How to As DirecTV tanks, AT&T says it will “re-bundle” TV with HBO Max

The traditional AT&T television business has begun to decline, as the company has lost nearly 5 million subscribers by satellite and wired television sets since late 2016.

But AT&T chief John Stankey sees a way to recreate traditional online cable TV packages. HBO Max from AT&T is launched in May 2020 for $ 14.99 per month, and AT&T has set an ambitious target of 50 million US customers within five years.

Such a common number would make HBO Max much larger than the DirecTV AT&T satellite division and U-verse wit TV service. But in the end, customer service can be similar to DirecTV, U-verse or cable TV.

Vox wrote in a report yesterday, “HBO Max wants to be a content bundle that includes movies and shows that WarnerMedia does not own, as well as the people you. The report summarizes an interview Stanke gave at Recode’s Media Code conference.

Stanke said that HBO Max would be a platform “at some point” that we allow others to enter content.

Reassemble and remodel

Stankey, an AT&T employee, 34 years old, who is chairman and chief operating officer, is the second person to hold the post of CEO of AT&T Randall Stephenson, and when Stephenson retires, he may be in a position to become CEO. He is also the CEO of WarnerMedia, the AT&T division which also includes HBO.

Stankey said the proliferation of online video services has caused the traditional cable bundle to “slice” across multiple platforms.

“We’re basically not ready to regroup,” Stunky said.

With AT&T, expect price increases

If AT&T completely remade the cable package and still got $ 14.99 a month for all of that, that would be a good thing. But this is unlikely, as AT&T has already developed a history of raising internet broadcast prices that are much higher than introductory prices.

DirecTV Now, the online AT&T option for the DirecTV satellite service, was initially introduced in 2016 as a $ 35 per month plan with more than 100 channels. But AT&T increased prices several times and reduced the number of channels by removing channels that are not part of Time Warner Inc.

Nicknamed “AT&T TV Now”, the service costs $ 65 per month for 45 channels including HBO. Packages with more than 100 channels cost at least $ 124 per month, while the “Ultimate” package costs $ 135 per month for 125 channels.

At $ 14.99 per month, HBO Max will be similar to the standard Netflix offer and feature that costs $ 12.99 and $ 15.99 respectively. The price of HBO Max will now be the same as the current price of HBO, although HBO Max will include all HBO content among other things. But as we saw in the example of DirecTV Now, it wouldn’t be surprising to see AT&T raising prices for HBO Max in the years following its launch.

AT&T Makes Fear of Net Neutrality

AT&T will become a major player in online video, leading to concerns over net neutrality, as AT&T can use its control over home and mobile broadband networks to move customers away from online services and towards AT&T. .

In yesterday’s interview with Recode, Stankey claimed that it would be absurd for anyone to worry about AT&T or other Internet service providers who act in anti-competitive ways via live broadcasting on the Internet.

Stankey likes consumers to direct their anger elsewhere. In terms of the terms and conditions associated with developing a new product and what it would do to overcome innovation Hai, there is nothing more than traffic dealing with the Internet. ”

But Stankey is wrong because AT&T has not shown “favoritism” in its handling of video services. In January 2017, the FCC violated the rules of Net Neutrality by allowing AT&T and Verizon to stream their video services (including AT & T’s DirecTV) to their mobile networks without relying on customer data limits Was accused.

The Scammers try a new way to steal online shoppers’ payment-card data

The thieves devised a new way to steal payment card data from online shoppers – or at least the researchers who found it. Instead of infecting the merchant’s registration page with malware that blocks information, thieves convince users that they have been redirected to third-party payment processors.

Perceived payment service platforms are common in the e-commerce world, especially for small sites that do not have the resources to strengthen their servers against sophisticated attacks. This includes a hacking rash coming from magenta groups that target Magento e-commerce platforms. Instead of hackers taking great risks of stealing passwords, taking payment card details or other sensitive data, sites can unload payment card fees for an experienced PSP.

Jerome Segura, the head of intelligence at Malwarebytes Security, said he recently found sites attacking using this type of system. By hitting a merchant site and adding one or two codes, attackers redirect users to a fake PSP rather than legitimate users at the time of purchase. The trick works similar to a phishing attack. Graphics, custom-made domain names, and other user group manual tricks that mimic real services fool them into thinking that they came in an actual third-party processor.

Explain replication

Segura wrote in an email, “This is a way for them to pay [attackers], whatever the e-commerce site uses.” “If the merchant takes the payment themselves, [the attackers] will use specific filters searching for specific fields. If the merchant relies on an external payment gateway instead, that fraud is designed to collect data such as phishing Can publish the page. ”

The threatened merchant’s site redirects shoppers to this fake third-party wizard. [/ ars_img] So far, Segura has found only one example of this hoax. This has led to the threat of an online store in Australia using the PrestaShop content management system. As the image in the right show, a fake PSP was held at MasterCard Pay []. com.

A downward comparison indicates that Australia’s Commonwealth Bank, which was the online merchant’s original PSP, is absolutely correct. However, under the hood, counterfeiters cut payment card data, so that it could be used for fraudulent transactions.

“The scheme includes replacing a valid e-banking services page with a fake page to collect victims’ credit card details,” Segura explained in a post published on Thursday.

Once a fake PSP collects data, it redirects buyers to a valid PSP and includes the purchase amount.

While Segura finds that there is only one active attack with this method, it is assumed that the scammer is a test run before starting a more widespread scam. He said he noticed that there are dozens of areas in a set of detectors that resemble legal banking institutions. He first wondered why the scrapers were angry. After witnessing the attack on the Australian businessman, he said he could find a reason for it.

Some methods for users with a background in online security to detect this type of fraud is a fake PSP note to redirect to the real account after accepting payment card data. The one who really pays attention will not only notice that the card data is searched a second time. They will also see differences in areas between the two services (see comparison above). Malwarebytes antivirus – and possibly other security software – makes it easy to detect by automatically placing a fake PSP tag. Thursday’s post also provides clues to an agreement people can use to determine if they are being targeted.

So I am a scam scientist who works with a major credit card issuer. For me this is an excellent reason as we are working hard for the 3DS standard, which has recently become mandatory for European e-commerce transactions. 3DS is a multi-factor authentication protocol, in which we get some high-risk transactions (check SIM swap in case of SMS OTP and check device data) as well as other details on how the transaction is presented (eg IP address) Will need to be collected.

Unfortunately, it can be painful for a merchant to obtain such a correct setting, and credit card consumers often complain of friction in payments. We will always participate in cat and mouse games with con artists who constantly innovate (and often have nation-state resources behind them). It is a well-designed attack and has something to focus on.

What is notorious Iranian hacking crew is targeting industrial control systems

Iranian hackers have made the most digital subversion in the last decade, destroying entire computer networks in the Middle East and sometimes in waves of cyber attack in the United States. But now it appears that one of Iran’s most active pirate groups has shifted focus. Instead of just standard IT networks, it targets physical control systems used in electrical facilities, manufacturing, and oil refining.

change in the activity of the Iranian hacker group APT33, Holmium, Refined also known as. Kitten, or small. Microsoft has observed that the group has been carrying out so-called password-spray attacks over the past year that are trying to use some common passwords in user accounts in thousands of organizations.

It is generally considered a random form of piracy. But in the last two months, Microsoft says that APT33 has limited its password processing to around 2,000 organizations per month, while the number of targeted accounts in each of these organizations has increased tenfold on average.

Microsoft has classified these targets according to the number of hackers who attempted to hack them; Moran states that nearly half of the first 25 were from manufacturers, suppliers or maintenance of industrial control system equipment. All in all, Microsoft says it has seen dozens of industrial hardware and software companies target APT33 since mid-October.

The motives of the hackers – and the industrial control systems they have already broken – are unclear. Moran speculates that the group is seeking a foothold to carry out cyber attacks with physical effects. They want to give some pain to the critical infrastructure of a person who uses these control systems . ”

This innings represents a worrying move especially for APT33, given its history. Although Moran states that Microsoft has not seen direct evidence that the APT33 carried out a devastating cyber attack rather than merely espionage or reconnaissance, it has seen incidents in which the group at least laid the basis for those attacks.

Moran says the group’s fingerprints have appeared in several intrusions, where victims have since been infected with a piece of malware to erase data called shamoon. McAfee warned last year that the APT33 – or a group pretending to be APT33 – hedged – was publishing a new version of Shamoon in a series of data-destroying attacks. FireEye Threat Risk The company has warned since 2017 that APT33 has links to another piece of destructive code known as Shapeshifar.

Moran declined the names of any specific industrial control systems, ICs, companies or products targeted by APT33 hackers. But he warns that the goal of a group of these control systems is to demonstrate that Iran may want to go beyond just wiping computers in its cyber attack.

We can expect physical infrastructure to be affected. These attacks are rare in the history of state-sponsored theft, but its effects are disturbed; In 2009 and 2010, the United States and Israel jointly issued a piece of code known as Stuxnet, for example, that destroyed Iran’s centrifuges for nuclear enrichment. In December 2016, Russia used a piece of malware known as indestroyer or crash override for a short period of blackouts in the Ukrainian capital Kiev.

Unknown hackers published a piece of malware known as Triton or Trisis at a Saudi oil refinery in 2017, aiming to disrupt security systems. Some of these attacks – particularly the Triton – have the potential to cause physical harm, which threatens the safety of individuals within targeted facilities.

Iran is not publicly associated with any ICS attack. But Microsoft’s new goal suggests that it can develop these capabilities.

But Adam Myers, vice president of intelligence for security firm CrowdStrike, warns against reading too much into the new focus for APT33. It can easily focus on espionage. energy companies rely on it,” says Myers.