A wired report It was found that Google’s geographical location data has been used in 45 investigations and calculations of Capital rioters. Its use includes Two geofence warrants That Has enabled the FBI to identify the suspects It was a remarkable use of geofencing at a remarkable time in a narrow-windowed building during the January period; Experts acknowledge that this was probably fair, but think of a slippery slope, especially as Geofence warrants have been used In recent years.
In other Google news, Android has suffered another wave of scam applications. At least in a November campaign, Hundreds of malicious apps have entered Google Play And was downloaded to a total of 10 million devices. Bad apps used a variety of trickery tactics to avoid detection and tried to get users to sign up for a recurring charge. Researchers are unclear how much money they have made, but given the number of victims, it could be in the hundreds of millions of dollars.
Internet infrastructure company Cloudflare is entering email security, With two new, free tools designed to protect enterprise customers from phishing and other email problems. The The Senate shouted again on Facebook, This time about adolescent mental health. And now that you can Go to your Microsoft account without a password, We Gather a quick guide on how to enable it.
Hill Lends itself to many explanations, But its most interesting may be a Template for future global conflicts, Cyberwar from Afghanistan. And why we a Real-life James Bond probably won’t use the iPhone. (Or for the Nokia he relies on in that movie.)
And there’s more! Every week we do not publish all the security news of WIRED in depth. Click on the title to read the full story, and stay safe there.
Sim-swap attack, In which someone ports your phone number into their device to get two-factor authentication on your most sensitive accounts, it has been a nightmare for years. These include cryptocurrency theft, bank account evasion and Possession of social media accounts. And while there is no easy way to stop them, there is, of course An approach that the United States has not yet tried. That’s why it’s gratifying that the FCC seems to be finally paying attention to them; The company said this week that it plans to pressure carriers to implement more secure authentication before transferring numbers to a new device. This will not solve the problem completely – especially since the phone company employees sometimes Actively active Attack – but it’s a long delayed start.
Russia has continued Break down every aspect of the country’s technology, Which has taken a worrying turn this week. The country’s law enforcement agency has arrested Ilya Sachkov, founder and chief executive of the St. Petersburg-based cyber security firm Group-IB. He is accused of working with “foreign intelligence agencies” to undermine Russia’s national interests; The agency said he was innocent of all charges. If convicted, Sachkov could face up to 20 years in prison.
Security researchers this week pointed out a flaw in how Visa apples Apple Pay’s “Express Transit” feature, which allows them to make unauthorized payments from a locked iPhone. First, they disguised the ticket barrier of a transit system using a cheap radio device, so that the iPhone felt like it was connecting to a legitimate system. Then, they use a so-called relay attack to send payment messages directly from the iPhone to the reader under their control, so that they can make large transactions without the need for any biometric verification. This is an issue that will primarily apply to stolen iPhones, and Apple said in a statement to the BBC that Visa is unlikely to recover due to the relative complexity of the attack.
We write a lot ransomware Its various detrimental effects here and in society. But Attacks continue to increase– Against Especially hospitalsRead You should take some time to read it The Wall Street Journal Report on actual human consumption. This is a devastating but essential reading.
More great cable stories