Norway: E-mail accounts of members of parliament hacked
Emails of some members of the Norwegian parliament have apparently been hacked. The exact extent of the data outflow is still unclear.
The Norwegian Parliament announced on Tuesday that data had leaked from the e-mail accounts of some members and staff. The parliamentary administration had reported the incident to the police and was working closely with the relevant security authorities, the press release said. The incident had apparently already been noticed last week.
๐ ๐๐ผ https://www.stortinget.no/no/Hva-skjer-pa-Stortinget/Nyhetsarkiv/Pressemeldingsarkiv/2019-2020/it-angrep-mot-stortinget/
๐ ๐๐ผ ๐ฉ๐ช https://www.golem.de/news/norwegen-e-mail-accounts-von-abgeordneten-gehackt-2009-150627.html
#norway #hacker #hacked #representatives
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Emails of some members of the Norwegian parliament have apparently been hacked. The exact extent of the data outflow is still unclear.
The Norwegian Parliament announced on Tuesday that data had leaked from the e-mail accounts of some members and staff. The parliamentary administration had reported the incident to the police and was working closely with the relevant security authorities, the press release said. The incident had apparently already been noticed last week.
๐ ๐๐ผ https://www.stortinget.no/no/Hva-skjer-pa-Stortinget/Nyhetsarkiv/Pressemeldingsarkiv/2019-2020/it-angrep-mot-stortinget/
๐ ๐๐ผ ๐ฉ๐ช https://www.golem.de/news/norwegen-e-mail-accounts-von-abgeordneten-gehackt-2009-150627.html
#norway #hacker #hacked #representatives
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Stortinget
IT-angrep mot Stortinget
Stortinget har den siste tiden vรฆrt utsatt for et omfattende IT-angrep. Det er registrert innbrudd pรฅ epost-kontoene hos et mindre antall stortingsrepresentanter og ansatte. Vรฅre analyser viser at det er lastet ned ulike mengder data.
53: Shadow Brokers
Darknetdiaries - EP 53: Shadow Brokers
The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong personโs hands? Well, that happened.
๐ง ๐๐ผ Darknetdiaries - EP 53: Shadow Brokers
https://darknetdiaries.com/episode/53/
#darknetdiaries #truecrime #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong personโs hands? Well, that happened.
๐ง ๐๐ผ Darknetdiaries - EP 53: Shadow Brokers
https://darknetdiaries.com/episode/53/
#darknetdiaries #truecrime #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
73: WannaCry
Darknetdiaries - EP 73: WannaCry
๐ก It is recommend to listen to episodes 53 โShadow Brokersโ, 71 โFDFFโ, and 72 โBangladesh Bank Heistโ before listening to this one.
In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UKโs national health service. Security researchers scrambled to try to figure out how to stop it and who was behind it.
๐ง ๐๐ผ https://darknetdiaries.com/episode/73/
#darknetdiaries #truecrime #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ก It is recommend to listen to episodes 53 โShadow Brokersโ, 71 โFDFFโ, and 72 โBangladesh Bank Heistโ before listening to this one.
In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UKโs national health service. Security researchers scrambled to try to figure out how to stop it and who was behind it.
๐ง ๐๐ผ https://darknetdiaries.com/episode/73/
#darknetdiaries #truecrime #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Threema Goes Open Source, Welcomes New Partner
Strengthened Through Partnership
After an intense startup phase, Threema lays the foundation for continuity, further growth, and an acceleration of the product development thanks to the entry of the German-Swiss investment company Afinum Management AG.
Afinum fully shares our values regarding security and privacy protection. The additional resources gained through this partnership enable Threema to grow beyond the German-speaking part of Europe, and we can use our energy for visionary new ideas and projects. That said, Threemaโs founders โ Manuel Kasper, Silvan Engeler, and Martin Blatter, all software developers โ will continue to lead the company and still retain a significant ownership interest.
Open Source and Multi Device
Security and privacy protection are deeply ingrained in Threemaโs DNA, which is why our code gets reviewed externally on a regular basis. Within the next months, the Threema apps will become fully open source, supporting reproducible builds. This is to say that anyone will be able to independently review Threemaโs security and verify that the published source code corresponds to the downloaded app.
In the future, it will be possible to use multiple devices in parallel thanks to an innovative multi-device solution. In contrast to other approaches, no trace of personal data will be left behind on a server. Thanks to this technology, Threema can be used on a PC without a smartphone.
In conclusion, Threema will become even more trustworthy and even more convenient to use.
๐ ๐๐ผ https://threema.ch/en/blog/posts/open-source-and-new-partner
#threema #opensource #afinum #swiss #germany
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Strengthened Through Partnership
After an intense startup phase, Threema lays the foundation for continuity, further growth, and an acceleration of the product development thanks to the entry of the German-Swiss investment company Afinum Management AG.
Afinum fully shares our values regarding security and privacy protection. The additional resources gained through this partnership enable Threema to grow beyond the German-speaking part of Europe, and we can use our energy for visionary new ideas and projects. That said, Threemaโs founders โ Manuel Kasper, Silvan Engeler, and Martin Blatter, all software developers โ will continue to lead the company and still retain a significant ownership interest.
Open Source and Multi Device
Security and privacy protection are deeply ingrained in Threemaโs DNA, which is why our code gets reviewed externally on a regular basis. Within the next months, the Threema apps will become fully open source, supporting reproducible builds. This is to say that anyone will be able to independently review Threemaโs security and verify that the published source code corresponds to the downloaded app.
In the future, it will be possible to use multiple devices in parallel thanks to an innovative multi-device solution. In contrast to other approaches, no trace of personal data will be left behind on a server. Thanks to this technology, Threema can be used on a PC without a smartphone.
In conclusion, Threema will become even more trustworthy and even more convenient to use.
๐ ๐๐ผ https://threema.ch/en/blog/posts/open-source-and-new-partner
#threema #opensource #afinum #swiss #germany
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
threema.ch
Threema Goes Open Source, Welcomes New Partner
To Surveil and Predict - A Human Rights Analysis of Algorithmic Policing in Canada
This publication is the result of an investigation by the Citizen Lab at the Munk School of Global Affairs & Public Policy and the University of Torontoโs International Human Rights Program (IHRP) at the Faculty of Law. Read the full report and our explanatory guide that provides a summary of research findings as well as questions and answers from the research team.
๐ ๐๐ผ Read the full report (PDF)
https://citizenlab.ca/wp-content/uploads/2020/09/To-Surveil-and-Predict.pdf
๐ ๐๐ผ Algorithmic Policing in Canada Explained
https://citizenlab.ca/2020/09/algorithmic-policing-in-canada-explained/
๐ ๐๐ผ https://citizenlab.ca/2020/09/to-surveil-and-predict-a-human-rights-analysis-of-algorithmic-policing-in-canada/
#algorithmic #policing #canada #study #analysis #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
This publication is the result of an investigation by the Citizen Lab at the Munk School of Global Affairs & Public Policy and the University of Torontoโs International Human Rights Program (IHRP) at the Faculty of Law. Read the full report and our explanatory guide that provides a summary of research findings as well as questions and answers from the research team.
๐ ๐๐ผ Read the full report (PDF)
https://citizenlab.ca/wp-content/uploads/2020/09/To-Surveil-and-Predict.pdf
๐ ๐๐ผ Algorithmic Policing in Canada Explained
https://citizenlab.ca/2020/09/algorithmic-policing-in-canada-explained/
๐ ๐๐ผ https://citizenlab.ca/2020/09/to-surveil-and-predict-a-human-rights-analysis-of-algorithmic-policing-in-canada/
#algorithmic #policing #canada #study #analysis #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Warner Music Group finds hackers compromised its online stores
NOTICE OF DATA BREACH
On August 5, 2020, we learned that an unauthorized third party had compromised a number of US-based e-commerce
websites WMG operates but that are hosted and supported by an external service provider. This allowed the unauthorized third party to potentially acquire a copy of the personal information you entered into one or more of the affected website(s) between April 25, 2020 and August 5, 2020.
While we cannot definitively confirm that your personal information was affected, it is possible that it might have been
as your transaction(s) occurred during the period of compromise. If it was, this might have exposed you to a risk of
fraudulent transactions being carried out using your details.
๐ ๐๐ผ https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.txt
๐ ๐๐ผ (PDF)
https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.pdf
๐ ๐๐ผ https://www.bleepingcomputer.com/news/security/warner-music-group-finds-hackers-compromised-its-online-stores/
#warner #music #breach #hackers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
NOTICE OF DATA BREACH
On August 5, 2020, we learned that an unauthorized third party had compromised a number of US-based e-commerce
websites WMG operates but that are hosted and supported by an external service provider. This allowed the unauthorized third party to potentially acquire a copy of the personal information you entered into one or more of the affected website(s) between April 25, 2020 and August 5, 2020.
While we cannot definitively confirm that your personal information was affected, it is possible that it might have been
as your transaction(s) occurred during the period of compromise. If it was, this might have exposed you to a risk of
fraudulent transactions being carried out using your details.
๐ ๐๐ผ https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.txt
๐ ๐๐ผ (PDF)
https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.pdf
๐ ๐๐ผ https://www.bleepingcomputer.com/news/security/warner-music-group-finds-hackers-compromised-its-online-stores/
#warner #music #breach #hackers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
rC3 โ remote Chaos Experience
This year, CCC hosts the Remote Chaos Experience (rC3) instead of an on-site event in Leipzig.
๐ก This endeavor requires creativity, joy of experimentation and active support.
A face-to-face event with 17,000 people will be neither responsible nor legally feasible this year. But after this tedious and painful 2020, we really deserve a nice finale!
This is why the rC3 โ Remote Chaos Experience will be held.
As much as virtually possible, we want to convey the joy, content, togetherness and wonderful madness that make up a Chaos Communication Congress.
Hackers are used to remote work and online meetings. This makes our annual face-to-face meetings all the more important. Of course, it will be difficult to re-enact online all the things that make Congress what it is for us.
But then someone said it would be impossible. Our ambition was aroused.
Just like every year, we want to see the concentrated energy and creativity of hackers with dedication.
๐ ๐๐ผ https://events.ccc.de/2020/09/04/rc3-remote-chaos-experience/#english
#rC3 #CCC #RemoteChaosExperience
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
This year, CCC hosts the Remote Chaos Experience (rC3) instead of an on-site event in Leipzig.
๐ก This endeavor requires creativity, joy of experimentation and active support.
A face-to-face event with 17,000 people will be neither responsible nor legally feasible this year. But after this tedious and painful 2020, we really deserve a nice finale!
This is why the rC3 โ Remote Chaos Experience will be held.
As much as virtually possible, we want to convey the joy, content, togetherness and wonderful madness that make up a Chaos Communication Congress.
Hackers are used to remote work and online meetings. This makes our annual face-to-face meetings all the more important. Of course, it will be difficult to re-enact online all the things that make Congress what it is for us.
But then someone said it would be impossible. Our ambition was aroused.
Just like every year, we want to see the concentrated energy and creativity of hackers with dedication.
๐ ๐๐ผ https://events.ccc.de/2020/09/04/rc3-remote-chaos-experience/#english
#rC3 #CCC #RemoteChaosExperience
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
AlphaBay Darknet Market Moderator Handed 11-Year Prison Sentence
A former AlphaBay market moderator has been sentenced to 11 years in prison
A Colorado man who served as moderator for the now-defunct AlphaBay dark web market is set to spend 11 years of his life in prison.
Through a press statement by the U.S. Department of Justice (DOJ), authorities announced that the 26-year-old Bryan Connor Herrell has been sentenced by the U.S. District Court Judge Dale Drozd to 11 years behind bars.
The convict had initially faced charges in June 2019 for the part he played in enabling the sale of illicit goods and services via the AlphaBay market. The court session took place in the Eastern District of California, with the defendant pleading guilty in January 2020.
Reportedly, the DOJ had planned to set a hearing date for the manโs sentencing in May, but took place just recently owing to the government-sanctioned restrictions related to the current global COVID-19 crisis.
๐ ๐๐ผ https://tapeucwutvne7l5o.onion/alphabay-darknet-market-moderator-handed-11-year-prison-sentence
๐ ๐๐ผ https://www.justice.gov/opa/pr/colorado-man-sentenced-11-years-prison-moderating-disputes-darknet-marketplace-alphabay
#alphabay #marketplace #darknet #moderator #prison
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A former AlphaBay market moderator has been sentenced to 11 years in prison
A Colorado man who served as moderator for the now-defunct AlphaBay dark web market is set to spend 11 years of his life in prison.
Through a press statement by the U.S. Department of Justice (DOJ), authorities announced that the 26-year-old Bryan Connor Herrell has been sentenced by the U.S. District Court Judge Dale Drozd to 11 years behind bars.
The convict had initially faced charges in June 2019 for the part he played in enabling the sale of illicit goods and services via the AlphaBay market. The court session took place in the Eastern District of California, with the defendant pleading guilty in January 2020.
Reportedly, the DOJ had planned to set a hearing date for the manโs sentencing in May, but took place just recently owing to the government-sanctioned restrictions related to the current global COVID-19 crisis.
๐ ๐๐ผ https://tapeucwutvne7l5o.onion/alphabay-darknet-market-moderator-handed-11-year-prison-sentence
๐ ๐๐ผ https://www.justice.gov/opa/pr/colorado-man-sentenced-11-years-prison-moderating-disputes-darknet-marketplace-alphabay
#alphabay #marketplace #darknet #moderator #prison
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
www.justice.gov
Colorado Man Sentenced to 11 Years in Prison for Moderating Disputes
A Colorado man was sentenced today by U.S. District Court Judge Dale A. Drozd to 11 years in prison.
Maltrail
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g.
๐กArchitecture
Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).
๐ ๐๐ผ https://github.com/stamparm/maltrail#introduction
๐ ๐๐ผ ipsum:
https://github.com/stamparm/ipsum
#stamparm #maltrail #ipsum #tool #malicious #detection #blacklist
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g.
zvpprsensinaix.com for Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).๐กArchitecture
Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).
๐ ๐๐ผ https://github.com/stamparm/maltrail#introduction
๐ ๐๐ผ ipsum:
https://github.com/stamparm/ipsum
#stamparm #maltrail #ipsum #tool #malicious #detection #blacklist
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
GitHub
GitHub - stamparm/maltrail: Malicious traffic detection system
Malicious traffic detection system. Contribute to stamparm/maltrail development by creating an account on GitHub.
Florida congressman wants Edward Snowden pardoned
TALLAHASSE, Fla. (CBS12) โ U.S. Rep. Matt Gaetz (FL-1) wants Edward Snowden, the National Security Agency whistleblower, pardoned.
Gaetz simply issued a one-word tweet with Snowden tagged on Thursday.
Snowden, 31, is a former CIA subcontractor who exposed the NSA's mass surveillance programs and capabilities in 2013. Snowden was charged with violating the Espionage Act and could face up to 30 years in prison. Because the US is pursuing his extradition, Snowden is now exiled in Russia.
On Wednesday, Snowden re-tweeted the ACLU, which reported that a U.S. federal court ruled that the NSA's bulk collection of Americans' phone records was illegal, saying "seven years ago, as the news declared I was being charged as a criminal for speaking the truth, I never imagined that I would live to see our courts condemn the NSA's activities as unlawful."
๐ ๐๐ผ https://cbs12.com/news/local/florida-congressman-wants-edward-snowden-pardoned
#snowden #whistleblower #usa #congressman
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
TALLAHASSE, Fla. (CBS12) โ U.S. Rep. Matt Gaetz (FL-1) wants Edward Snowden, the National Security Agency whistleblower, pardoned.
Gaetz simply issued a one-word tweet with Snowden tagged on Thursday.
Snowden, 31, is a former CIA subcontractor who exposed the NSA's mass surveillance programs and capabilities in 2013. Snowden was charged with violating the Espionage Act and could face up to 30 years in prison. Because the US is pursuing his extradition, Snowden is now exiled in Russia.
On Wednesday, Snowden re-tweeted the ACLU, which reported that a U.S. federal court ruled that the NSA's bulk collection of Americans' phone records was illegal, saying "seven years ago, as the news declared I was being charged as a criminal for speaking the truth, I never imagined that I would live to see our courts condemn the NSA's activities as unlawful."
๐ ๐๐ผ https://cbs12.com/news/local/florida-congressman-wants-edward-snowden-pardoned
#snowden #whistleblower #usa #congressman
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
WPEC
Florida congressman wants Edward Snowden pardoned
U. S. Rep. Matt Gaetz (FL-1) wants Edward Snowden, the National Security Agency whistleblower, pardoned. Gaetz simply issued a one-word tweet with Snowden tagged on Thursday. Snowden, 31, is a former CIA subcontractor who exposed the NSA's mass surveillanceโฆ
Itโs Time to Dismantle the DEA
For nearly 50 years, the Drug Enforcement Administration (DEA) has fueled mass incarceration, wasted taxpayer money, abused its authority and blocked scientific research.
Itโs time for change.
By Every Measure the DEA and its Drug War Have Failed
The DEA was established in 1973 ostensibly to consolidate drug enforcement activities into a โsuperagencyโ that would bring together federal drug enforcement resources. In the last 50 years, itโs been a tremendous waste of resources and left a wake of devastation in the United States and abroad.
DEA personnel have repeatedly engaged in unlawful operations, spent lavishly, ignored civil rights, packed federal prisons, and still failed to make a significant impact on drug supply. Meanwhile, Congress has engaged in little scrutiny of the agency, its actions or its budget.
WASTING TAXPAYER FUNDS
The DEA is the central player in the failed war on drugs. When the DEA was created in 1973, it started with less than $75 million. In fiscal year 2020 U.S. taxpayers spent more than $3.1 billion on the DEA. President Trump asked for even more for fiscal year 2021 - a staggering $3.5 billion, with more than $520 million specifically for its international programs.
What has it done with all that money?
It has facilitated the growth of paramilitary forces on U.S. soil, expanded surveillance, and embedded itself in communities throughout the U.S. and abroad. It has directly participated in domestic enforcement at the local level and even conducted its own research and public propaganda campaigns.
Ten percent of its Special Agent and Intelligence Analysts are permanently stationed overseas conducting drug interdiction, including undercover operations, surveillance, money laundering, paying informants, and facilitating arrests. Internationally, the DEA-led drug war has contributed to increased violence in many countries, as well as political and economic instability.
๐ ๐๐ผ https://www.drugpolicy.org/DEA
#dea #timeforchange #drugpolicy #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
For nearly 50 years, the Drug Enforcement Administration (DEA) has fueled mass incarceration, wasted taxpayer money, abused its authority and blocked scientific research.
Itโs time for change.
By Every Measure the DEA and its Drug War Have Failed
The DEA was established in 1973 ostensibly to consolidate drug enforcement activities into a โsuperagencyโ that would bring together federal drug enforcement resources. In the last 50 years, itโs been a tremendous waste of resources and left a wake of devastation in the United States and abroad.
DEA personnel have repeatedly engaged in unlawful operations, spent lavishly, ignored civil rights, packed federal prisons, and still failed to make a significant impact on drug supply. Meanwhile, Congress has engaged in little scrutiny of the agency, its actions or its budget.
WASTING TAXPAYER FUNDS
The DEA is the central player in the failed war on drugs. When the DEA was created in 1973, it started with less than $75 million. In fiscal year 2020 U.S. taxpayers spent more than $3.1 billion on the DEA. President Trump asked for even more for fiscal year 2021 - a staggering $3.5 billion, with more than $520 million specifically for its international programs.
What has it done with all that money?
It has facilitated the growth of paramilitary forces on U.S. soil, expanded surveillance, and embedded itself in communities throughout the U.S. and abroad. It has directly participated in domestic enforcement at the local level and even conducted its own research and public propaganda campaigns.
Ten percent of its Special Agent and Intelligence Analysts are permanently stationed overseas conducting drug interdiction, including undercover operations, surveillance, money laundering, paying informants, and facilitating arrests. Internationally, the DEA-led drug war has contributed to increased violence in many countries, as well as political and economic instability.
๐ ๐๐ผ https://www.drugpolicy.org/DEA
#dea #timeforchange #drugpolicy #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Drug Policy Alliance
DEA - Drug Policy Alliance
Google lists which Firebase SDKs require Google Play Services
Google is a pretty ubiquitous name in the Android space. Not only does the company own and maintain the Android Open Source Project itself, but itโs also in charge of the largest distribution platform on Android: the Google Play Store and the underlying Google Mobile Services (GMS) suite. GMS is the important part here. Firebase, Googleโs cross-platform toolkit for things like analytics and crash detection, uses GMS to provide a lot of its functionality.
Thatโs all well and good if your target devices come with Google apps preinstalled, but what if they donโt? What if a user has unlocked their bootloader and flashed a Google-free ROM? What if someoneโs using a Huawei device, or theyโve imported a phone from China? Will the Firebase-dependent parts of your app just not work?
Thankfully, if youโre trying to implement Firebase into your app, you donโt need to guess which SDKs will work on Google-free devices and which wonโt. Google has helpfully released a list of all its current Firebase SDKs, and whether or not they depend on GMS. You can use this to tell at-a-glance which SDKs you can safely implement and which you may have to supplement or avoid.
๐ก ๐๐ผ Hereโs a table listing the Firebase SDKs and whether or not they have GMS dependencies:
https://www.xda-developers.com/google-list-firebase-sdk-require-google-play-services/
๐ก ๐๐ผ https://firebase.google.com/docs/android/android-play-services
#google #list #firebase #sdk #playservices #dependencies
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Google is a pretty ubiquitous name in the Android space. Not only does the company own and maintain the Android Open Source Project itself, but itโs also in charge of the largest distribution platform on Android: the Google Play Store and the underlying Google Mobile Services (GMS) suite. GMS is the important part here. Firebase, Googleโs cross-platform toolkit for things like analytics and crash detection, uses GMS to provide a lot of its functionality.
Thatโs all well and good if your target devices come with Google apps preinstalled, but what if they donโt? What if a user has unlocked their bootloader and flashed a Google-free ROM? What if someoneโs using a Huawei device, or theyโve imported a phone from China? Will the Firebase-dependent parts of your app just not work?
Thankfully, if youโre trying to implement Firebase into your app, you donโt need to guess which SDKs will work on Google-free devices and which wonโt. Google has helpfully released a list of all its current Firebase SDKs, and whether or not they depend on GMS. You can use this to tell at-a-glance which SDKs you can safely implement and which you may have to supplement or avoid.
๐ก ๐๐ผ Hereโs a table listing the Firebase SDKs and whether or not they have GMS dependencies:
https://www.xda-developers.com/google-list-firebase-sdk-require-google-play-services/
๐ก ๐๐ผ https://firebase.google.com/docs/android/android-play-services
#google #list #firebase #sdk #playservices #dependencies
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
XDA Developers
Google lists which Firebase SDKs require Google Play Services
Considering implementing one or more of Google's Firebase SDKs into your app? Check this list to see if they depend on Google Play Services!
The Scene: A Stress Headache That Most Pirates Can Do Without
Many up-and-coming pirates dream of one day being elite enough to become a member of The Scene, hoping to bathe in the collective mystery, kudos and notoriety it exudes. But for most, however, the headaches and stress would probably outweigh the benefits of this exclusive 'club'.
Over the past two weeks โThe Sceneโ, the individuals, groups, and entities that are often described as sitting at the top of the so-called โPiracy Pyramidโ, has been thrust into the mainstream media.
A US Government-led operation, carried out on several continents against the โSparks Conspiracyโ, listed three individuals from the UK, US and Norway as the main targets of a massive investigation. What took place on the ground, however, ended up being something much, much bigger.
While SPARKS and related groups GECKOS, DRONES, ROVERS and SPLINTERS were placed front and center, operations like this donโt and canโt operate in a vacuum. These groups were part of an organic network built up over years and, as such, their activities and members touched huge numbers of disparate yet interconnected individuals involved in the piracy world overall, not just โThe Sceneโ itself.
One of the interesting things about The Scene is that over almost two decades, it has gained almost mythical status as an almost impossible-to-penetrate โplaceโ where only the most elite of pirates hang out. As a result, many people aspire to become a โmemberโ one day, hoping to bathe in the collective mystery, kudos and notoriety.
What the unfolding events of the past two weeks have shown, however, is that The Scene is already much closer to regular pirates than most people might think, touching and even intermingling at some level with private and public torrent sites, streaming platforms, and similar services.
๐ ๐๐ผ https://torrentfreak.com/the-scene-a-stress-headache-that-most-pirates-can-do-without-200906/
#pirates #piracy #Sparks #GECKOS #DRONES #ROVERS #SPLINTERS #conspiracyโ #usa #uk #norway
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Many up-and-coming pirates dream of one day being elite enough to become a member of The Scene, hoping to bathe in the collective mystery, kudos and notoriety it exudes. But for most, however, the headaches and stress would probably outweigh the benefits of this exclusive 'club'.
Over the past two weeks โThe Sceneโ, the individuals, groups, and entities that are often described as sitting at the top of the so-called โPiracy Pyramidโ, has been thrust into the mainstream media.
A US Government-led operation, carried out on several continents against the โSparks Conspiracyโ, listed three individuals from the UK, US and Norway as the main targets of a massive investigation. What took place on the ground, however, ended up being something much, much bigger.
While SPARKS and related groups GECKOS, DRONES, ROVERS and SPLINTERS were placed front and center, operations like this donโt and canโt operate in a vacuum. These groups were part of an organic network built up over years and, as such, their activities and members touched huge numbers of disparate yet interconnected individuals involved in the piracy world overall, not just โThe Sceneโ itself.
One of the interesting things about The Scene is that over almost two decades, it has gained almost mythical status as an almost impossible-to-penetrate โplaceโ where only the most elite of pirates hang out. As a result, many people aspire to become a โmemberโ one day, hoping to bathe in the collective mystery, kudos and notoriety.
What the unfolding events of the past two weeks have shown, however, is that The Scene is already much closer to regular pirates than most people might think, touching and even intermingling at some level with private and public torrent sites, streaming platforms, and similar services.
๐ ๐๐ผ https://torrentfreak.com/the-scene-a-stress-headache-that-most-pirates-can-do-without-200906/
#pirates #piracy #Sparks #GECKOS #DRONES #ROVERS #SPLINTERS #conspiracyโ #usa #uk #norway
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Torrentfreak
The Scene: A Stress Headache That Most Pirates Can Do Without * TorrentFreak
Given its infamy, many pirates of aspirations of becoming a member of The Scene. Considering its complexities, most should avoid the stress.
Locking down Signal
Concerned about the privacy and security of your communications? Follow our guide to locking down Signal.
The encrypted messaging app, Signal, is quickly becoming a newsroom staple for communicating with sources, accepting tips, talking to colleagues, and for regular old voice calls and messages. While itโs a practical tool for anyone concerned with the security and privacy of their conversations, people working in newsrooms are particularly interesting targets, and should benefit from locking down Signal.
๐ก (If youโre not yet using it, learn how to get started here.)
Signal makes it easy to have a secure conversation without thinking about it. On its face, it looks and feels identical to your default text messaging app, but security experts so often recommend it because of what it does in the background.
First, Signal offers end-to-end encryption, meaning only conversational participants can read the messages. While regular phone calls or text messages allow your phone company to unscramble your conversations, even the team behind Signal canโt listen to them. You donโt need to take their word for it. Signal is open source, meaning the code is available for anyone to review. This also makes security audits simpler for independent specialists, who have torn apart the code and published findings that everything works as intended. Finally, Signal retains nearly no metadata โ information about who spoke to whom, and when. (The developers proved as much in court.)
These are some of the advantages you want in an encrypted messaging app.
Because newsrooms can attract a lot of attention, journalists who already use Signal should consider hardening it against physical access, as well as unwanted remote access and network-based eavesdropping. So letโs talk about how.
๐ ๐๐ผ https://freedom.press/training/locking-down-signal/
#signal #encrypted #messaging #app #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Concerned about the privacy and security of your communications? Follow our guide to locking down Signal.
The encrypted messaging app, Signal, is quickly becoming a newsroom staple for communicating with sources, accepting tips, talking to colleagues, and for regular old voice calls and messages. While itโs a practical tool for anyone concerned with the security and privacy of their conversations, people working in newsrooms are particularly interesting targets, and should benefit from locking down Signal.
๐ก (If youโre not yet using it, learn how to get started here.)
Signal makes it easy to have a secure conversation without thinking about it. On its face, it looks and feels identical to your default text messaging app, but security experts so often recommend it because of what it does in the background.
First, Signal offers end-to-end encryption, meaning only conversational participants can read the messages. While regular phone calls or text messages allow your phone company to unscramble your conversations, even the team behind Signal canโt listen to them. You donโt need to take their word for it. Signal is open source, meaning the code is available for anyone to review. This also makes security audits simpler for independent specialists, who have torn apart the code and published findings that everything works as intended. Finally, Signal retains nearly no metadata โ information about who spoke to whom, and when. (The developers proved as much in court.)
These are some of the advantages you want in an encrypted messaging app.
Because newsrooms can attract a lot of attention, journalists who already use Signal should consider hardening it against physical access, as well as unwanted remote access and network-based eavesdropping. So letโs talk about how.
๐ ๐๐ผ https://freedom.press/training/locking-down-signal/
#signal #encrypted #messaging #app #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Freedom of the Press
Signal, the secure messaging app: A guide for beginners
How to get started using Signal, the encrypted messaging app.
744 Supp 4.pdf
3.2 MB
The growing China black list of the USA
After Huawei, China's largest chip manufacturer SMIC is now also threatened by an embargo by the USA. US companies are then no longer allowed to do business with the contract manufacturer.
The Trump government, at the suggestion of the Ministry of Defense, is considering adding SMIC to its blacklist. The companies listed there have virtually no access to US technology. The list already contains over 300 Chinese companies.
๐ ๐๐ผ The China-black list of the USA (PDF):
https://www.bis.doc.gov/index.php/documents/regulations-docs/2326-supplement-no-4-to-part-744-entity-list-4/file
#usa #china #blacklist #embargo #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
After Huawei, China's largest chip manufacturer SMIC is now also threatened by an embargo by the USA. US companies are then no longer allowed to do business with the contract manufacturer.
The Trump government, at the suggestion of the Ministry of Defense, is considering adding SMIC to its blacklist. The companies listed there have virtually no access to US technology. The list already contains over 300 Chinese companies.
๐ ๐๐ผ The China-black list of the USA (PDF):
https://www.bis.doc.gov/index.php/documents/regulations-docs/2326-supplement-no-4-to-part-744-entity-list-4/file
#usa #china #blacklist #embargo #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Media is too big
VIEW IN TELEGRAM
You have a secret health score and it's as dystopian as it sounds
Insurance companies use big data to predict your health and profitability. Your life choices may easily cost you your coverage or accessibility of treatments.
๐บ ๐๐ผ https://invidious.snopyta.org/watch?app=desktop&v=f6LMp74goVc&quality=dash&dark_mode=true&autoplay=0
#insurance #companies #secret #health #score #surveillance #bigdata #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Insurance companies use big data to predict your health and profitability. Your life choices may easily cost you your coverage or accessibility of treatments.
๐บ ๐๐ผ https://invidious.snopyta.org/watch?app=desktop&v=f6LMp74goVc&quality=dash&dark_mode=true&autoplay=0
#insurance #companies #secret #health #score #surveillance #bigdata #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The Internetโs Biggest Webmaster Forum Had a Data Breach
Another day and another big data leak. On July 1st the WebsitePlanet research team in cooperation with Security Researcher Jeremiah Fowler discovered a non-password protected database that contained records of the internetโs largest webmaster portal. Upon further research it appeared that Digital Point had leaked the data of 863,412 users.
Digital Point claims to be the worldโs biggest webmaster forum and marketplace for web related services. The forum lets people buy and sell websites, SEO, and a wide range of services. The site caters to those individuals who maintain or create websites either for themselves or customers.
๐ ๐๐ผ Data Breach Summary:
https://www.websiteplanet.com/blog/digitalpoint-leak-report/
#digitalpoint #leak #report
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Another day and another big data leak. On July 1st the WebsitePlanet research team in cooperation with Security Researcher Jeremiah Fowler discovered a non-password protected database that contained records of the internetโs largest webmaster portal. Upon further research it appeared that Digital Point had leaked the data of 863,412 users.
Digital Point claims to be the worldโs biggest webmaster forum and marketplace for web related services. The forum lets people buy and sell websites, SEO, and a wide range of services. The site caters to those individuals who maintain or create websites either for themselves or customers.
๐ ๐๐ผ Data Breach Summary:
https://www.websiteplanet.com/blog/digitalpoint-leak-report/
#digitalpoint #leak #report
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Website Planet
The Internet's Biggest Webmaster Forum Had a Data Breach
Another day and another big data leak. On July 1st the WebsitePlanet research team in cooperation with Security Researcher Jeremiah Fowler discovered
Whatโs missing from corporate statements on racial injustice? The real cause of racism.
An analysis of 63 recent statements shows that US tech companies repeatedly placed responsibility for racial injustice on Black people.
On August 31, Airbnb launched Project Lighthouse, an initiative meant to โuncover, measure, and overcome discriminationโ on the home-sharing platform. According to the company, Project Lighthouse will identify discrimination by measuring whether a renterโs perceived race correlates with differences in the rate or quality of that personโs bookings, cancellations, or reviews. This project comes amid an outpouring of solidarity statements and policy changes from the tech industry in response to uprisings after the killing of George Floyd by Minneapolis police on May 25.
While these nods toward racial justice may be well-intentioned, they highlight a problem that casts doubt on whether the industryโs efforts to date can truly combat bias: the tendency to position race, not racism, as the cause of discrimination.
This way of thinking about inequality is emblematic of โracecraft,โ a term coined by sociologist Karen E. Fields and historian Barbara J. Fields to describe โthe mental terrain and pervasive beliefsโ about race and racism in America. Though Fields and Fields outline many aspects of the concept, their basic proposition is that the very idea of race arises out of racist practices rather than biological realities. Racecraft, they write, is a โconjurorโs trick of transforming racism into race, leaving black persons in view while removing white persons from the stage.โ
A good example can be seen in Airbnbโs introduction to Project Lighthouse, which states that the company was โdeeply troubled by stories of travelers who were turned away by Airbnb hosts during the booking process because of the color of their skin.โ Were those guests really turned away because of their skin color, or because their prospective hosts were racist?
The same maneuver can be seen in a statement from Adam Mosseri, the head of Instagram, in which he says the platformโs efforts to ensure that Black voices are heard โwonโt stop with the disparities people may experience solely on the basis of race.โ
๐ ๐๐ผ https://www.technologyreview.com/2020/09/05/1008187/racial-injustice-statements-tech-companies-racism-racecraft-opinion/
#racial #injustice #statements #tech #companies #racism #racecraft #opinion #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
An analysis of 63 recent statements shows that US tech companies repeatedly placed responsibility for racial injustice on Black people.
On August 31, Airbnb launched Project Lighthouse, an initiative meant to โuncover, measure, and overcome discriminationโ on the home-sharing platform. According to the company, Project Lighthouse will identify discrimination by measuring whether a renterโs perceived race correlates with differences in the rate or quality of that personโs bookings, cancellations, or reviews. This project comes amid an outpouring of solidarity statements and policy changes from the tech industry in response to uprisings after the killing of George Floyd by Minneapolis police on May 25.
While these nods toward racial justice may be well-intentioned, they highlight a problem that casts doubt on whether the industryโs efforts to date can truly combat bias: the tendency to position race, not racism, as the cause of discrimination.
This way of thinking about inequality is emblematic of โracecraft,โ a term coined by sociologist Karen E. Fields and historian Barbara J. Fields to describe โthe mental terrain and pervasive beliefsโ about race and racism in America. Though Fields and Fields outline many aspects of the concept, their basic proposition is that the very idea of race arises out of racist practices rather than biological realities. Racecraft, they write, is a โconjurorโs trick of transforming racism into race, leaving black persons in view while removing white persons from the stage.โ
A good example can be seen in Airbnbโs introduction to Project Lighthouse, which states that the company was โdeeply troubled by stories of travelers who were turned away by Airbnb hosts during the booking process because of the color of their skin.โ Were those guests really turned away because of their skin color, or because their prospective hosts were racist?
The same maneuver can be seen in a statement from Adam Mosseri, the head of Instagram, in which he says the platformโs efforts to ensure that Black voices are heard โwonโt stop with the disparities people may experience solely on the basis of race.โ
๐ ๐๐ผ https://www.technologyreview.com/2020/09/05/1008187/racial-injustice-statements-tech-companies-racism-racecraft-opinion/
#racial #injustice #statements #tech #companies #racism #racecraft #opinion #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
MIT Technology Review
Whatโs missing from corporate statements on racial injustice? The real cause of racism.
On August 31, Airbnb launched Project Lighthouse, an initiative meant to โuncover, measure, and overcome discriminationโ on the home-sharing platform. According to the company, Project Lighthouse will identify discrimination by measuring whether a renterโsโฆ
Disney faces second wave of boycott calls for 'Mulan' movie
Disney's latest film Mulan has faced a second round of criticism following its launch in movie theatres and on Disney's streaming platform, Disney+. Netizens on Twitter are calling for the public to boycott the movie with the hashtag "#BoycottMulan", claiming that the lead actress Liu Yi Fei supports police brutality in Hong Kong during its protest.
The call to boycott the Mulan film is not new, first igniting in August 2019. Netizens are appealing to the public not to watch the movie, if they support human rights. A few netizens have also criticised Disney for casting the actress and giving in to the demands of China government while creating the film. Separately, another netizen also pointed out that the publicity department of CPC Xinjiang Uyghur Autonomous Region was included in the film credits, inferring that the filming took place in Xinjiang, where a "cultural genocide" is happening. The netizen is referring to the situation in Xinjiang, where Uyghurs (Muslim ethnic minority) are detained and allegedly tortured. Marketing has reached out to Disney for a statement.
Additionally, an edited image of the Mulan poster has been circulating online. The image featured Liu with a communist sign on her forehead. It also showed her social media comment at the side, with a flag of China in the background.
๐ ๐๐ผ https://marketing-interactive.com/disney-faces-second-wave-of-boycott-calls-for-mulan-movie
#disney #BoycottMulan #mulan #Xinjiang #Uyghur #cultural #genocide #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Disney's latest film Mulan has faced a second round of criticism following its launch in movie theatres and on Disney's streaming platform, Disney+. Netizens on Twitter are calling for the public to boycott the movie with the hashtag "#BoycottMulan", claiming that the lead actress Liu Yi Fei supports police brutality in Hong Kong during its protest.
The call to boycott the Mulan film is not new, first igniting in August 2019. Netizens are appealing to the public not to watch the movie, if they support human rights. A few netizens have also criticised Disney for casting the actress and giving in to the demands of China government while creating the film. Separately, another netizen also pointed out that the publicity department of CPC Xinjiang Uyghur Autonomous Region was included in the film credits, inferring that the filming took place in Xinjiang, where a "cultural genocide" is happening. The netizen is referring to the situation in Xinjiang, where Uyghurs (Muslim ethnic minority) are detained and allegedly tortured. Marketing has reached out to Disney for a statement.
Additionally, an edited image of the Mulan poster has been circulating online. The image featured Liu with a communist sign on her forehead. It also showed her social media comment at the side, with a flag of China in the background.
๐ ๐๐ผ https://marketing-interactive.com/disney-faces-second-wave-of-boycott-calls-for-mulan-movie
#disney #BoycottMulan #mulan #Xinjiang #Uyghur #cultural #genocide #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Marketing Interactive
Disney faces second wave of boycott calls for 'Mulan' movie
Netizens are appealing to the public not to watch the movie, if they support human rights.
Service NSW reveals 738GB of customer data was stolen during email breach
Attack accessed 47 staff email accounts and affected 186,000 customers.
Service NSW has revealed that the personal information of 186,000 customers was stolen because of a cyber attack earlier this year on 47 staff email accounts.
Following a four-month investigation that began in April, Service NSW said it identified that 738GB of data, which compromised of 3.8 million documents, was stolen from the email accounts.
The one-stop-shop agency assured, however, there was no evidence that individual MyServiceNSW account data or Service NSW databases were compromised during the cyber attack.
"This rigorous first step surfaced about 500,000 documents which referenced personal information," Service NSW CEO Damon Rees said.
"The data is made up of documents such as handwritten notes and forms, scans, and records of transaction applications.
"Across the last four months, some of the analysis has included manual review of tens of thousands of records to ensure our customer care teams could develop a robust and useful notification process.
"We are sorry that customers' information was taken in this way."
๐ ๐๐ผ https://www.zdnet.com/article/service-nsw-reveals-738gb-of-customer-data-was-stolen-during-email-breach
#nsw #email #breach
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Attack accessed 47 staff email accounts and affected 186,000 customers.
Service NSW has revealed that the personal information of 186,000 customers was stolen because of a cyber attack earlier this year on 47 staff email accounts.
Following a four-month investigation that began in April, Service NSW said it identified that 738GB of data, which compromised of 3.8 million documents, was stolen from the email accounts.
The one-stop-shop agency assured, however, there was no evidence that individual MyServiceNSW account data or Service NSW databases were compromised during the cyber attack.
"This rigorous first step surfaced about 500,000 documents which referenced personal information," Service NSW CEO Damon Rees said.
"The data is made up of documents such as handwritten notes and forms, scans, and records of transaction applications.
"Across the last four months, some of the analysis has included manual review of tens of thousands of records to ensure our customer care teams could develop a robust and useful notification process.
"We are sorry that customers' information was taken in this way."
๐ ๐๐ผ https://www.zdnet.com/article/service-nsw-reveals-738gb-of-customer-data-was-stolen-during-email-breach
#nsw #email #breach
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNet
Service NSW reveals 738GB of customer data was stolen during email breach
Attack accessed 47 staff email accounts and affected 186,000 customers.
EFF Responds to EU Commission on the Digital Services Act: Put Users Back in Control
The European Union is currently preparing for a significant overhaul of its core platform regulation, the e-Commerce Directive. Earlier this year the European Commission, the EUโs executive, pledged to reshape Europeโs digital future and to propose an entire package of new rules, the Digital Services Act (DSA). The package is supposed to address the legal responsibilities of platforms regarding user content and include measures to keep users safe online. The Commission also announced a new standard for large platforms that act as gatekeepers in an attempt to create a fairer, and more competitive, market for online platforms in the EU.
๐ ๐๐ผ https://www.eff.org/deeplinks/2020/09/eff-responds-eu-commission-digital-services-act-put-users-back-control
#eff #eu #commission #digital #services #act
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The European Union is currently preparing for a significant overhaul of its core platform regulation, the e-Commerce Directive. Earlier this year the European Commission, the EUโs executive, pledged to reshape Europeโs digital future and to propose an entire package of new rules, the Digital Services Act (DSA). The package is supposed to address the legal responsibilities of platforms regarding user content and include measures to keep users safe online. The Commission also announced a new standard for large platforms that act as gatekeepers in an attempt to create a fairer, and more competitive, market for online platforms in the EU.
๐ ๐๐ผ https://www.eff.org/deeplinks/2020/09/eff-responds-eu-commission-digital-services-act-put-users-back-control
#eff #eu #commission #digital #services #act
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Electronic Frontier Foundation
EFF Responds to EU Commission on the Digital Services Act: Put Users Back in Control
The European Union is currently preparing for a significant overhaul of its core platform regulation, the e-Commerce Directive. Earlier this year the European Commission, the EUโs executive, pledged