Wed. Oct 27th, 2021


As full Its effect The SB8 abortion law in Texas comes to the fore, Internet infrastructure companies have become an impossible focal point. There are multiple hosting and domain registration providers An abortion ‘whistle blower’ has refused to provide services on the site For breach of the Terms of Service relating to the collection of third party information. The site aims to collect tips for those who have had, performed, or made abortions available in Texas. The site has been closed for more than a week.

Meanwhile, as Apple Involved in debate On his proposed – but Pause now-Planning Scan iPhone for elements of child sexual abuse, WhatsApp moved this week Plug in its biggest end-to-end encryption trap. Publicly secure communication platforms can’t peek your messages at any time during your digital journey, but if you back up your chats to third-party cloud services like iCloud or Google Cloud, the messages will no longer be encrypted. With some clever cryptography, the service was able to create a method for encrypting backups before sending them for storage in the cloud.

After handing over the IP address of the law enforcement, the secure email service Protonmail said this week that it Updating its policy To make it clearer what customer metadata can legally collect. The service insisted, however, that the actual content of emails sent on the platform was always end-to-end encrypted and unread, even up to Protonmail.

And 20 years after the September 11, 2001 attacks, privacy researchers still think the tragedy will continue. Impact on surveillance attitudes In the United States.

But wait, there’s more! Every week we do not cover all the security news of WIRED in depth. Click on the title to read the full story, and stay safe there.

Russian tech giant Yandex said this week that in August and September it was the victim of an all-time recorded distributed denial-of-service or DDOS attack on the Internet. The flood of junk traffic, which meant suppressing systems and bringing them down, peaked on September 5, but Yandex successfully defended against that biggest barrage. “Our experts have been able to thwart a record attack of about 22 million requests per second,” the agency said in a statement. “This is the biggest attack in the history of the Internet.”

A Russian national was arrested at Seoul International Airport last week for working with the infamous malware gang Trickboat. Known in local media as Mr A, the man was trying to move to Russia after spending more than a year and a half in South Korea. Since arriving in February 2020, Mr. He was stranded in Seoul because of an international travel ban on the Kovid-1 pandemic epidemic. During this time his passport expired and Mr. AK had to get an apartment in Seoul while working on a replacement at the Russian embassy. At the same time, U.S. law enforcement officials have begun investigating the activities of Trikbot, specifically related to a botnet that helped the group carry out the 2020 Ransomware attack. During the investigation, the officers found Mr. Gathers evidence of A’s alleged work, including the possible 201 development of a malicious browser tool.

A bug in the United Kingdom version of McDonald’s exclusive VIP game has revealed the username and password of the game’s database to all winners. The error was reflected in data release emails from both game production and staging servers. The open source information includes details and certificates from the Microsoft Azure SQL database. A winner who received the certificate probably wouldn’t be able to log in to the production server because of the firewall, but would be able to access the staging server and grab potential winning codes for more prizes.

The hackers revealed 500,000 Fortinet VPN certificates, usernames and passwords, apparently collected from vulnerable devices last summer. From the bug that they used to collect data Patched, But some stolen certificates may still be valid. This allows bad actors to log into the organization’s Fortinet VPN and access their network to install malware, steal data, or carry out other attacks. The data dump published by a ransomware gang offshoot known as “Orange” was posted for free. “An old vulnerability to CVE-2018-13379 was fixed in May 2019,” Fortinet said in a statement. Sleeping computer. “If customers have not done so, we urge them to implement upgrades and mitigation immediately.”


More great cable stories



Source link

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *