• Tue. Dec 6th, 2022

security

  • Home
  • China’s Police State Targets Zero-Covid Protesters

China’s Police State Targets Zero-Covid Protesters

It was another busy week in security that saw big news about protests, surveillance, spyware, data breaches, and more. In the US, recent court filings detail how the FBI’s use of…

Android Phone Makers’ Encryption Keys Stolen and Used in Malware

While Google develops its open source Android mobile operating system, the “original equipment manufacturers” who make Android smartphones, like Samsung, play a large role in tailoring and securing the OS…

Drop What You’re Doing and Update iOS, Android, and Windows

November saw the release of patches from the likes of Apple’s iOS, Google Chrome, Firefox, and Microsoft Windows to fix multiple security vulnerabilities. Some of these issues are pretty severe,…

Apple Tracks You More Than You Think

Cybersecurity startup Corellium offered or sold its software to spyware and hacking-tool creators in multiple repressive countries, a WIRED investigation revealed this week. A previously unreported 507-page document, believed to have…

Redacted Documents Are Not as Secure as You Think

“Even if you do the redaction, supposedly correctly, even if you remove the text, there’s a lot of latent information that is dependent on the content that was redacted, and…

I Lost $17,000 in Crypto. Here’s How to Avoid My Mistake

In 2014, I bought 25,000 dogecoin as a joke. By 2021, it was briefly worth over $17,000. Problem was, I couldn’t remember the password. Determined to get my coins back,…

How to Avoid Black Friday Scams Online

Black Friday attracts crowds, and crowds attract scammers, and that means you need to take extra care when shopping online over the Black Friday and Cyber Monday weekend. There’ll be…

Elon Musk’s Twitter Risks Big Fines From US Regulators

The FTC’s treatment of Facebook helps illustrate the danger to Musk and Twitter. In 2019, following a complaint alleging violation of a 2012 order, the agency hit the company with…

EufyCam 3 Review: Best Subscription-Free Security Camera

The EufyCam 3 is by far the most accomplished camera system from Eufy yet, with a combination of features that will catapult it to the top of many wish lists.…

A Destabilizing Hack-and-Leak Operation Hits Moldova

It was a truly wild week in the tech industry as new details emerged about the FTX cryptocurrency exchange’s collapse and Elon Musk drove an ever-increasing number of Twitter employees…

Here’s How Bad a Twitter Mega-Breach Would Be

“Twitter has seemingly neglected security for a very long time, and with all the changes, there is risk for sure,” says David Kennedy, CEO of the incident response firm TrustedSec,…

What Happens If Twitter Gets Hacked?

Twitter doesn’t work like it used to. Under new ownership, the site is operating with half its usual staff and an entirely new set of executive pressures. As a result,…

Twitter’s SMS Two-Factor Authentication Is Melting Down

Following two weeks of extreme chaos at Twitter, users are joining and fleeing the site in droves. More quietly, many are likely scrutinizing their accounts, checking their security settings, and…

Elon Musk Introduces Twitter Mayhem Mode

The United States took to the polls this week to vote in a high-stakes midterm election. With public trust in election systems at an all-time low, the secret ballot is…

Elon Musk’s Twitter Blue Verification Is a Gift to Scammers

At the end of August, Sean Murphy was trying to book a flight between Nairobi, Kenya, and Entebbe, Uganda, with Kenya Airways. “The information on the booking page was ambiguous,”…

Russia’s Sway Over Criminal Ransomware Gangs Is Coming Into Focus

Russia-based ransomware gangs are some of the most prolific and aggressive, in part thanks to an apparent safe harbor the Russian government extends to them. The Kremlin doesn’t cooperate with…

TikTok Admits Staff in China Can Access Europeans’ Data

Open internet proponents were relieved last month when an American candidate beat a Russian challenger in an election to run the International Telecommunications Union, an important international standards body tasked…

The Most Vulnerable Place on the Internet

The Asia-Africa-Europe-1 internet cable travels 15,500 miles along the seafloor, connecting Hong Kong to Marseille, France. As it snakes through the South China Sea and toward Europe, the cable helps…

The Rise of Rust, the ‘Viral’ Secure Programming Language That’s Taking Over Tech

These types of vulnerabilities aren’t just esoteric software bugs. Research and auditing have repeatedly found that they make up the majority of all software vulnerabilities. So while you can still…

You Need to Update Google Chrome, Windows, and Zoom Right Now

Other issues fixed in October are a heap buffer overflow in WebSQL tracked as CVE-2022-3446 and a use-after-free bug in Permissions API tracked as CVE-2022-3448, Google wrote in its blog.…

China Operates Secret ‘Police Stations’ in Other Countries

For years, AlphaBay ruled the dark web. If you were in the market to buy drugs or stolen credit cards, the digital bazaar was the place to turn. At its…

If Musk Starts Firing Twitter’s Security Team, Run

Elon Musk is buying Twitter for $44 billion after the least sexy will-they-won’t-they saga of all time. And while Musk attempted to reassure advertisers yesterday that “Twitter obviously cannot become…

IBM Uses Hybrid Cloud To Assist Two European Banking Groups Become Digital

IBM has announced two major core banking modernization projects in Europe using hybrid cloud technology. Rural Services Informaticos (RSI), a Spanish banking IT services company, will use hybrid cloud technology…

A Pro-China Disinfo Campaign Is Targeting US Elections—Badly

In an attempt to shift that blame, Dragonbridge’s influence campaign went so far as to create spoofed posts from Intrusion Truth, a mysterious pseudonymous Twitter account that has previously released…

TikTok’s Security Threat Comes Into Focus

As Russia’s war in Ukraine drags on, Ukrainian forces have proved resilient and mounted increasingly intense counterattacks on Kremlin forces. But as the conflict evolves, it is entering an ominous…