With tech companies More and more time, user location data is currently being gleaned by governments and governments in whatever way they can use it – a group of technologists in the United States and the United Kingdom this week introduced 10 principles, the Locas Charter, Ethical concepts and use of location data. Facebook has announced Research on Chinese hacking group Evil EyeWhich continues to spy on Uyghurs. In this latest case, the group used front companies to create spyware and carefully distributed both Android and iOS malware through fake app stores and scandalous websites.
Meanwhile, a strain of ransom calls Dearcry is doing pigback Chinese hackers use the vulnerabilities of the same Microsoft Exchange for global espionage. And dark web marketplaces are overflowing Covid-vaccine scandal, Fake doses and fake evidence of vaccination hawking.
In an effort to reduce the threat posed by browser-related attacks, Internet infrastructure companies such as Cloudflare Development of a new generation of “browser isolation” tools Which corrupts the corrupted code directly on your computer while becoming faster and more usable than the previous iteration.
And there are more. We don’t cover all the news variations in depth every week. Click on the title to read the full story. And stay safe there.
Last week, Google’s Threat Analysis Group and its Project Zero bug-hunting team revealed that the single, anonymous identity hacking group was using 11 previously unknown security vulnerabilities after being digitally attacked for nine months in 2020. Google did not provide details or identify the hackers. Maybe hints about that. Friday, MIT Tech Review Reported that the hackers were agents of the Western government who were conducting counterterrorism operations. If the situation only relates to covert activities conducted by a “friendly” government, then the logistics and parameters of the vulnerability are already under discussion. The weaknesses in this case were in the ubiquitous software like Windows 10 and Google’s own Chrome browser for Apple’s mobile Safari browser.
On Friday, Dominion Voting Systems filed a .6 1.6 billion defamation suit against Fox News in Delaware, alleging that broadcaster Dominion, whose voting machine was used in 28 states, rigged the 2020 U.S. election. The agency wrote in the lawsuit that Fox News “sold a false story of electoral fraud to serve its own commercial purposes, seriously injuring Dominion in the process.” Voting technology company SmartMate adds Similar lawsuits Against Fox News in February.
President Donald Trump and his supporters have spent months trying to discredit the election results and President Joe Biden’s victory based on these claims and other conspiracy theories. As part of the campaign, deadly capital riots erupted in January, which led to Trump’s second impeachment.
In the 2020 Internet Crime Report, the FBI’s Internet Crime Complaints Center (IC3) received 90,091 complaints in 2019, an increase of 9 percent over 2019. The reported total loss was a staggering 4.1 billion. Significantly, the so-called “business email compromise” attack, which was Increase In the 2010s, a total of 19,369 complaints were reported, with a total loss of about $ 1.8 billion. There are 241,342 allegations of phishing attacks totaling 54 million. And in 2020, when ransom attacks were a source of high-profile risk, there were 2,444 individual incidents, with a loss of. 29.1 million. IC3 data is incomplete, as not all incidents are reported – especially in cases such as ransomware attacks, where victims are reluctant to admit that they paid the attackers. But numbers still provide an idea of valuable context and scale.
Taiwanese electronics maker Acer was the victim of a ransom attack last weekend. The protracted Revil Rainsware group has demanded a record-breaking 50 million to decrypt area systems and avoid leaking their outbound data. The attack did not stop Acer’s production networks, and the company announced its fourth-quarter earnings on schedule just days after the attack. Acer thus reduced the intensity of the attack.
More great wired stories