Everything started pretty well: Sunday we explained how finally stop all those automated calls-Or at least slow them down.
But then Monday hit, and the United States the government has confirmed that hackers had stolen a border agency database full of photos of travelers. The incident proves that the government has rushed to adopt biometrics. He did not bother to worry enough about securing this sensitive data.
Things did not slow down from there. Tuesday, hides a lot more fun of data leaked online: 18 hours of unpublished music from Radiohead. And who filtered it? No one but Radiohead himself, who has made sure that someone tries to extort the group for $ 150,000 in order to keep the songs offline. Hi to the thief, indeed.
Lily Hay Newman continues to swear that she is not trying to kill the ad blockers reported On Wednesday And Darren Shou, Vice President of Symantec has explained why the next big hurdle for AI teaches him to forget.
Thursday, we reported three great stories: we entered The Cloudflare Five-Year Project protect non-profit organizations; reported that Google is currently trying to close the major loophole in web encryption; and had exclusive and crazy history! -History of how Alphabet owned Jigsaw bought a disinformation campaign in Russia for the low, low price of $ 250.
Wanting to end the week on a terrifying note, Andy Greenberg reported Friday that the dangerous hacking group known as Triton had been probe the American power grid. Oh, and then that Cellebrite, an Israeli data mining company that is contracting with the US government, said he now has a tool that can unlock any iPhone.
Of course, there was more. Every Saturday, we summarize security and privacy stories that we have not analyzed in detail, but that we think you should know about. Click on the titles to read them and stay safe.
As demonstrations erupted on the streets of Hong Kong this week, a bill allowing suspects to be extradited to be extradited to Mainland China, the Telegram secure messaging app was hit by a massive DDoS attack. The company tweeted Wednesday that it was under attack. Then the founder and CEO of the application, Pavel Durov followed and suggested that the culprits were Chinese state actors. I tweeted that the IP addresses of the attackers came from China. "Historically, all DDoS the size of a state actor (200-400 Gb / s of junks) coincided with the protests in Hong Kong (coordinated the @telegram). This case was not an exception, "I added.As noted by Reuters, Telegram was also a victim of DDoSed during protests in China in 2015. Hong Kong does not face the strict censorship on the Internet that exists in mainland China, although activists have expressed concern about Beijing's increased pressure on the region.
After years of criticism that its voting machines contained faulty and unsafe software, Election System and Software, a leading provider of voting machines, announced this week that it would stop using machines that do not have a paper ballot. Voting security experts have long warned against ES & S machines in particular, and indicated that paper ballots are always more secure as they provide a verifiable backup copy. Ars Technica explains that this decision comes after 18 months of thorough scrutiny from lawmakers and external experts and from a wave of states embracing paper ballots for the purpose of letting it go. presidential election of 2020.
It's the end of an era, people. For six years, the website Have I been pwned helped people understand exactly this: enter your e-mail address and, here, the site would tell you not only if your e-mail address was on an unobserved list, but on which and why. Want to know if you've been affected by Target's big hacking in 2013? Check that I have been warned. Ditto for the Experian Breach, and literally none since security researcher Troy Hunt created the site in December 2013. But now, Hunt is ready to "grow". Writing in a blog post, Hunt says, "It's time to get out of this guy who does what he can to the extent of his time to a better resourced and better funded structure, able to do more that all I could myself. "Hunt must be careful, though. Since I myself have been referencing itself is now a huge repository of sensitive information, people will not accept that this information be sold to a suzerain of the company that might not be responsible for protecting their privacy as Hunt has been.
More great cable stories
. (tagsToTranslate) roundup security