drama, comedy, Romantic, news, horror, musical, mystery, thriller, war, western and much more. Almost everything is there on the Movie Watcher website for everyone. So, you don’t need to go anywhere else to find any type of movie.

VISIT MOVIE WATCHER WEBSITE

#10 New Episodes

In the name itself, you can see, NEW Episodes, so it is obvious that this website has all the new episodes of the most popular TV Shows. All the episodes come here after a minute they air on TV. New Episodes website shows all the TV Shows which are aired in the week. The user can also search for TV Shows using the search bar. It has an active forum section.

VISIT NEW EPISODES WEBSITE

#11 Daily TV Fix

If you are a big fan of TV Shows, then Daily TV Fix website is the best online streaming site to get your daily shows. On this site, you will get all the latest movies and also TV Shows. Search for any content by the name or using the search filter and watch it. On the homepage, you will see all the newly added TV Shows episodes and also movies which are recently updated. Daily TV Fix updates the content regularly so it is good. There is an active forum section available on the site, where one can discuss about their favourite TV Shows, movies and can also make a request with one another.

VISIT DAILY TV FIX WEBSITE

Also Read: Top 5 Best Alternatives to Showbox 2020

Conclusion:

This is all you need to know about CouchTuner and all the alternatives to couchtuner 2020 You can try them out and know which one suits you the best. It is highly unlike for any of them to disappoint you with their performance. If you have any queries, then please let us know about them in the comments section below. Cheers 🙂 couchtuner chernobyl

Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

The Blue Mockingbird Malware Group Exploits Vulnerabilities in Organizations’ Networks – Disposable mail news

Another notorious crypto-currency mining malware has surfaced which allegedly has been infecting the systems of countless organizations. The group with the control of operations goes by the code name of “Blue Mockingbird”.

The researchers who discovered it have reasons to believe that the Blue Mockingbird has been active since 2019’s last month. Per them, it also targets “public-facing servers” that run “ASP.NET” apps that use the “Telerik framework” for their User Interface (UI) aspect.

Reportedly, the vulnerability that the hackers exploit in the process is the “CVE-2019-18395” vulnerability which is then employed to embed a web shell on the target’s server. Per the same report, later on they employ a version of “the Juicy Potato technique” to obtain the admin-access and alter the server settings to get access to the “(re)boot persistence”.

After having obtained complete access to a system, sources mention, the malware group installs a version of XMRRig which is a famous crypto-currency mining application particularly for the “Monero (XMR)” crypto-currency.

As per reports, if the public-facing IIS servers are linked with a company’s internal network, the malware group has a probability of trying to expand internally through an improperly-secured Server Message Block (SMB) connections or Remote Desktop Protocol ((RDP).

The exact number of infections that the botnet has caused isn’t all too clear but if an estimate was to be made the operations include 1,000 infections at the least. There also doesn’t seem to be a way to find the intensity of the threat.

Not many organizations out of the ones that were being observed by the researchers have been hit with this particular threat. And over a really little amount of time that they were tracked the above-mentioned number of infections surfaced.

Nevertheless, all companies alike are susceptible to this attack, even the ones that think they are safe and the number of infections could be more than estimated.

As per sources, the Telerik UI component which is allegedly vulnerable is a part of ASP.NET applications that run on their latest versions, even then the Telerik component may have versions that are out-dated but harmful to organizations, nonetheless. This component could exist in the applications used by a company and they might not even know about it leaving them endangered.

The Telerik UI CVE-2019-18935 vulnerability, per reports, has been widely let known as the one that is employed to embed web shells on servers. Another mentioned that this vulnerability is the most exploited and organizations need to better their firewalls to fight it. If for some reason the organizations don’t happen to have a web firewall they could always look for warning precursors in the server and workstation, reports cite.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Spam and phishing in Q1 2020 – 10 minute mail

Quarterly highlights

Don’t get burned

Burning Man is one of the most eagerly awaited events among fans of spectacular performance and installation art. The main obstacle to attending is the price of admission: a standard ticket will set you back $475, the number is limited, and the buying process is a challenge all by itself (there are several stages, registration data must be entered at a specific time, and if something goes wrong you might not get a second chance). Therefore, half-price fake tickets make for excellent bait.

Scammers tried to make their website as close as possible to the original — even the page with the ticket description looked genuine.

There were just three major differences from the original: only the main page and the ticket purchase section were actually operational, tickets were “sold” without prior registration, and the price was a steal ($225 versus $475).

Oscar-winning scammers

February 2020 saw the 92nd Academy Awards ceremony. Even before the big night, websites were popping up offering free viewings of all the nominated films. Fraudsters targeted users eager to see the short-listed movies before the presentation of the awards.

To promote these sites, Twitter accounts were created — one for each nominated film.

Curious users were invited to visit the resource, where they were shown the first few minutes before being asked to register to continue watching.

During registration, the victim was prompted to enter their bank card details, allegedly to confirm their region of residence. Unsurprisingly, a short while later a certain amount of money disappeared from their account, and the movie did not resume.

Users should be alert to the use of short links in posts on social networks. Scammers often use them because it’s impossible to see where a shortened URL points without actually following it.

There are special services that let you check what lies behind such links, often with an additional bonus in the form of a verdict on the safety of the website content. It is important to do a proper check on links from untrusted sources.

ID for hire

US companies that leak customer data can be heavily fined by the Federal Trade Commission (FTC). For example, in 2019 Facebook was slapped with a $5 billion penalty; however, users whose data got stolen do not receive any compensation. This is what scammers decided to exploit by sending a fake e-mail offering compensation from the non-existent Personal Data Protection Fund, created by the equally fictitious US Trading Commission.

Inspired by the idea of services for checking accounts for leaks, the cybercriminals decided to create their own. Visitors were invited to check whether their account details had been stolen, and if so (the answer was “yes” even if the input was gibberish), they were promised compensation “for the leakage of personal data.”

To receive “compensation,” the victim’s citizenship was of no consequence — what mattered was their first name, last name, phone number, and social network accounts. For extra authenticity, a warning message about the serious consequences of using other people’s data to claim compensation popped up obsessively on the page.

To receive the payment, US citizens were asked to enter their Social Security Number (SSN). Everyone else had to check the box next to the words “I’am don’t have SSN” (the mistakes are a good indicator of a fake), whereupon they were invited to “rent” an SSN for $9. Interestingly, even if the user already had an SSN, they were still pestered to get another one.

After that, the potential victim was redirected to a payment page with the amount and currency based on the user’s location. For instance, users in Russia were asked to pay in rubles.

The scam deployed the conventional scheme (especially common in the Runet) of asking the victim to pay a small commission or down payment for the promise of something much bigger. In Q1, 14,725,643 attempts to redirect users to such websites were blocked.

Disaster and pandemic

Fires in Australia

The natural disaster that hit the Australian continent was another get-rich opportunity for scammers. For example, one “Nigerian prince”-style e-mail scam reported that a millionaire dying of cancer was ready to donate her money to save the Australian forests. The victim was asked to help withdraw the funds from the dying woman’s account by paying a fee or making a small contribution to pay for the services of a lawyer, for which they would be rewarded handsomely at a later date.

Besides the fictional millionaire, other “nature lovers” were keen to help out — their e-mails were more concise, but the scheme was essentially the same.

COVID-19

“Nigerian prince” scheme

COVID-19 was (and continues to be) a boon to scammers: non-existent philanthropists and dying millionaires are popping up everywhere offering rewards for help to withdraw funds supposedly for humanitarian purpsoses. Some recipients were even invited to help finance the production of a miracle vaccine, or take part in a charity lottery, the proceeds of which, it was said, would be distributed to poor people affected by the pandemic.

Bitcoin for coronavirus

Having introduced themselves as members of a healthcare organization, the scammers appealed to the victim to transfer a certain sum to the Bitcoin wallet specified in the message. The donation would allegedly go toward fighting the coronavirus outbreak and developing a vaccine, as well as helping victims of the pandemic.

In one e-mail, the attackers played on people’s fear of contracting COVID-19: the message was from an unnamed “neighbor” claiming to be dying from the virus and threatening to infect the recipient unless the latter paid a ransom (which, it was said, would help provide a comfortable old age for the ransomer’s parents).

Dangerous advice from the WHO

One fraudulent mailing disguised as a WHO newsletter offered tips about staying safe from COVID-19.

To get the information, the recipient had to click a link pointing to a fake WHO website. The design was so close to the original that only the URL gave away the scam. The cybercriminals were after login credentials for accounts on the official WHO site. Whereas in the first mailings only a username and password were asked for, in later ones a phone number was also requested.

In addition, we detected several e-mails supposedly from the WHO containing documents with malware. The recipient was asked to open the attachment (in DOC or PDF format), which allegedly offered coronavirus prevention advice. For example, this message contained Backdoor.Win32.Androm.tvmf:

There were other, less elaborate mailings with harmful attachments, including ones containing Trojan-Spy.Win32.Noon.gen:

 

Corporate segment

The coronavirus topic was also exploited in attacks on the corporate sector. For example, COVID-19 was cited in fraudulent e-mails as a reason for delayed shipments or the need to reorder. The authors marked the e-mails as urgent and required to check attached files immediately.

Another mailing prompted recipients to check whether their company was in a list of firms whose activities were suspended due to the pandemic. After which it asked for a form to be filled out, otherwise the company could be shut down. Both the list of companies and the form were allegedly in the archives attached to the message. In actual fact, the attachments contained Trojan-PSW.MSIL.Agensla.a:

We also registered a phishing attack on corporate users. On a fake page, visitors were invited to monitor the coronavirus situation across the world using a special resource, for which the username and password of the victim’s corporate mail account were required.

Government compensation

The introduction of measures to counter the pandemic put many people in a difficult financial situation. Forced downtime in many industries has had a negative impact on financial well-being. In this climate, websites offering compensation from the government pose a particular danger.

One such popular scheme was highlighted by a colleague of ours from Brazil. A WhatsApp messages about financial or food assistance were sent that appeared to come from a supermarket, bank, or government department. To receive the aid, the victim had to fill out the attached form and share the message with a certain number of contacts. After the form was filled out, the data was sent to the cybercriminals, while the victim got redirected to a page with advertising, a phishing site, a site offering a paid SMS subscription, or similar.

Given that the number of fake sites offering government handouts seems likely only to increase, we urge caution when it comes to promises of compensation or material assistance.

Anti-coronavirus protection with home delivery

Due to the pandemic, demand for antiseptics and antiviral agents has spiked. We registered a large number of mailings with offers to buy antibacterial masks.

In Latin America, WhatsApp mass messages were used to invite people to take part in a prize draw for hand sanitizer products from the brewing company Ambev. The company has indeed started making antiseptics and hand gel, but exclusively for public hospitals, so the giveaway was evidently the work of fraudsters.

The number of fake sites offering folk remedies for the treatment of coronavirus, drugs to strengthen the immune system, and non-contact thermometers and test kits has also risen sharply. Most of the products on offer have no kind of certification whatsoever.

On average, the daily share of e-mails mentioning COVID-19 in Q1 amounted to around 6% of all junk traffic. More than 50% of coronavirus-related spam was in the English language. We anticipate that the number of phishing sites and pandemic-related scams will only increase, and that cybercriminals will use new attack schemes and strategies.

Statistics: spam

Proportion of spam in mail traffic

Proportion of spam in global mail traffic, Q4 2019 – Q1 2020 (download)

In Q1 2020, the largest share of spam was recorded in January (55.76%). The average percentage of spam in global mail traffic was 54.61%, down 1.58 p.p. against the previous reporting period.

Proportion of spam in Runet mail traffic, Q4 2019 – Q1 2020 (download)

In Q1, the share of spam in Runet traffic (the Russian segment of the Internet) likewise peaked in January (52.08%). At the same time, the average indicator, as in Q4 2019, remains slightly lower than the global average (by 3.20 p.p.).

Sources of spam by country

 

Sources of spam by country, Q1 2020 (download)

In Q1 2020, Russia led the TOP 5 countries by amount of outgoing spam. It accounted for 20.74% of all junk traffic. In second place came the US (9.64%), followed by Germany (9.41%) just 0.23 p.p. behind. Fourth place goes to France (6.29%) and fifth to China (5.22%), which is usually a TOP 3 spam source.

Brazil (3.56%) and the Netherlands (3.38%) took sixth and seventh positions, respectively, followed by Vietnam (2.55%), with Spain (2.34%) and Poland (2.21%) close on its heels in ninth and tenth.

Spam e-mail size

 

Spam e-mail size, Q4 2019 – Q1 2020 (download)

Compared to Q4 2019, the share of very small e-mails (up to 2 KB) in Q1 2020 fell by more than 6 p.p. and amounted to 59.90%. The proportion of e-mails sized 5-10 KB grew slightly (by 0.72 p.p.) against the previous quarter to 5.56%.

Meanwhile, the share of 10-20 KB e-mails climbed by 3.32 p.p. to 6.36%. The number of large e-mails (100–200 KB) also posted growth (+2.70 p.p.). Their slice in Q1 2020 was 4.50%.

Malicious attachments in e-mail

 

Number of Mail Anti-Virus triggerings, Q4 2019 – Q1 2020 (download)

In Q1 2020, our security solutions detected a total of 49,562,670 malicious e-mail attachments, which is almost identical to the figure for the last reporting period (there were just 314,862 more malicious attachments detected in Q4 2019).

TOP 10 malicious attachments in mail traffic, Q1 2020 (download)

In Q1, first place in terms of prevalence in mail traffic went to Trojan.Win32.Agentb.gen (12.35%), followed by Exploit.MSOffice.CVE-2017-11882.gen (7.94%) in second and Worm.Win32.WBVB.vam (4.19%) in third.

TOP 10 malicious families in mail traffic, Q1 2020 (download)

As regards malware families, the most widespread this quarter was Trojan.Win32.Agentb (12.51%), with Exploit.MSOffice.CVE-2017-11882 (7.98%), whose members exploit a vulnerability in Microsoft Equation Editor, in second place and Worm.Win32.wbvb (4.65%) in third.

Countries targeted by malicious mailshots

 

Distribution of Mail Anti-Virus triggerings by country, Q1 2020 (download)

First place by number of Mail Anti-Virus triggerings in Q1 2020 was claimed by Spain. This country accounted for 9.66% of all users of Kaspersky security solutions who encountered e-mail malware worldwide. Second place went to Germany (8.53%), and Russia (6.26%) took bronze.

Statistics: phishing

In Q1 2020, the Anti-Phishing system prevented 119,115,577 attempts to redirect users to scam websites. The percentage of unique attacked users was 8.80% of the total number of users of Kaspersky products in the world.

Attack geography

The country with the largest proportion of users attacked by phishers, not for the first time, was Venezuela (20.53%).

Geography of phishing attacks, Q1 2020 (download)

In second place, by a margin of 5.58 p.p., was Brazil (14.95%), another country that is no stranger to the TOP 3. Next came Australia (13.71%), trailing by just 1.24 p.p.

Country %*
Venezuela 20.53%
Brazil 14.95%
Australia 13.71%
Portugal 12.98%
Algeria 12.12%
France 11.71%
Honduras 11.62%
Greece 11.58%
Myanmar 11.54%
Tunisia 11.53%

* Share of users on whose computers Anti-Phishing was triggered out of all Kaspersky users in the country

Organizations under attack

The rating of attacks by phishers on different categories of organizations is based on detections by Kaspersky products Anti-Phishing component. This component detects pages with phishing content that the user gets redirected to. It does not matter whether the redirect is the result of clicking a link in a phishing e-mail or in a message on a social network, or the result of a malicious program activity. When the component is triggered, a banner is displayed in the browser warning the user about a potential threat.

The largest share of phishing attacks in Q1 2020 fell to the Online Stores category (18.12%). Second place went to Global Internet Portals (16.44%), while Social Networks (13.07%) came in third.

Distribution of organizations affected by phishing attacks by category, Q1 2020 (download)

As for the Banks category, a TOP 3 veteran, this time it placed fourth with 10.95%.

Conclusion

Glancing at the results of Q1 2020, we anticipate that the COVID-19 topic will continue to be actively used by cybercriminals for the foreseeable future. To attract potential victims, the pandemic will be mentioned even on “standard” fake pages and in spam mailings.

The topic is also used extensively in fraudulent schemes offering compensation and material assistance.

It is highly likely that this type of fraud will become more frequent.

The average share of spam in global mail traffic (54.61%) this quarter decreased by 1.58 p.p. against the previous reporting period, while the number of attempted redirects totaled nearly 120 million.

Top of this quarter’s list of spam-source countries is Russia, with a share of 20.74%. Our security solutions blocked 49,562,670 malicious mail attachments, while the most common mail-based malware family, with a 12.35% share of mail traffic, was Trojan.Win32.Agentb.gen.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Russian experts assessed the level of protection of corporate data from hacker attacks – Disposable mail news

Even a low-skilled hacker can hack the internal network of global companies. An experienced attacker will not need more than half an hour to penetrate the local network. Such conclusions were made by experts from Positive Technologies in their research.

“It took an average of four days to penetrate the local network, and at least 30 minutes. In most cases, the complexity of the attack was estimated as low, that is, a low-skilled hacker who possesses only basic skills could also carry it out,” said experts.

Positive Technologies experts analyzed information dated 2019 on the protection of corporate information systems of 28 companies from external intruders and pentest (the penetration test). As part of external pentests, specialists managed to penetrate the local networks of 93% of organizations. In some cases, there were several ways to overcome network protection.

According to experts, every sixth company showed signs of hacker attacks, malicious links on official sites or valid accounts in public leak databases. Based on this, the researchers concluded that the company’s IT infrastructure could be controlled by hackers.

Specialists advise companies for protection, first, to follow the General principles of information security: regularly check their information resources available for external connection, as well as develop strict rules for corporate password policy and monitor their implementation. In addition, they recommend regularly updating the security settings for operating systems and installing the latest versions of software products.

Recall that, according to Kaspersky Lab, in April, the number of attacks on the infrastructure of Russian organizations whose employees work remotely exceeded 18 million, which is five times more than in February. Positive Technologies found that up to 48% of the passwords of employees of organizations is made up of a combination of a word indicating the time of the year or month and four digits indicating the year.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Two years later, has GDPR fulfilled its promise? – 10 minute mail

Has the landmark law helped build a culture of privacy in organizations and have consumers become more wary of sharing their personal data?

“Relying on the government to protect your privacy is like asking a peeping Tom to install your window blinds” – John Perry Barlow, EFF (July 1992).

Any individual who has the slightest engagement in the privacy of their personal data online will likely be sympathetic to Barlow’s quote. It’s been 2 years since the implementation of the General Data Protection Regulation (GDPR), the EU’s data protection and privacy regulation which aimed to give control to individuals over their personal data and to simplify the requirements on businesses.

Are there fewer data breaches? Are companies taking privacy and consent more seriously? Do individuals engage in the protection of their personal information more? It’s difficult to answer the question of whether GDPR has been successful as we don’t know what would have been the state of play if the data protection regulation it succeeded was still in place.

Without doubt, though, the global privacy landscape changed with GDPR. The legislation placed the privacy conversation front and center in capitals and board rooms around the world. There are now in excess of 100 countries and states with individual privacy regulations, some more strict than others, and some of them, such as Argentina, Brazil, Chile, Japan, Kenya, South Korea and California, have clearly taken GDPR as a base model for their own legislation.

The growing number of regulations around the world demonstrates both the need and the willingness of governing bodies to step in, but with the growing number a complexity is created, something I discussed in a recent blogpost. The complexities of so many regulations probably mean that companies will look to harmonize their approach to privacy to comply with the majority and have a defensible position should they inadvertently breach a regulation.

Corporations, I am sure, have taken heed as regulators tasked with enforcing the GDPR started flexing their muscles and issuing fines or giving notice of intended fines. The first major fine, of €50 million (US$54 million), was issued in January 2019 to Google by the French data protection authority CNIL for showing insufficient control, consent and transparency over the use of personal data for behavioral advertising.

This was eclipsed by a mammoth £183 million (US$221 million) fine issued by the British Information Commissioner’s Office (ICO) against British Airways in July 2019 for poor security that resulted in a malicious attack that affected 380,000 website transactions. In comparison, Facebook was fined a mere £500,000 (US$605,000) by the ICO regarding the Cambridge Analytica scandal, which happened shortly before the implementation of GDPR and was the maximum fine at the time.

What’s the law got to do with it?

As a consumer, if you are in a country where privacy legislation has taken a similar approach to the GDPR, you will be used to seeing the numerous consent dialogues that companies are now required to display when collecting your personal data. The bold position of requiring opt-in consent set the bar for future legislation by other authorities; even if opt-out became the chosen route, the prominence of the message, which can probably, in part, be attributed to GDPR, at least gives the consumer the opportunity to make an informed decision.

There has also been a sea change in product and service development, and this too can probably, in part, be attributed to the GDPR. At the inception of a new product of service, privacy by design and default is now a relatively standard approach for any team to consider as projects come to fruition. Consumers now expect there to be a trusted relationship with a vendor and the vendor understands that this will bring long-term commercial success.

It seems impossible to write this blogpost without mentioning the current COVID-19 predicament with the numerous contact-tracing apps and location mapping data being provided to governments by telecom carriers. While privacy may have been put on hold in some cases, or at least modified to a point that in normal circumstances would be unacceptable, the visibility on personal information privacy that both the GDPR and the Cambridge Analytica scandal created have caused global scrutiny on the use of data to help solve the current pandemic. This scrutiny has seen governments backtrack on proposals and technology companies innovate new methods to ensure anonymity; there’s also a general consensus that a contact-tracing app needs to respect the user’s right to privacy.

The GDPR has legitimized privacy advocates across the globe having a voice and for their concerns to be considered and listened too. The big question, though, remains: ‘Have citizens become the owners of their personal data?’ I leave you with an inspired quote from the late Steve Jobs…

“Privacy means people know what they’re signing up for, in plain language, and repeatedly. I believe people are smart. Some people want to share more than other people do. Ask them.” – Steve Jobs



Tony Anscombe


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.