How the FBI finally got into the San Bernardino shooter’s iPhone

As biden As the administration moves toward a growing list of policy initiatives, the White House this week imposed sanctions on Russia for its slate of misdeeds, including interference in the 2020 election and the poisoning of disgruntled Alexei Navalny. SolarWinds Hacking Spray Which carried many government agencies and private sector organizations in the United States. Are retaliatory measures Complicated when it comes to solarwindsAlthough it picks up espionage operations that would be included in espionage rules.

Elsewhere in the U.S. government, the Department of Justice Take a drastic step A Chinese hacking spree this week allowed the FBI to obtain a warrant and then remove the hacking infrastructure directly from hundreds of damaged internal systems of the attackers. The move was hailed by many in the security community, but it also sparked some controversy, setting a precedent for future US government measures that could be more aggressive.

Researchers at the Bhutto World of Internet-of-Things protection revealed on Tuesday that more than 100 million embedded devices and IT management servers are potentially vulnerable to attack, Due to errors in basic networking protocols. The devices are made by countless vendors and are used in environments ranging from regular offices to healthcare and critical infrastructure, potentially exposing those networks to attack.

If you are trying to reduce your reliance on passwords by locking your accounts, we have a Alternative guide Which will take you through several platforms. And if you have a general idea of ​​the existence of all kinds of threats, you are not alone – the US intelligence community seems to be Feel the same way.

And there are more. We don’t cover all the news variations in depth every week. Click on the title to read the full story. And stay safe there.

In 2016 the US government famously Tried to force Apple to unlock the iPhone One of the San Bernardino shooters. The lawsuit could have set a precedent for the government to claim that tech companies could reduce security or “back up” their products. (Several law enforcement agencies and lawmakers around the world still support this type of access). But in favor of privacy and security experts have said absolutely unequivocally and consistently The back door is dangerous And expose people to unacceptable protections and privacy risks. In the San Bernardino case, the FBI finally found a way to the device without Apple’s help. The report indicated at the time that the FBI had paid about 1 1 million to use an iPhone hacking tool built by a private company. This week, The Washington Post Published The company that sold it is not one of the most well-known players, but instead a small Australian company known as Azimuth, which is now owned by U.S. defense contractor L3 Harris. This news item provides helpful information to organizations that are opposed to other orders that may come from the U.S. Department of Justice or other governments in the future.

As part of the White House sanctions against Russia this week, the Biden administration has called for a list of cyber security vendors who allege that the Russian government provided hacking tools and other services to aggressive hackers. Positive Technologies, one of those companies, is a member of Microsoft’s Active Protection program, a group of about a hundred software vendors who receive advanced warnings from Microsoft about vulnerabilities in Windows or other Microsoft products before the patch is released. Microsoft sometimes shares evidence of the notion that vulnerabilities can be exploited maliciously in an attempt to coordinate error public disclosure. For Microsoft’s trusted security partners, the idea is to jump into the inevitable flood of malicious activity that, once patches are released, and everywhere attackers can reverse engineers to create their own hacking tools. If Positive Technologies works closely with the Russian government, it does May leak information And allow attackers to change their tactics or arm errors that they did not know existed. The agency has vehemently denied the allegations.

The European Commissioner for Budget and Administration said this week that Solarwinds hacking spree has potentially compromised six EU offices. In all, 14 EU agencies ran several versions of the SolarWinds Orion software during the hack. The European Union’s Computer Emergency Response Team did not say which six companies downloaded the scandalous update and how many of the six actually compromised deeply by Russian hackers. The CERT-EU said, however, that there was a “significant impact” on at least some of the six and that “some personal information was violated.”

More great wired stories

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *