New Delhi: Domestic consumer electronics company Micromax Informatics, in collaboration with Bharti Airtel, on Tuesday launched its first Android Oreo (Go Edition) smartphone Micromax “Bharat Go” for Rs 2,399.
Micromax “Bharat GO”, which has a market operating price of Rs 4,399, comes with a special cashback of Rs 2,000 as part of Airtel’s ‘Mera Pehla Smartphone’ initiative.
The launch is part of a partnership to bring low-cost smartphones powered by Android Oreo (Go edition) to the Indian market, the company said in a statement.
Android Oreo (Go edition) is a configuration of the Android operating system specifically optimised for devices with 1GB RAM or less.
“Android Oreo (Go Edition) is a compelling proposition for the mobile first economy like India. We are proud to announce the launch of Bharat GO, a smartphone powered by the Android Oreo (Go Edition) today,” said Shubhodip Pal, Chief Marketing and Commercial Officer, Micromax.
Micromax along with Airtel to launch special cashback of Rs 2,000 on ‘Bharat Go’:
The VoLTE ready dual-SIM device comes pre-loaded with apps like Gmail Go, Maps Go, Files Go, Chrome, YouTube Go, Assistant Go, Play Store and GBoard which will enable the device to run faster while using less data.
“Android Go powered devices like Bharat Go, will offer customers an opportunity to upgrade to affordable smartphones that also deliver a great experience,” added Vani Venkatesh, Chief Marketing Officer, Bharti Airtel.
“Bharat Go” comes with a 4.5-inch screen and a smart key that will enable the users to take screen shots, click pictures and switch the phone into silent mode.
On camera front, it incorporates 5MP rear camera and a 5MP front camera. the device has MediaTek Quad Core processor, 1GB DDR3 RAM and 8GB internal storage and it is powered by 2,000 mAh battery.
Why Cyber Attacks in the News? What’s Cyber Attack Trends and prevention?
A cyber attack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of benefit from disrupting the victim’s network.
Depending on the criminal intent, a cyber attack can be random or targeted. Cyber attack methods seem to rotate in order to throw organizations off their defenses. Mega ransomware attacks dominated the news in 2017 with WannaCry and NotPetya. Cryptominers’ attacks made headlines in 2018. In 2019, cyber attacks have been a mixed bag. Phishing email cyber attacks remain a constant thorn for most organizations.
The resurgence of ransomware has been growing. Small local and state government agencies, mainly in the southeastern part of the U.S., have been victimized. Digital transformation is eroding traditional network perimeters with the adoption of cloud computing, cloud-based subscription services, and the ubiquity of mobile devices. This increased expansion of vectors means more ways to attack an organization.
Cyber Attack Trends
In its provides analysis of the year to date, looking at global cyber attack trends in malware overall, ransomware, and mobile and cloud malware.
TREND 1: Software supply chain attacks on the rise
In software supply chain attacks, the threat actor typically installs malicious code into legitimate software by modifying and infecting one of the building blocks the software relies upon. As with physical chains, software supply chains are only as strong as their weakest link.
Software supply chain attacks can be divided into two main categories. The first includes targeted attacks aiming to compromise well-defined targets, scanning their suppliers list in search of the weakest link through which they could enter. In the Shadow Hammer attack, attackers implanted malicious code into the ASUS Live Update utility, allowing them to later install back doors on millions of remote computers.
TREND 2: Evasive phishing cyber attacks
Phishing is a popular cyber attack technique and continues to be one of the biggest threats to cyber security. Advanced socially engineered evasion techniques are bypassing email security solutions with greater frequency. Check Point researchers noted a surge in sextortion scams and business email compromise (BEC), threatening victims into making a payment through blackmail or by impersonating others, respectively. Both scams do not necessarily contain malicious attachments or links, making them harder to detect. In April, one sextortion campaign went as far as pretending to be from the CIA and warned victims they were suspected of distributing and storing child pornography. Hackers demanded $10,000 in Bitcoin.
Evasive email scams include encoded emails, images of the message embedded in the email body, as well as complex underlying code that mixes plain text letters with HTML character entities. Social engineering techniques, as well as varying and personalizing the content of the emails, are additional methods allowing the scammers to fly safely under the radar of anti-spam filters and reach their target’s inbox.
TREND 3: Clouds under attack
The growing popularity of public cloud environments has led to an increase of cyber attacks targeting resources and sensitive data residing within these platforms. Following the 2018 trend, practices such as misconfiguration and poor management of cloud resources remained the most prominent threat to the cloud ecosystem in 2019. As a result, subjected cloud assets have experienced a wide array of attacks. This year, misconfiguring cloud environments was one of the main causes for a vast number of data theft incidents and attacks experienced by organizations worldwide.
Cloud cryptomining campaigns have increased with upgraded techniques capable of evading basic cloud security products. Docker hosts have been exposed and competitors’ cryptomining campaigns operating in the cloud shut down. Check Point researchers also witnessed an increase in the number of exploitations against public cloud infrastructures.
TREND 4: Mobile device attacks
Malicious actors are adapting techniques and methods from the general threat landscape to the mobile world. Banking malware has successfully infiltrated the mobile cyber arena with a sharp rise of more than 50% compared to 2018. In correlation to the growing use of banks’ mobile applications, malware capable of stealing payment data, credentials and funds from victims’ bank accounts have been pushed from the general threat landscape and became a very common mobile threat too.
10 Ways to Prevent Cyber Attacks
Even if you don’t currently have the resources to bring in an outside expert to test your computer systems and make security recommendations, there are simple, economical steps you can take to reduce your risk of falling victim to a costly cyber attack:
- Train employees in cyber security principles.
- Install, use and regularly update antivirus and antispyware software on every computer used in your business.
- Use a firewall for your Internet connection.
- Download and install software updates for your operating systems and applications as they become available.
- Make backup copies of important business data and information.
- Control physical access to your computers and network components.
- Secure your Wi-Fi networks. If you have a Wi-Fi network for your workplace make sure it is secure and hidden.
- Require individual user accounts for each employee.
- Limit employee access to data and information and limit authority to install software.
- Regularly change passwords.
Let us know how you can stay away from the bad effects of smartphone
A star named Sushant Singh Rajput will shine in space
Keep this in mind when making connections to prevent unwanted pregnancy
Dhoni comes out of Jharkhand to be the first international cricketer to play for India
Prize money has been increased to Rs 2.5 lakh on Vikas Dubey, who killed police personnel
How gym machine is running on its own, police opened the secret
China posted video showing India fear of hydrogen bomb
XIAOMI MI POWER BANK 3 WITH 30,000MAH CAPACITY, 18W OUTPUT UNVEILED
Former Pakistan cricketer Shahid Afridi says he has tested positive for corona virus.
Snacks industry expects Rs 35,000 crore revenue loss in FY21 due to COVID-19.
‘India’s Most Wanted’ trailer out Arjun Kapoor on hunt of Osama-Bin-Laden
Time to move on: Sonakshi on Shatrughan’s joining Congress
Kangana’s sister Rangoli cheers for Deepika’s ‘CHHAPAAK’
Chitrangda Singh & Sana Khan BOLD Avatar .See video
Films more important to me than fame says Janhvi Kapoor
Business23 hours ago
Govt plans to boost organic farming by doubling allocation,but experts say it’s anti Swadeshi
National23 hours ago
Chinese army started removing tents,Army also started retreating from Galwan Valley:Sources
Feature2 days ago
Jammu and Kashmir : Terrorist attack on CRPF personnel in Pulwama
Feature20 hours ago
Vikas Dubey made Chambal ravines his hideout
Corona22 hours ago
Bengaluru Covid +ve Woman’s 8-Hour Wait Outside Home For An Ambulance.
National1 day ago
Jyotiraditya Scindia removes ‘BJP’ from Twitter bio again;Stir in the political camp from Madhya Pradesh to Delhi again.
Entertainment20 hours ago
Trailer of Dil Bechara, last film of Bollywood actor Sushant Singh Rajput, has been released online
Life Style2 days ago
Women and men also have some fears associated with bonding