Exclusive: More than 1,000 people at Twitter had ability to aid hack of accounts
More than a thousand Twitter employees and contractors as of earlier this year had access to internal tools that could change user account settings and hand control to others, two former employees said, making it hard to defend against the hacking that occurred last week.
Twitter Inc and the FBI are investigating the breach that allowed hackers to repeatedly tweet from verified accounts of the likes of Democratic presidential candidate Joe Biden, billionaire philanthropist Bill Gates, Tesla Chief Executive Elon Musk and former New York Mayor Mike Bloomberg.
Twitter said on Saturday that the perpetrators "manipulated a small number of employees and used their credentials" to log into tools and turn over access to 45 accounts. here On Wednesday, it said that the hackers could have read direct messages to and from 36 accounts but did not identify the affected users.
The former employees familiar with Twitter security practices said that too many people could have done the same thing, more than 1,000 as of earlier in 2020, including some at contractors like Cognizant.
Twitter declined to comment on that figure and would not say whether the number declined before the hack or since. The company was looking for a new security head, working to better secure its systems and training employees on resisting tricks from outsiders, Twitter said. Cognizant did not respond to a request for comment.
βThat sounds like there are too many people with access,β said Edward Amoroso, former chief security officer at AT&T. Responsibilities among the staff should have been split up, with access rights limited to those responsibilities and more than one person required to agree to make the most sensitive account changes. βIn order to do cyber security right, you canβt forget the boring stuff.β
Threats from insiders, especially lower-paid outside support staff, are a constant worry for companies serving large numbers of users, cyber security experts said. They said that the greater the number of people who can change key settings, the stronger oversight must be.
π ππΌ https://www.reuters.com/article/us-twitter-cyber-access-exclusive/exclusive-more-than-1000-people-at-twitter-had-ability-to-aid-hack-of-accounts-idUSKCN24O34E
#twitter #fraud #bitcoin #hacked
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
More than a thousand Twitter employees and contractors as of earlier this year had access to internal tools that could change user account settings and hand control to others, two former employees said, making it hard to defend against the hacking that occurred last week.
Twitter Inc and the FBI are investigating the breach that allowed hackers to repeatedly tweet from verified accounts of the likes of Democratic presidential candidate Joe Biden, billionaire philanthropist Bill Gates, Tesla Chief Executive Elon Musk and former New York Mayor Mike Bloomberg.
Twitter said on Saturday that the perpetrators "manipulated a small number of employees and used their credentials" to log into tools and turn over access to 45 accounts. here On Wednesday, it said that the hackers could have read direct messages to and from 36 accounts but did not identify the affected users.
The former employees familiar with Twitter security practices said that too many people could have done the same thing, more than 1,000 as of earlier in 2020, including some at contractors like Cognizant.
Twitter declined to comment on that figure and would not say whether the number declined before the hack or since. The company was looking for a new security head, working to better secure its systems and training employees on resisting tricks from outsiders, Twitter said. Cognizant did not respond to a request for comment.
βThat sounds like there are too many people with access,β said Edward Amoroso, former chief security officer at AT&T. Responsibilities among the staff should have been split up, with access rights limited to those responsibilities and more than one person required to agree to make the most sensitive account changes. βIn order to do cyber security right, you canβt forget the boring stuff.β
Threats from insiders, especially lower-paid outside support staff, are a constant worry for companies serving large numbers of users, cyber security experts said. They said that the greater the number of people who can change key settings, the stronger oversight must be.
π ππΌ https://www.reuters.com/article/us-twitter-cyber-access-exclusive/exclusive-more-than-1000-people-at-twitter-had-ability-to-aid-hack-of-accounts-idUSKCN24O34E
#twitter #fraud #bitcoin #hacked
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Reuters
Exclusive: More than 1,000 people at Twitter had ability to aid hack of accounts
SAN FRANCISCO (Reuters) - More than a thousand Twitter employees and contractors as of earlier this year had access to internal tools that could change user account settings and hand control to others, two former employees said, making it hard to defend againstβ¦
70: Ghost Exodus
Ghost Exodus
Ghost Exodus is a hacker. He conducted various illegal activities online. Some of which he documents on YouTube. Heβs also a great musician. He got into some trouble from his hacking. This is his story.
A big thanks to Ghost Exodus for sharing his story with us. Also thanks to Wesley McGrew for telling us the inside story.
π§ ππΌ https://darknetdiaries.com/episode/70/
#darknetdiaries #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Ghost Exodus is a hacker. He conducted various illegal activities online. Some of which he documents on YouTube. Heβs also a great musician. He got into some trouble from his hacking. This is his story.
A big thanks to Ghost Exodus for sharing his story with us. Also thanks to Wesley McGrew for telling us the inside story.
π§ ππΌ https://darknetdiaries.com/episode/70/
#darknetdiaries #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
U.S. hatches plan to build a quantum Internet that might be unhackable
The new network would sit alongside the existing Web, offering a more secure way to send and process information
U.S. officials and scientists unveiled a plan Thursday to pursue what they called one of the most important technological frontiers of the 21st century: building a quantum Internet.
Speaking in Chicago, one of the main hubs of the work, they set goals for forging what they called a second Internet β one that would function alongside the globeβs existing networks, using the laws of quantum mechanics to share information more securely and to connect a new generation of computers and sensors.
Quantum technology seeks to harness the distinct properties of atoms, photons and electrons to build more powerful computers and other tools for processing information. A quantum Internet relies on photons exhibiting a quantum state known as entanglement, which allows them to share information over long distances without having a physical connection.
David Awschalom, a professor at the University of Chicagoβs Pritzker School of Molecular Engineering and senior scientist at Argonne National Laboratory, called the Internet project a pillar of the nationβs quantum-research program.
βItβs the birth of a new technology. Itβs becoming a global competition. Every major country on earth has launched a quantum program β¦ because it is becoming clearer and clearer there will be big impacts,β he said in an interview.
π ππΌ From Long-distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshop
https://www.osti.gov/biblio/1638794
π ππΌ https://www.washingtonpost.com/technology/2020/07/23/us-plan-quantum-internet/
#usa #quantum #Internet #unhackable
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The new network would sit alongside the existing Web, offering a more secure way to send and process information
U.S. officials and scientists unveiled a plan Thursday to pursue what they called one of the most important technological frontiers of the 21st century: building a quantum Internet.
Speaking in Chicago, one of the main hubs of the work, they set goals for forging what they called a second Internet β one that would function alongside the globeβs existing networks, using the laws of quantum mechanics to share information more securely and to connect a new generation of computers and sensors.
Quantum technology seeks to harness the distinct properties of atoms, photons and electrons to build more powerful computers and other tools for processing information. A quantum Internet relies on photons exhibiting a quantum state known as entanglement, which allows them to share information over long distances without having a physical connection.
David Awschalom, a professor at the University of Chicagoβs Pritzker School of Molecular Engineering and senior scientist at Argonne National Laboratory, called the Internet project a pillar of the nationβs quantum-research program.
βItβs the birth of a new technology. Itβs becoming a global competition. Every major country on earth has launched a quantum program β¦ because it is becoming clearer and clearer there will be big impacts,β he said in an interview.
π ππΌ From Long-distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshop
https://www.osti.gov/biblio/1638794
π ππΌ https://www.washingtonpost.com/technology/2020/07/23/us-plan-quantum-internet/
#usa #quantum #Internet #unhackable
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
www.osti.gov
From Long-distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshopβ¦
The U.S. Department of Energy's Office of Scientific and Technical Information
Ubuntu Web OS with Firefox Browser coming soon
As the world is moving toward cloud-based services, we can perform almost every task using a single Web browser. This is one of the reasons why Chrome OS integrated with the Google Chrome web browser has become the most popular web-centric operating system.
Even though Chrome OS uses Linux kernel under the hood, it is exclusively available to run only on Googleβs hardware like Chromebook. Hence, if youβre looking for an alternative, soon youβll be able to experience the potential of cloud computing right on your laptop using Ubuntu Web.
Ubuntu Web OS With Firefox Browser
Ubuntu Web is a new project that aims to build a Chrome OS alternative operating system combining the power of Ubuntu Linux and Mozillaβs Firefox browser. Unlike Chrome OS, it is based on Firefox that you can probably run on any computer.
π ππΌ https://fossbytes.com/ubuntu-web-a-chrome-os-alternative-linux-with-firefox-coming-soon/
#linux #ubuntu #WebOS
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
As the world is moving toward cloud-based services, we can perform almost every task using a single Web browser. This is one of the reasons why Chrome OS integrated with the Google Chrome web browser has become the most popular web-centric operating system.
Even though Chrome OS uses Linux kernel under the hood, it is exclusively available to run only on Googleβs hardware like Chromebook. Hence, if youβre looking for an alternative, soon youβll be able to experience the potential of cloud computing right on your laptop using Ubuntu Web.
Ubuntu Web OS With Firefox Browser
Ubuntu Web is a new project that aims to build a Chrome OS alternative operating system combining the power of Ubuntu Linux and Mozillaβs Firefox browser. Unlike Chrome OS, it is based on Firefox that you can probably run on any computer.
π ππΌ https://fossbytes.com/ubuntu-web-a-chrome-os-alternative-linux-with-firefox-coming-soon/
#linux #ubuntu #WebOS
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Fossbytes
Ubuntu Web: A Chrome OS Alternative Linux With Firefox Coming Soon
Ubuntu Web is a new project that aims to build a Chrome OS alternative operating system combining the power of Ubuntu Linux and Mozilla's Firefox web browser. Unlike Chrome OS, it is based on Firefox that you can probably run on any computer.
Yes, TikTok Really Is Spying On You For ChinaβNew Report
Aa new report from the cyber experts at ProtonMail has called those denials into question. βBeware,β it warns, βthe social media giant not only collects troves of personal data on you, but also cooperates with the CCP, extending Chinaβs surveillance and censorship reach beyond its borders.β
π‘ ππΌ How much user data does TikTok collect?
As with just about every social media platform, the answer is: βa lot.β According to its privacy policy, even if you just download and open the app but never create an account, TikTok will collect your:
βοΈ IP address
βοΈ Browsing history (i.e., the content you viewed on TikTok)
βοΈ Mobile carrier
βοΈ Location data if you are using a mobile device (including GPS coordinates and WiFi and mobile cell data)
βοΈ Info on the device you used to access TikTok (for Android devices, this includes your IMEI number, which is essentially your deviceβs fingerprint so it can be identified, and potentially your IMSI number, which is used to track users from one phone to another)
βΌοΈ To open an account, you must enter a phone number or email and your date of birth. Once you have created an account, TikTok asks your permission for access to your social media accounts (like Twitter, Instagram, Facebook, etc.), your phoneβs contact list, and GPS data.
π‘ ππΌ Once you start using the app, TikTok logs details about:
βοΈ Every video you upload
βοΈ How long you watch videos
βοΈ Which videos you like
βοΈ Which videos you share
βΌοΈ Any messages you exchange in the app
π‘ βΌοΈ TikTokβs data collection is extreme, even for a social media platform that collects its usersβ data to serve them with targeted ads. And TikTok explicitly states in its privacy policy that it shares your browsing data and email address with third parties so that it can serve you with targeted advertising.
ππΌ https://protonmail.com/blog/tiktok-privacy
ππΌ https://www.forbes.com/sites/zakdoffman/2020/07/25/beware-tiktok-really-is-spying-on-you-new-security-report-update-trump-pompeo-china-warning/
#DeleteTikTok #tiktok #china #usa #security #privacy #report #protonmail #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Aa new report from the cyber experts at ProtonMail has called those denials into question. βBeware,β it warns, βthe social media giant not only collects troves of personal data on you, but also cooperates with the CCP, extending Chinaβs surveillance and censorship reach beyond its borders.β
π‘ ππΌ How much user data does TikTok collect?
As with just about every social media platform, the answer is: βa lot.β According to its privacy policy, even if you just download and open the app but never create an account, TikTok will collect your:
βοΈ IP address
βοΈ Browsing history (i.e., the content you viewed on TikTok)
βοΈ Mobile carrier
βοΈ Location data if you are using a mobile device (including GPS coordinates and WiFi and mobile cell data)
βοΈ Info on the device you used to access TikTok (for Android devices, this includes your IMEI number, which is essentially your deviceβs fingerprint so it can be identified, and potentially your IMSI number, which is used to track users from one phone to another)
βΌοΈ To open an account, you must enter a phone number or email and your date of birth. Once you have created an account, TikTok asks your permission for access to your social media accounts (like Twitter, Instagram, Facebook, etc.), your phoneβs contact list, and GPS data.
π‘ ππΌ Once you start using the app, TikTok logs details about:
βοΈ Every video you upload
βοΈ How long you watch videos
βοΈ Which videos you like
βοΈ Which videos you share
βΌοΈ Any messages you exchange in the app
π‘ βΌοΈ TikTokβs data collection is extreme, even for a social media platform that collects its usersβ data to serve them with targeted ads. And TikTok explicitly states in its privacy policy that it shares your browsing data and email address with third parties so that it can serve you with targeted advertising.
ππΌ https://protonmail.com/blog/tiktok-privacy
ππΌ https://www.forbes.com/sites/zakdoffman/2020/07/25/beware-tiktok-really-is-spying-on-you-new-security-report-update-trump-pompeo-china-warning/
#DeleteTikTok #tiktok #china #usa #security #privacy #report #protonmail #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Proton
TikTok and the privacy perils of Chinaβs first international social media platform | Proton
TikTok is the fastest growing social media platform in the world. However, its links to the Chinese government also pose a major privacy problem
A vigilante hacker is sabotaging the Emotet botnet by replacing malware payloads with GIFs
Emotet botnet activity goes down as Emotet admins are wrestling with a vigilante for control over parts of their infrastructure.
An unknown vigilante hacker has been sabotaging the operations of the recently-revived Emotet botnet by replacing Emotet payloads with animated GIFs, effectively preventing victims from getting infected.
The sabotage, which started three days ago, on July 21, has grown from a simple joke to a serious issue impacting a large portion of the Emotet operation.
According to Cryptolaemus, a group of white-hat security researchers tracking the Emotet botnet, the vigilante is now poisoning around a quarter of all Emotet's payload downloads.
π ππΌ https://www.zdnet.com/article/a-vigilante-is-sabotaging-the-emotet-botnet-by-replacing-malware-payloads-with-gifs/
#emotet #hacked #malware #botnet #Cryptolaemus
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Emotet botnet activity goes down as Emotet admins are wrestling with a vigilante for control over parts of their infrastructure.
An unknown vigilante hacker has been sabotaging the operations of the recently-revived Emotet botnet by replacing Emotet payloads with animated GIFs, effectively preventing victims from getting infected.
The sabotage, which started three days ago, on July 21, has grown from a simple joke to a serious issue impacting a large portion of the Emotet operation.
According to Cryptolaemus, a group of white-hat security researchers tracking the Emotet botnet, the vigilante is now poisoning around a quarter of all Emotet's payload downloads.
π ππΌ https://www.zdnet.com/article/a-vigilante-is-sabotaging-the-emotet-botnet-by-replacing-malware-payloads-with-gifs/
#emotet #hacked #malware #botnet #Cryptolaemus
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
ZDNet
A vigilante is sabotaging the Emotet botnet by replacing malware payloads with GIFs
Emotet botnet activity goes down as Emotet admins are wrestling with a vigilante for control over parts of their infrastructure.
San Francisco Police Accessed Business District Camera Network to Spy on Protestors
The San Francisco Police Department (SFPD) conducted mass surveillance of protesters at the end of May and in early June using a downtown business district's camera network, according to new records obtained by EFF. The records show that SFPD received real-time live access to hundreds of cameras as well as a "data dump" of camera footage amid the ongoing demonstrations against police violence.
The camera network is operated by the Union Square Business Improvement District (BID), a special taxation district created by the City and County of San Francisco, but operated by a private non-profit organization. These networked cameras, manufactured by Motorola Solutions' brand Avigilon, are high definition, can zoom in on a person's face to capture face-recognition ready images, and are linked to a software system that can automatically analyze content, including distinguishing between when a car or a person passes within the frame. Motorola Solutions recently unveiled plans to expand its portfolio of tools for aiding public-private partnerships with law enforcement by making it easier for police to gain access to private cameras and video analytic tools like license plate readers.
π ππΌ https://www.eff.org/deeplinks/2020/07/san-francisco-police-accessed-business-district-camera-network-spy-protestors
#USA #police #surveillance #SFPD #BID
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The San Francisco Police Department (SFPD) conducted mass surveillance of protesters at the end of May and in early June using a downtown business district's camera network, according to new records obtained by EFF. The records show that SFPD received real-time live access to hundreds of cameras as well as a "data dump" of camera footage amid the ongoing demonstrations against police violence.
The camera network is operated by the Union Square Business Improvement District (BID), a special taxation district created by the City and County of San Francisco, but operated by a private non-profit organization. These networked cameras, manufactured by Motorola Solutions' brand Avigilon, are high definition, can zoom in on a person's face to capture face-recognition ready images, and are linked to a software system that can automatically analyze content, including distinguishing between when a car or a person passes within the frame. Motorola Solutions recently unveiled plans to expand its portfolio of tools for aiding public-private partnerships with law enforcement by making it easier for police to gain access to private cameras and video analytic tools like license plate readers.
π ππΌ https://www.eff.org/deeplinks/2020/07/san-francisco-police-accessed-business-district-camera-network-spy-protestors
#USA #police #surveillance #SFPD #BID
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Electronic Frontier Foundation
San Francisco Police Accessed Business District Camera Network to Spy on Protestors
The San Francisco Police Department (SFPD) conducted mass surveillance of protesters at the end of May and in early June using a downtown business district's camera network, according to new records
Media is too big
VIEW IN TELEGRAM
The ultimate Galaksija talk - Everything about a Yugoslavian microcomputer halfway between a TRS-80 and a ZX 80
#Galaksija was to be in #Yugoslavia what #Commodore and #Sinclair were in the west. Whether it succeeded or not, its deceptively simple design can still teach us a lot of interesting tricks on how to make a usable computer and operating system with as few transistors and bits as possible.
πΊ ππΌ https://cdn.media.ccc.de/congress/2012/mp4-h264-HQ/29c3-5178-en-the_ultimate_galaksija_talk_h264.mp4
π§ ππΌ https://cdn.media.ccc.de/congress/2012/mp3-audio-only/29c3-5178-en-the_ultimate_galaksija_talk_mp3.mp3
#29c3 #ccc #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
#Galaksija was to be in #Yugoslavia what #Commodore and #Sinclair were in the west. Whether it succeeded or not, its deceptively simple design can still teach us a lot of interesting tricks on how to make a usable computer and operating system with as few transistors and bits as possible.
πΊ ππΌ https://cdn.media.ccc.de/congress/2012/mp4-h264-HQ/29c3-5178-en-the_ultimate_galaksija_talk_h264.mp4
π§ ππΌ https://cdn.media.ccc.de/congress/2012/mp3-audio-only/29c3-5178-en-the_ultimate_galaksija_talk_mp3.mp3
#29c3 #ccc #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Forwarded from NoGoolag
Don't use VPN services. (For anything else than their intended purpose, which is NOT anonymity)
https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
TL;DR: Using a VPN does not make you anonymous and you shouldn't trust "no log policies".
Use Tor for browsing.
VPN protocols:
OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019)
What are VPN protocols and why do you need to understand the different options?
β What is IPSec?
https://t.iss.one/BlackBox_Archiv/66
β What is IKEv2/IPSec?
β L2TP/IPSec
https://t.iss.one/BlackBox_Archiv/67
βWireGuard
β PPTP
β SSTP
https://t.iss.one/BlackBox_Archiv/68
β OpenVPN UDP vs OpenVPN TCP
β What is the best VPN protocol?
β VPN protocols conclusion
https://t.iss.one/BlackBox_Archiv/69
Why you should not use Tor with VPN (neither Tor over VPN nor VPN over Tor, unless you have some special needs or you cannot access Tor even using bridges):
https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required
#OpenVPN #IPSec #L2TP #IKEv2 #WireGuard #guide
https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
TL;DR: Using a VPN does not make you anonymous and you shouldn't trust "no log policies".
Use Tor for browsing.
VPN protocols:
OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019)
What are VPN protocols and why do you need to understand the different options?
β What is IPSec?
https://t.iss.one/BlackBox_Archiv/66
β What is IKEv2/IPSec?
β L2TP/IPSec
https://t.iss.one/BlackBox_Archiv/67
βWireGuard
β PPTP
β SSTP
https://t.iss.one/BlackBox_Archiv/68
β OpenVPN UDP vs OpenVPN TCP
β What is the best VPN protocol?
β VPN protocols conclusion
https://t.iss.one/BlackBox_Archiv/69
Why you should not use Tor with VPN (neither Tor over VPN nor VPN over Tor, unless you have some special needs or you cannot access Tor even using bridges):
https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required
#OpenVPN #IPSec #L2TP #IKEv2 #WireGuard #guide
overengineer.dev
VPN - a Very Precarious Narrative - Dennis Schubert
A very long article about commercial VPNs, their marketing strategies, and the truth behind their privacy and security claims.
Hackers post fake stories on real news sites 'to discredit Nato'
Hackers have broken into real news websites and posted fake stories stirring up anti-Nato sentiment, a cyber-security firm has warned.
The disinformation campaign, nicknamed "ghostwriter", has been ongoing since 2017, according to FireEye researchers.
It is designed to "chip away" at support for Nato in Lithuania, Latvia, and Poland, they said.
While the false stories are "aligned with Russian security interests", it is not known who is behind the attack.
The disinformation campaign uses "falsified news articles, quotes, correspondence and other documents designed to appear as coming from military officials and political figures in the target countries," FireEye said.
In some cases, false news stories were posted on real news websites without permission.
News websites typically use a content management system (CMS) to handle the large number of articles published.
The attackers apparently gained access to the CMS of the target website and replaced old articles with their own content, or posted entirely new false articles.
They would try to spread the fake stories on social media before they were taken down.
In one example from last year, a Lithuanian news site published a fake article claiming that German soldiers had desecrated a Jewish cemetery.
In another, a fake message was posted to the Polish War Studies Academy website, claiming to be from the organisation's commander. It called for troops to fight against "the American occupation".
π ππΌ https://www.bbc.com/news/technology-53594440
#hacker #news #fakenews #nato
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Hackers have broken into real news websites and posted fake stories stirring up anti-Nato sentiment, a cyber-security firm has warned.
The disinformation campaign, nicknamed "ghostwriter", has been ongoing since 2017, according to FireEye researchers.
It is designed to "chip away" at support for Nato in Lithuania, Latvia, and Poland, they said.
While the false stories are "aligned with Russian security interests", it is not known who is behind the attack.
The disinformation campaign uses "falsified news articles, quotes, correspondence and other documents designed to appear as coming from military officials and political figures in the target countries," FireEye said.
In some cases, false news stories were posted on real news websites without permission.
News websites typically use a content management system (CMS) to handle the large number of articles published.
The attackers apparently gained access to the CMS of the target website and replaced old articles with their own content, or posted entirely new false articles.
They would try to spread the fake stories on social media before they were taken down.
In one example from last year, a Lithuanian news site published a fake article claiming that German soldiers had desecrated a Jewish cemetery.
In another, a fake message was posted to the Polish War Studies Academy website, claiming to be from the organisation's commander. It called for troops to fight against "the American occupation".
π ππΌ https://www.bbc.com/news/technology-53594440
#hacker #news #fakenews #nato
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Bbc
Hackers post fake stories on real news sites 'to discredit Nato'
Researchers say articles on genuine sites were replaced with ones that matched Russia's interests.
Chile picks Japan's trans-Pacific cable route in snub to China
Decision a blow to Huawei and Chinese telecom sector
TOKYO/SAO PAULO -- Chile has chosen a route proposed by Japan for the first fiber-optic cable to directly connect South America and the Asia-Pacific region, designating Australia and New Zealand as endpoints while stopping short of landing in China, Nikkei has learned.
Japan's route beat out a pitch by China that would have made Shanghai the final landing point. This decision comes amid a U.S. pressure campaign to keep China out of global telecommunication projects.
Under the Japanese proposal, the undersea fiber-optic cable would stretch roughly 13,000 km across the Pacific Ocean, pass through New Zealand then arrive at its terminus in Sydney. The Chilean government says this route is recommended the most based on cost and feasibility.
Japan and Australia just completed their own submarine cable linking the two countries this month, meaning Japan could easily connect to the trans-Pacific cable. Both Australia and New Zealand share deep ties with Chile through the Trans-Pacific Partnership, the trade deal that Japan has pushed for.
The Japanese proposal to Chile took into account Australia's hard-line position against China, exemplified by Canberra's decision to blacklist China's Huawei Technologies from its 5G infrastructure.
Chile was caught in the geopolitical crossfire as China, its largest trading partner, lobbied heavily for cable plan to have Shanghai as its terminus. When Chilean President Sebastian Pinera visited Beijing in April last year, Huawei pledged to invest in data centers in Chile.
Huawei initially emerged as the leading candidate for the undersea cable. But the South American country was unable to ignore U.S. intentions in diplomacy and trade.
π ππΌ https://asia.nikkei.com/Business/Telecommunication/Chile-picks-Japan-s-trans-Pacific-cable-route-in-snub-to-China
#telecommunication #Chile #Japan #China #Huawei #USA
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Decision a blow to Huawei and Chinese telecom sector
TOKYO/SAO PAULO -- Chile has chosen a route proposed by Japan for the first fiber-optic cable to directly connect South America and the Asia-Pacific region, designating Australia and New Zealand as endpoints while stopping short of landing in China, Nikkei has learned.
Japan's route beat out a pitch by China that would have made Shanghai the final landing point. This decision comes amid a U.S. pressure campaign to keep China out of global telecommunication projects.
Under the Japanese proposal, the undersea fiber-optic cable would stretch roughly 13,000 km across the Pacific Ocean, pass through New Zealand then arrive at its terminus in Sydney. The Chilean government says this route is recommended the most based on cost and feasibility.
Japan and Australia just completed their own submarine cable linking the two countries this month, meaning Japan could easily connect to the trans-Pacific cable. Both Australia and New Zealand share deep ties with Chile through the Trans-Pacific Partnership, the trade deal that Japan has pushed for.
The Japanese proposal to Chile took into account Australia's hard-line position against China, exemplified by Canberra's decision to blacklist China's Huawei Technologies from its 5G infrastructure.
Chile was caught in the geopolitical crossfire as China, its largest trading partner, lobbied heavily for cable plan to have Shanghai as its terminus. When Chilean President Sebastian Pinera visited Beijing in April last year, Huawei pledged to invest in data centers in Chile.
Huawei initially emerged as the leading candidate for the undersea cable. But the South American country was unable to ignore U.S. intentions in diplomacy and trade.
π ππΌ https://asia.nikkei.com/Business/Telecommunication/Chile-picks-Japan-s-trans-Pacific-cable-route-in-snub-to-China
#telecommunication #Chile #Japan #China #Huawei #USA
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Nikkei Asia
Chile picks Japan's trans-Pacific cable route in snub to China
Decision a blow to Huawei and Chinese telecom sector
Facebook Q2 2020 Earnings
π ππΌ https://investor.fb.com/investor-events/event-details/2020/Facebook-Q2-2020-Earnings-/default.aspx
#DeleteFacebook #earnings
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
π ππΌ https://investor.fb.com/investor-events/event-details/2020/Facebook-Q2-2020-Earnings-/default.aspx
#DeleteFacebook #earnings
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Employee vulnerability: Twitter publishes update on account hack
Twitter has explained how the hack on July 15th could have happened: To gain access to Twitter accounts of celebrities like Elon Musk, Barack Obama and Bill Gates, the hackers did not have to code - they just had to appear credible.
The cause of the big Twitter hack was a spear phishing attack. So the hackers' gateway was not technical, but human. A small number of employees were specifically contacted and deceived, Twitter reports. This is how the hackers gained access to the accounts.
Selectively deceiving individual employees
The employees concerned had been contacted by telephone and persuaded to grant access to the internal network and employee ID cards. Some of the affected employees were authorized to use account management tools. This also gave hackers access to them.
For other employees with fewer rights, the attackers took a detour and used the stolen identities to contact other employees to get access to the relevant tools.
In this way, the attackers gained access to 130 accounts, published tweets about 45 of them, read the direct messages of 36 and stored the data of seven.
π ππΌ https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html
π ππΌ π©πͺ https://t3n.de/news/twitter-hack-spear-phishing-1305797
#twitter #hacker #fraud #bitcoin #hacked #phishing
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Twitter has explained how the hack on July 15th could have happened: To gain access to Twitter accounts of celebrities like Elon Musk, Barack Obama and Bill Gates, the hackers did not have to code - they just had to appear credible.
The cause of the big Twitter hack was a spear phishing attack. So the hackers' gateway was not technical, but human. A small number of employees were specifically contacted and deceived, Twitter reports. This is how the hackers gained access to the accounts.
Selectively deceiving individual employees
The employees concerned had been contacted by telephone and persuaded to grant access to the internal network and employee ID cards. Some of the affected employees were authorized to use account management tools. This also gave hackers access to them.
For other employees with fewer rights, the attackers took a detour and used the stolen identities to contact other employees to get access to the relevant tools.
In this way, the attackers gained access to 130 accounts, published tweets about 45 of them, read the direct messages of 36 and stored the data of seven.
π ππΌ https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html
π ππΌ π©πͺ https://t3n.de/news/twitter-hack-spear-phishing-1305797
#twitter #hacker #fraud #bitcoin #hacked #phishing
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Twitter
An update on our security incident
An update on our security incident and what we know so far.
Media is too big
VIEW IN TELEGRAM
Florida teen, two others charged in Twitter 'Bit-Con' hacking attack
Authorities in Florida say a 17 year old was the "mastermind" of the attack that targeted the accounts of Barack Obama, Joe Biden, Kanye West, Bill Gates and others.
π ππΌ https://www.nbcnews.com/politics/justice-department/florida-teen-charged-twitter-bit-con-hacking-attack-n1235506
π ππΌ https://thehackernews.com/2020/07/twitter-hacker-arrested.html
#twitter #hacker #fraud #bitcoin #hacked #phishing #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Authorities in Florida say a 17 year old was the "mastermind" of the attack that targeted the accounts of Barack Obama, Joe Biden, Kanye West, Bill Gates and others.
π ππΌ https://www.nbcnews.com/politics/justice-department/florida-teen-charged-twitter-bit-con-hacking-attack-n1235506
π ππΌ https://thehackernews.com/2020/07/twitter-hacker-arrested.html
#twitter #hacker #fraud #bitcoin #hacked #phishing #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Navajo Code Talkers and the Unbreakable Code
In the heat of battle, it is of the utmost importance that messages are delivered and received as quickly as possible. It is even more crucial that these messages are encoded so the enemy does not know about plans in advance.
During World War II, the Marine Corps used one of the thousands of languages spoken in the world to create an unbreakable code: Navajo.
World War II wasnβt the first time a Native American language was used to create a code.
During World War I, the Choctaw language was used in the transmission of secret tactical messages. It was instrumental in a successful surprise attack against the Germans.
Germany and Japan sent students to the United States after World War I to study Native American languages and cultures, such as Cherokee, Choctaw, and Comanche.
Because of this, many members of the U.S. military services were uneasy about continuing to use Code Talkers during World War II. They were afraid the code would be easily cracked, but that was before they learned about the complexity of Navajo.
π ππΌ https://web.archive.org/web/20200801142553/https://www.cia.gov/news-information/featured-story-archive/2008-featured-story-archive/navajo-code-talkers/
#Navajo #CodeTalkers #USA #Germany #Japan #WW2 #WW1
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
In the heat of battle, it is of the utmost importance that messages are delivered and received as quickly as possible. It is even more crucial that these messages are encoded so the enemy does not know about plans in advance.
During World War II, the Marine Corps used one of the thousands of languages spoken in the world to create an unbreakable code: Navajo.
World War II wasnβt the first time a Native American language was used to create a code.
During World War I, the Choctaw language was used in the transmission of secret tactical messages. It was instrumental in a successful surprise attack against the Germans.
Germany and Japan sent students to the United States after World War I to study Native American languages and cultures, such as Cherokee, Choctaw, and Comanche.
Because of this, many members of the U.S. military services were uneasy about continuing to use Code Talkers during World War II. They were afraid the code would be easily cracked, but that was before they learned about the complexity of Navajo.
π ππΌ https://web.archive.org/web/20200801142553/https://www.cia.gov/news-information/featured-story-archive/2008-featured-story-archive/navajo-code-talkers/
#Navajo #CodeTalkers #USA #Germany #Japan #WW2 #WW1
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
web.archive.org
Navajo Code Talkers and the Unbreakable Code β Central Intelligence Agency
November 6, 2008 - In the heat of battle, it is of the utmost importance that messages are delivered and received as quickly as possible. It is even more crucial that these messages are encoded so the enemy does not know about plans in advance. During Worldβ¦
Ransomware gang publishes tens of GBs of internal data from LG and Xerox
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
The operators of the Maze ransomware have published today tens of GB of internal data from the networks of enterprise business giants LG and Xerox following two failed extortion attempts.
The hackers leaked 50.2 GB they claim to have stolen from LG's internal network, and 25.8 GB of Xerox data.
While LG issued a generic statement to ZDNet in June, neither company wanted to talk about the incident in great depth today.
Both of today's leaks have been teased since late June when the operators of the Maze ransomware created entries for each of the two companies on their "leak portal."
The Maze gang is primarily known for its eponymous ransomware string and usually operates by breaching corporate networks, stealing sensitive files first, encrypting data second, and demanding a ransom to decrypt files.
If a victim refuses to pay the fee to decrypt their files and decides to restore from backups, the Maze gang creates an entry on a "leak website" and threatens to publish the victim's sensitive data in a second form ransom/extortion attempt.
The victim is then given a few weeks to think over its decision, and if victims don't give in during this second extortion attempt, the Maze gang will publish files on its portal.
LG and Xerox are at this last stage, after apparently refusing to meet the Maze gang's demands.
π ππΌ https://www.zdnet.com/article/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/
π ππΌ π©πͺ https://www.golem.de/news/datenleck-ransomwaregruppe-veroeffentlicht-daten-von-lg-und-xerox-2008-150044.html
#maze #ransomware #lg #xerox #extortion
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
The operators of the Maze ransomware have published today tens of GB of internal data from the networks of enterprise business giants LG and Xerox following two failed extortion attempts.
The hackers leaked 50.2 GB they claim to have stolen from LG's internal network, and 25.8 GB of Xerox data.
While LG issued a generic statement to ZDNet in June, neither company wanted to talk about the incident in great depth today.
Both of today's leaks have been teased since late June when the operators of the Maze ransomware created entries for each of the two companies on their "leak portal."
The Maze gang is primarily known for its eponymous ransomware string and usually operates by breaching corporate networks, stealing sensitive files first, encrypting data second, and demanding a ransom to decrypt files.
If a victim refuses to pay the fee to decrypt their files and decides to restore from backups, the Maze gang creates an entry on a "leak website" and threatens to publish the victim's sensitive data in a second form ransom/extortion attempt.
The victim is then given a few weeks to think over its decision, and if victims don't give in during this second extortion attempt, the Maze gang will publish files on its portal.
LG and Xerox are at this last stage, after apparently refusing to meet the Maze gang's demands.
π ππΌ https://www.zdnet.com/article/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/
π ππΌ π©πͺ https://www.golem.de/news/datenleck-ransomwaregruppe-veroeffentlicht-daten-von-lg-und-xerox-2008-150044.html
#maze #ransomware #lg #xerox #extortion
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
ZDNET
Ransomware gang publishes tens of GBs of internal data from LG and Xerox
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
71: FDFF
Darknetdiaries - EP 71: FDFF
In this episode, weβre going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime.
π§ ππΌ https://darknetdiaries.com/episode/71/
#darknetdiaries #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
In this episode, weβre going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime.
π§ ππΌ https://darknetdiaries.com/episode/71/
#darknetdiaries #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
US will ban Tiktok on September 15 unless an American company buys it, says Trump
WASHINGTON: US President Donald Trump on Monday said the popular Chinese app, TikTok, would be banned in the country beginning September 15, unless it is bought by an American company and asserted that a substantial amount of the buyout deal should go to the treasury.
Technology giant Microsoft is in talks with TikTok's parent company ByteDance to buy its US operation.
However, the president is in favour of a complete 100 per cent purchase and not the 30 per cent as reportedly being negotiated now.
Trump confirmed to reporters that he spoke to Microsoft's India-born CEO Satya Nadella on the issue.
"We had a great conversation. He (Nadella) called me to see how I felt about it. I said, look, it can't be controlled for security reasons by China...(its) too big, too invasive. It can't be...I don't mind whether it's Microsoft or somebody else, a big company...American company buys it. It's probably easier to buy the whole thing rather than to buy 30 per cent of it," Trump told reporters in the Cabinet Room of the White House.
"I said how do you do 30 per cent? Who's going to get the name. The name is hot. The brand is hot. Who's going to get the name and who is going to get that when it's owned by two different companies. So, my personal opinion was, you probably better off buying the whole thing rather than buying 30 per cent of it. I think buying 30 per cent is complicated and I suggested that he can go ahead. He can try," he said.
Trump said he has "set a date at around September 15 at which point it (TikTok) is going to be out of business in the United States".
However, he said, "If somebody, whether it's Microsoft or somebody else buys it. That would be interesting, I did say that if you buy it, whatever the price is that goes to whoever owns it."
Trump said there would have to be a substantial payment to the US government as part of the deal.
π ππΌ https://timesofindia.indiatimes.com/world/us/us-will-ban-tiktok-on-sept-15-unless-an-american-company-buys-it-says-trump/articleshow/77338623.cms
#ToddlerTrump #USA #TikTok #DeleteTikTok
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
WASHINGTON: US President Donald Trump on Monday said the popular Chinese app, TikTok, would be banned in the country beginning September 15, unless it is bought by an American company and asserted that a substantial amount of the buyout deal should go to the treasury.
Technology giant Microsoft is in talks with TikTok's parent company ByteDance to buy its US operation.
However, the president is in favour of a complete 100 per cent purchase and not the 30 per cent as reportedly being negotiated now.
Trump confirmed to reporters that he spoke to Microsoft's India-born CEO Satya Nadella on the issue.
"We had a great conversation. He (Nadella) called me to see how I felt about it. I said, look, it can't be controlled for security reasons by China...(its) too big, too invasive. It can't be...I don't mind whether it's Microsoft or somebody else, a big company...American company buys it. It's probably easier to buy the whole thing rather than to buy 30 per cent of it," Trump told reporters in the Cabinet Room of the White House.
"I said how do you do 30 per cent? Who's going to get the name. The name is hot. The brand is hot. Who's going to get the name and who is going to get that when it's owned by two different companies. So, my personal opinion was, you probably better off buying the whole thing rather than buying 30 per cent of it. I think buying 30 per cent is complicated and I suggested that he can go ahead. He can try," he said.
Trump said he has "set a date at around September 15 at which point it (TikTok) is going to be out of business in the United States".
However, he said, "If somebody, whether it's Microsoft or somebody else buys it. That would be interesting, I did say that if you buy it, whatever the price is that goes to whoever owns it."
Trump said there would have to be a substantial payment to the US government as part of the deal.
π ππΌ https://timesofindia.indiatimes.com/world/us/us-will-ban-tiktok-on-sept-15-unless-an-american-company-buys-it-says-trump/articleshow/77338623.cms
#ToddlerTrump #USA #TikTok #DeleteTikTok
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The Times of India
US Ban Tiktok: US will ban Tiktok on September 15 unless an American company buys it, says Trump | World News - Times of India
US News: US President Donald Trump on Monday said the popular Chinese app, TikTok, would be banned in the country beginning September 15, unless it is bought b
Europol Regulation - Plans for a "European FBI"
The EU Police Agency should be allowed to investigate and search for cross-border crimes. A proposal to this effect from the Commission is expected in December, and the German Council Presidency wants to support the initiative with a conference in Berlin. Civil rights groups warn about a " data washing machine".
Some of these demands will be reflected in the recast of the four year old Europol regulation that will be published by the European Commission on 6th December. The German Interior Ministry plans to organise a conference on the "future of Europol" on 21st and 22nd October in Berlin and the annual meeting of European police chiefs on 1st and 2nd October in The Hague will also look into the new regulation.
The main pillars of the proposal are already known. In a publication for a preliminary impact assessment, the Commission writes that Europol is to be strengthened to "deal with emerging threats". The scope of criminal offences for which Europol is competent will therefore be extended. The agency would then be able to conduct its own searches in the Schengen Information System (SIS II) and use the PrΓΌm framework for Europe-wide searches of biometric data.
π ππΌ https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12387-Strengthening-of-Europol-s-mandate
π ππΌ https://data.consilium.europa.eu/doc/document/ST-14745-2019-INIT/de/pdf
π ππΌ π©πͺ https://netzpolitik.org/2020/europol-verordnung-plaene-fuer-ein-europaeisches-fbi/
#eu #police #europol #fbi #biometric #data #regulation #schengen #pdf #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The EU Police Agency should be allowed to investigate and search for cross-border crimes. A proposal to this effect from the Commission is expected in December, and the German Council Presidency wants to support the initiative with a conference in Berlin. Civil rights groups warn about a " data washing machine".
Some of these demands will be reflected in the recast of the four year old Europol regulation that will be published by the European Commission on 6th December. The German Interior Ministry plans to organise a conference on the "future of Europol" on 21st and 22nd October in Berlin and the annual meeting of European police chiefs on 1st and 2nd October in The Hague will also look into the new regulation.
The main pillars of the proposal are already known. In a publication for a preliminary impact assessment, the Commission writes that Europol is to be strengthened to "deal with emerging threats". The scope of criminal offences for which Europol is competent will therefore be extended. The agency would then be able to conduct its own searches in the Schengen Information System (SIS II) and use the PrΓΌm framework for Europe-wide searches of biometric data.
π ππΌ https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12387-Strengthening-of-Europol-s-mandate
π ππΌ https://data.consilium.europa.eu/doc/document/ST-14745-2019-INIT/de/pdf
π ππΌ π©πͺ https://netzpolitik.org/2020/europol-verordnung-plaene-fuer-ein-europaeisches-fbi/
#eu #police #europol #fbi #biometric #data #regulation #schengen #pdf #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
European Commission - Have your say
Distributed Denial of Secrets: Questions wanted for an exclusive interview!
For an exclusive interview we have the makers of the collective DDoSecrets at hand. In contrast to other disclosure platforms, most leaks are not published on a website, but by telegram. Many actions are also announced on Twitter.
Distributed Denial of Secrets fights against dictatorships, corruption, police violence, tax evaders and much more
Last month the public prosecutor's office in Zwickau confiscated a server located in Germany. The reason was the so-called BlueLeaks, which activists of Distributed Denial of Secrets circulated. They distributed no less than 269 gigabytes, which had originally been hacked by a member of Anonymous. The extensive leak includes US police reports and documents. It includes bank details, names, email addresses, emails with attachments, phone numbers, photos, videos etc. pp. After receiving a request for legal assistance, the responsible public prosecutor's office became active the previous month.
π ππΌ Deadline for questions ends on August 20, 2020 ! ππΌ π
What do you want to know from the people who run it? They face a public interview for the first time! Our deadline ends in exactly 14 days. ππΌ ππΌ
π ππΌ π¬π§ https://tarnkappe.info/distributed-denial-of-secrets-questions-wanted-for-an-exclusive-interview/
π ππΌ π©πͺ https://tarnkappe.info/distributed-denial-of-secrets-fragen-fuer-ein-exklusives-interview-gesucht/
π‘ This exclusive interview with DDoSecrets will be published in German and English. Questions can therefore be submitted in both languages.
Please ask your questions either in the Tarnkappe Forum, or use one of the following Telegram-Groups:.
ππΌ Tarnkappe.info
ππΌ NoGoolag
Please do not forget to mark your question(s) with #DDoSecrets
#DDoSecrets #interview
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
For an exclusive interview we have the makers of the collective DDoSecrets at hand. In contrast to other disclosure platforms, most leaks are not published on a website, but by telegram. Many actions are also announced on Twitter.
Distributed Denial of Secrets fights against dictatorships, corruption, police violence, tax evaders and much more
Last month the public prosecutor's office in Zwickau confiscated a server located in Germany. The reason was the so-called BlueLeaks, which activists of Distributed Denial of Secrets circulated. They distributed no less than 269 gigabytes, which had originally been hacked by a member of Anonymous. The extensive leak includes US police reports and documents. It includes bank details, names, email addresses, emails with attachments, phone numbers, photos, videos etc. pp. After receiving a request for legal assistance, the responsible public prosecutor's office became active the previous month.
π ππΌ Deadline for questions ends on August 20, 2020 ! ππΌ π
What do you want to know from the people who run it? They face a public interview for the first time! Our deadline ends in exactly 14 days. ππΌ ππΌ
π ππΌ π¬π§ https://tarnkappe.info/distributed-denial-of-secrets-questions-wanted-for-an-exclusive-interview/
π ππΌ π©πͺ https://tarnkappe.info/distributed-denial-of-secrets-fragen-fuer-ein-exklusives-interview-gesucht/
π‘ This exclusive interview with DDoSecrets will be published in German and English. Questions can therefore be submitted in both languages.
Please ask your questions either in the Tarnkappe Forum, or use one of the following Telegram-Groups:.
ππΌ Tarnkappe.info
ππΌ NoGoolag
Please do not forget to mark your question(s) with #DDoSecrets
#DDoSecrets #interview
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Tarnkappe.info
Distributed Denial of Secrets: Questions wanted for an exclusive interview!
For an exclusive interview we have the makers of DDoSecrets on the pipe. You can submit your questions within the next 14 days.
Report: Hundreds of apps have hidden tracking software used by the government
A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.
The data gleaned from this tracking is then sold back to the US government for undisclosed purposes.
This tactic is deceptive because the tracking isnβt disclosed. However, it appears to be totally legal.
A new report today from The Wall Street Journal exposes yet another concerning development when it comes to mobile phone tracking. According to the report, at least one federal contractor puts government tracking software in over 500 mobile applications.
The contractor β a Virginia-based company called Anomaly Six LLC β pays mobile developers to include its in-house tracking code within their apps. The trackers then collect anonymized data from our phones and Anomaly Six aggregates that data and sells it to the US government.
It sounds crazy, but itβs happening. Whatβs more, it appears itβs totally legal.
π ππΌ https://www.androidauthority.com/government-tracking-apps-1145989/
π ππΌ https://www.wsj.com/articles/u-s-government-contractor-embedded-software-in-apps-to-track-phones-11596808801
#usa #government #tracking #software #apps #smartphones #data #surveillance #why #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.
The data gleaned from this tracking is then sold back to the US government for undisclosed purposes.
This tactic is deceptive because the tracking isnβt disclosed. However, it appears to be totally legal.
A new report today from The Wall Street Journal exposes yet another concerning development when it comes to mobile phone tracking. According to the report, at least one federal contractor puts government tracking software in over 500 mobile applications.
The contractor β a Virginia-based company called Anomaly Six LLC β pays mobile developers to include its in-house tracking code within their apps. The trackers then collect anonymized data from our phones and Anomaly Six aggregates that data and sells it to the US government.
It sounds crazy, but itβs happening. Whatβs more, it appears itβs totally legal.
π ππΌ https://www.androidauthority.com/government-tracking-apps-1145989/
π ππΌ https://www.wsj.com/articles/u-s-government-contractor-embedded-software-in-apps-to-track-phones-11596808801
#usa #government #tracking #software #apps #smartphones #data #surveillance #why #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Android Authority
Report: Hundreds of apps have hidden tracking software used by the government
According to a new report, there is government tracking software hidden in hundreds of apps. The software is undisclosed, put there by federal contractors.