As the surrounding country The world continues to seek access to encrypted communications, a messaging platform owned by Facebook WhatsApp sues the Indian government Challenge new rules this week, requiring apps to be able to track the “first originator” of a message.The ability to create such will destroy End-to-end encryption protection for WhatsApp, Not only may affect the privacy and security of its 400 million users in India, but also may affect the privacy and security of billions of users worldwide.
In other geopolitical conflict news, Microsoft said this week that the same Russian spy organization behind the SolarWinds hacking frenzy has also been actively working on Phishing campaigns that compromised the mass email accounts of the U.S. Agency for International DevelopmentThe event is important, but it is more likely to be a sign of a return to normal business than a digital upgrade.
Google’s researchers announced on Tuesday about New risks faced by current memory chips From the puzzling physical digital hacking technique called Rowhammer.A kind Novel wiper malwarePossibly made by Iranian hackers, they have been attacking Israeli targets.Researchers are studying how Blurred, outdated satellite imagery Coming from platforms like Google Earth may make it more difficult and costly for aid groups to work in Israel and Palestine.
If you want to do some digital spring cleaning during the long weekend, we have Advice on how to avoid app store scams. This week the researchers detailed a Fake movie streaming website built by hackers from scratch Better trap victims, including instant movie classics like this Barking dog with Women’s Day.
there are more! Every week we collect all the news that WIRED has not covered in depth. Click on the title to read the full story and stay safe there.
American soldiers managing nuclear weapons need to remember a large number of safety procedures. But a Bellingcat survey showed that some people in Europe have been using flash card applications to submit all protocols to memory. Not only that, the details they put on the digital card inadvertently exposed sensitive details about the US nuclear weapons in Europe. This information includes information such as where weapons may be stored in the base, patrol schedules, security camera locations, identity badge attributes, and even security words that guards should use when they are threatened to warn others. Bellingcat researchers were able to find these cards by searching for “well-known terms related to nuclear weapons.”
This Citizen, a crowdsourcing crime tracking app The plan to establish and deploy a private police force was cancelled this week Pilot this idea In Los Angeles last month. The trial operation involves the deployment of a Citizen brand police car; only company employees can participate in the experiment and use the application to call units that are operated by the private company Los Angeles Professional Security Company. More broadly, the app has been criticized for fostering anxiety and paranoia, and for prompting users to take the law into their own hands. After talking to former employees and other sources close to the company and reviewing internal documents, Motherboard described a series of violent raids against innocent individuals initiated by the company’s own employees. “Find the fuck,” CEO Andrew Frame told employees in his spare time at Citizen one night. “Let’s catch this guy before midnight.”
According to contracts seen by TechCrunch, at least 100 U.S. counties, cities, and towns have purchased Chinese surveillance equipment that the U.S. government believes is related to human rights violations by Uighur Muslims in Xinjiang, China. In some cases, locals have spent tens of thousands of dollars or more on suppliers Hikvision and Dahua. The two companies have been on the U.S. federal blacklist since 2019, and Congress prohibits federal agencies from purchasing from these companies, which sell products such as security cameras and thermal image scanners. But these federal-level bans do not exclude municipalities from conducting business with these companies, as long as they do not use federal funds in their transactions.
The invasion of Fujitsu, a Japanese technology company, allowed attackers to compromise many Japanese companies and government agencies through Fujitsu’s popular information sharing portal ProjectWEB. Japan’s Ministry of Land, Infrastructure, Transport and Tourism and Japan’s National Cyber Security Center said on Wednesday that the attackers had stolen data, including proprietary information, by sabotaging ProjectWEB. It is not yet clear whether this violation was the result of platform vulnerabilities.
More exciting connection stories