Apple, Fedex and the cookie apocalypse
We’re now a couple of weeks into Apple’s latest iOS privacy move. If you want to track users between apps and the web, or from an ad through the app store to an install, then you need to ask permission and Apple has deliberately framed the question such that almost no-one will say yes. On some reports, CPMs are already down by half.
We could spend a lot of time arguing about the rights and wrongs of privacy and Apple’s framing and steering and use of its market dominance, but it’s probably more useful to suggest that all Apple has really done is implement the EU and California’s cookie laws, ‘but in apps’, and in an especially aggressive way. Step up another level, and this reflects a pretty broad shift in attitudes towards privacy in general and the huge inverted pyramid of complexity and nonsense of third party ad tracking in particular. Chrome and Safari are turning third party cookies off anyway. The cookie apocalypse is upon us and the tracking model of the last 25 years is going away.
What happens next? No-one in advertising quite knows. There are dozens of different projects for new ‘private’ ways to track users across different sites with different identity or logged-in models, but the most interesting remains Google’s FLoC, in which the browser analyses your behaviour and puts you into (mostly) anonymous, interest-based cohorts. The publisher can ask for a cohort and show you ads, but your actual activity never leaves your device. Apple does more or less the same thing on iOS in its News and Stocks apps, except that Apple also serves the ads and displays the content, so the underlying publishers see nothing at all (except a wire transfer). I think it’s very likely that Apple is looking at offering this in third-party apps and in Safari as well (I wrote about that here). So, Apple and Google want to move the tracking from the server to the client, and to one company with one point for the user to control instead of disaggregation across hundreds of publishers and ad-tech companies.
There’s a bunch of reasons why this might not work, not least that no-one except Google and Apple want Google and Apple to have that much control over publishing and advertising. But it’s also worth stepping up another level again, and asking what advertisers are trying to do, anyway. People say ‘privacy’ so often that one can lose sight of the fact that advertisers don’t care who you are - they just want to show ads to people that might be interested in them, and not to show ads to people who won’t be interested. They don’t want to ‘violate your privacy’ - they want to show diaper ads to parents, car ads to people who want a car and watch ads to rich people.
https://www.ben-evans.com/benedictevans/2021/5/25/apple-fedex-and-the-cookie-apocalypse
#apple #fedex #cookies #apocalypse #adtech #user #tracking #privacy
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
We’re now a couple of weeks into Apple’s latest iOS privacy move. If you want to track users between apps and the web, or from an ad through the app store to an install, then you need to ask permission and Apple has deliberately framed the question such that almost no-one will say yes. On some reports, CPMs are already down by half.
We could spend a lot of time arguing about the rights and wrongs of privacy and Apple’s framing and steering and use of its market dominance, but it’s probably more useful to suggest that all Apple has really done is implement the EU and California’s cookie laws, ‘but in apps’, and in an especially aggressive way. Step up another level, and this reflects a pretty broad shift in attitudes towards privacy in general and the huge inverted pyramid of complexity and nonsense of third party ad tracking in particular. Chrome and Safari are turning third party cookies off anyway. The cookie apocalypse is upon us and the tracking model of the last 25 years is going away.
What happens next? No-one in advertising quite knows. There are dozens of different projects for new ‘private’ ways to track users across different sites with different identity or logged-in models, but the most interesting remains Google’s FLoC, in which the browser analyses your behaviour and puts you into (mostly) anonymous, interest-based cohorts. The publisher can ask for a cohort and show you ads, but your actual activity never leaves your device. Apple does more or less the same thing on iOS in its News and Stocks apps, except that Apple also serves the ads and displays the content, so the underlying publishers see nothing at all (except a wire transfer). I think it’s very likely that Apple is looking at offering this in third-party apps and in Safari as well (I wrote about that here). So, Apple and Google want to move the tracking from the server to the client, and to one company with one point for the user to control instead of disaggregation across hundreds of publishers and ad-tech companies.
There’s a bunch of reasons why this might not work, not least that no-one except Google and Apple want Google and Apple to have that much control over publishing and advertising. But it’s also worth stepping up another level again, and asking what advertisers are trying to do, anyway. People say ‘privacy’ so often that one can lose sight of the fact that advertisers don’t care who you are - they just want to show ads to people that might be interested in them, and not to show ads to people who won’t be interested. They don’t want to ‘violate your privacy’ - they want to show diaper ads to parents, car ads to people who want a car and watch ads to rich people.
https://www.ben-evans.com/benedictevans/2021/5/25/apple-fedex-and-the-cookie-apocalypse
#apple #fedex #cookies #apocalypse #adtech #user #tracking #privacy
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Benedict Evans
Apple, Fedex and the cookie apocalypse — Benedict Evans
As cookie-based ads go away, does the targeting move from the cloud to the client, or from the reader to the content? Does this make the strong stronger? Or does the money go to Fedex instead?
Comcast Subscriber Receives DMCA Notice for Downloading Ubuntu
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an anti-piracy company alleging that by torrenting an OS ISO released by Ubuntu itself, he breached copyright law.
Two decades ago, the BitTorrent protocol revolutionized peer-to-peer (P2P) file-sharing. The content-agnostic system allowed people to efficiently share and download even the largest files and soon grew to become the dominant method of transfer for millions of file-sharers.
Over the years, people have shared all kinds of content using torrents and it quickly became associated with mass copyright infringement of movies, TV shows, music and everything in between. However, BitTorrent is also used to distribute large volumes of data with the blessing of rightsholders, with the sharing of Linux distros a prime example.
Indeed, large companies such as Ubuntu owner Canonical actively encourage the distribution of their packages via BitTorrent, even going as far as operating their own tracker. This is effectively a green light for users to obtain Ubuntu using BitTorrent and is universally considered to be entirely safe. However, a development yesterday caused mass confusion when a user was accused of copyright infringement via a notice from his ISP.
Anti-Piracy Firm Sends DMCA Notice Against Comcast User
Posting to Reddit’s /r/linux sub-Reddit, a forum with more than 656K subscribers, ‘NateNate60’ reported the unthinkable. After downloading an official Ubuntu ISO package (filename ubuntu-20.04.2.0-desktop-amd64.iso) he says he received a notice from Comcast’s Infinity claiming that he’d been reported for copyright infringement.
“We have received a notification by a copyright owner, or its authorized agent, reporting an alleged infringement of one or more copyrighted works made on or over your Xfinity Internet service,” the posted notice reads.
NateNate60 wisely redacted the notice to remove the ‘Incident Number’ and the precise time of the alleged infringement to protect his privacy but the clam was reported filed with Comcast on May 24, 2021.
https://torrentfreak.com/comcast-subscriber-receives-dmca-notice-for-downloading-ubuntu-210526/
#comcast #dmca #ubuntu #torrent #download
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an anti-piracy company alleging that by torrenting an OS ISO released by Ubuntu itself, he breached copyright law.
Two decades ago, the BitTorrent protocol revolutionized peer-to-peer (P2P) file-sharing. The content-agnostic system allowed people to efficiently share and download even the largest files and soon grew to become the dominant method of transfer for millions of file-sharers.
Over the years, people have shared all kinds of content using torrents and it quickly became associated with mass copyright infringement of movies, TV shows, music and everything in between. However, BitTorrent is also used to distribute large volumes of data with the blessing of rightsholders, with the sharing of Linux distros a prime example.
Indeed, large companies such as Ubuntu owner Canonical actively encourage the distribution of their packages via BitTorrent, even going as far as operating their own tracker. This is effectively a green light for users to obtain Ubuntu using BitTorrent and is universally considered to be entirely safe. However, a development yesterday caused mass confusion when a user was accused of copyright infringement via a notice from his ISP.
Anti-Piracy Firm Sends DMCA Notice Against Comcast User
Posting to Reddit’s /r/linux sub-Reddit, a forum with more than 656K subscribers, ‘NateNate60’ reported the unthinkable. After downloading an official Ubuntu ISO package (filename ubuntu-20.04.2.0-desktop-amd64.iso) he says he received a notice from Comcast’s Infinity claiming that he’d been reported for copyright infringement.
“We have received a notification by a copyright owner, or its authorized agent, reporting an alleged infringement of one or more copyrighted works made on or over your Xfinity Internet service,” the posted notice reads.
NateNate60 wisely redacted the notice to remove the ‘Incident Number’ and the precise time of the alleged infringement to protect his privacy but the clam was reported filed with Comcast on May 24, 2021.
https://torrentfreak.com/comcast-subscriber-receives-dmca-notice-for-downloading-ubuntu-210526/
#comcast #dmca #ubuntu #torrent #download
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
Comcast Subscriber Receives DMCA Notice for Downloading Ubuntu * TorrentFreak
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an…
WhatsApp sues Indian government over ‘mass surveillance’ internet laws
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
WhatsApp has sued the Indian government over new internet laws which the company says will “severely undermine” the privacy of their users.
The new IT laws, which have been called oppressive and draconian, give the Indian government greater power to monitor online activity, including on encrypted apps like WhatsApp and Signal. They were passed in February but were due to come into effect on Wednesday.
Under the laws, encryption – which keeps communications on the app private and inaccessible to outside parties – would have to be removed from WhatsApp in India and messages would have to be put into a “traceable” database. The government would then be able to identify and take action against the sender if any content was ruled “unlawful”.
A lawyer for WhatsApp told the Delhi high court: “A government that chooses to mandate traceability is effectively mandating a new form of mass surveillance.
In order to trace even one message, services would have to trace every message. There is no way to predict which message Indian government would want to investigate in the future.”
https://www.theguardian.com/world/2021/may/26/whatsapp-sues-indian-government-over-mass-surveillance-internet-laws
#whatsapp #DeleteWhatsapp #india #gov #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
WhatsApp has sued the Indian government over new internet laws which the company says will “severely undermine” the privacy of their users.
The new IT laws, which have been called oppressive and draconian, give the Indian government greater power to monitor online activity, including on encrypted apps like WhatsApp and Signal. They were passed in February but were due to come into effect on Wednesday.
Under the laws, encryption – which keeps communications on the app private and inaccessible to outside parties – would have to be removed from WhatsApp in India and messages would have to be put into a “traceable” database. The government would then be able to identify and take action against the sender if any content was ruled “unlawful”.
A lawyer for WhatsApp told the Delhi high court: “A government that chooses to mandate traceability is effectively mandating a new form of mass surveillance.
In order to trace even one message, services would have to trace every message. There is no way to predict which message Indian government would want to investigate in the future.”
https://www.theguardian.com/world/2021/may/26/whatsapp-sues-indian-government-over-mass-surveillance-internet-laws
#whatsapp #DeleteWhatsapp #india #gov #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
the Guardian
WhatsApp sues Indian government over ‘mass surveillance’ internet laws
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
Media is too big
VIEW IN TELEGRAM
Edward Snowden Hails Court Ruling as Progress on Acknowledging 'Devastation' of Mass Surveillance
Former National Security Agency contractor Edward Snowden hailed a new ruling out of a European court on intelligence-gathering practices, emphasizing "how far we've come" on acknowledging the "devastating consequences" of mass surveillance.
"It is hard to overemphasize how far we've come from the pre-2013 world when even the highest judicial authorities are beginning to acknowledge the devastating consequence of two decades' mass surveillance," Snowden tweeted in response to the Grand Chamber of the European Court of Human Rights' recent decision.
https://telegra.ph/Edward-Snowden-hails-court-ruling-as-progress-on-acknowledging-devastation-of-mass-surveillance-05-26
via www.newsweek.com
#snowden #surveillance #consequences #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Former National Security Agency contractor Edward Snowden hailed a new ruling out of a European court on intelligence-gathering practices, emphasizing "how far we've come" on acknowledging the "devastating consequences" of mass surveillance.
"It is hard to overemphasize how far we've come from the pre-2013 world when even the highest judicial authorities are beginning to acknowledge the devastating consequence of two decades' mass surveillance," Snowden tweeted in response to the Grand Chamber of the European Court of Human Rights' recent decision.
https://telegra.ph/Edward-Snowden-hails-court-ruling-as-progress-on-acknowledging-devastation-of-mass-surveillance-05-26
via www.newsweek.com
#snowden #surveillance #consequences #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Hacktivist Posts Massive Scrape of Crime App Citizen to Dark Web
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
A hacktivist has scraped a wealth of data from the crime and neighborhood watch app Citizen and posted it on a dark web site, Motherboard has learned. The data includes a huge amount of data related to 1.7 million "incidents"—events that Citizen informs users about concerning crime or perceived crime in their area—such as the GPS coordinates of where the incident took place, its update history, a clip of the police radio that the incident relates to, and associated images.
On their dark web site, called "The Concerned Citizen's Citizen Hack," the hacker writes "Fuck snitches, fuck Citizen, fuck Andrew Frame and remember, kids: Cops are not your friends." Andrew Frame is the CEO of Citizen; Frame was responsible for putting a $30,000 bounty for information that would lead to the arrest of a person the company mistakenly suspected of starting a recent wildfire, The Verge reported.
Much of this information would ordinarily be available to users as part of the normal functioning of the Citizen app. But with the hacker scraping it en masse and releasing it as a series of files to download, the data is qualitatively different from what the Citizen app offers, and allows journalists and researchers to gain greater insight into the use and spread of the app around the country. The scrape is somewhat similar to other recent mass collections and redistributions of public information, such as the Parler scrape that occurred after the January 6 insurrection at the U.S. Capitol.
"It's like a full log of police activity in multiple U.S. cities," the hacker, who said they affiliate themselves with the hacking collective Anonymous, told Motherboard. Citizen incidents are often (but not always) linked to police activity; Citizen produces its own summaries of events by listening to police scanners and pushing alerts about them to Citizen users. Users can also contribute their own videos.
https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web
#hacker #acktivist #scrape #citizen #app #data #darknetlive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
A hacktivist has scraped a wealth of data from the crime and neighborhood watch app Citizen and posted it on a dark web site, Motherboard has learned. The data includes a huge amount of data related to 1.7 million "incidents"—events that Citizen informs users about concerning crime or perceived crime in their area—such as the GPS coordinates of where the incident took place, its update history, a clip of the police radio that the incident relates to, and associated images.
On their dark web site, called "The Concerned Citizen's Citizen Hack," the hacker writes "Fuck snitches, fuck Citizen, fuck Andrew Frame and remember, kids: Cops are not your friends." Andrew Frame is the CEO of Citizen; Frame was responsible for putting a $30,000 bounty for information that would lead to the arrest of a person the company mistakenly suspected of starting a recent wildfire, The Verge reported.
Much of this information would ordinarily be available to users as part of the normal functioning of the Citizen app. But with the hacker scraping it en masse and releasing it as a series of files to download, the data is qualitatively different from what the Citizen app offers, and allows journalists and researchers to gain greater insight into the use and spread of the app around the country. The scrape is somewhat similar to other recent mass collections and redistributions of public information, such as the Parler scrape that occurred after the January 6 insurrection at the U.S. Capitol.
"It's like a full log of police activity in multiple U.S. cities," the hacker, who said they affiliate themselves with the hacking collective Anonymous, told Motherboard. Citizen incidents are often (but not always) linked to police activity; Citizen produces its own summaries of events by listening to police scanners and pushing alerts about them to Citizen users. Users can also contribute their own videos.
https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web
#hacker #acktivist #scrape #citizen #app #data #darknetlive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Vice
Hacktivist Posts Massive Scrape of Crime App Citizen to Dark Web
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
Apple v Epic CourtExhibits - All the Apple vs Epic court files OCR’ed
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
👉🏼 Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
#epic #apple #courtfiles
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
👉🏼 Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
#epic #apple #courtfiles
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Apple v Epic CourtExhibits.zip
1.5 GB
Apple v Epic CourtExhibits - All the Apple vs Epic court files OCR’ed
👉🏼 Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
#epic #apple #courtfiles #download
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
👉🏼 Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
#epic #apple #courtfiles #download
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Flashpoint_Chainalysis_Hydra_Crypto_Cybercrime_Research.pdf
5 MB
Flashpoint and Chainalysis Investigate Cryptocurrency Cybercrime on Russian Dark Market “Hydra”
Since Hydra’s launch in 2016, cryptocurrency activity conducted through the illicit marketplace has skyrocketed: growing from $9.4 million in 2016 to $1.37 billion in 2020.
When profits from illicit sales leave Hydra seller accounts, the money trails go dark. Sellers use veiled, in-region financial operators to convert their withdrawals into Russian fiat currencies and obfuscate further steps in the financial chain.
https://go.flashpoint-intel.com/docs/chainalysis-hydra-cryptocurrency-cybercrime
#chainalysis #cryptocurrency #hydra #cybercrime #research #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Since Hydra’s launch in 2016, cryptocurrency activity conducted through the illicit marketplace has skyrocketed: growing from $9.4 million in 2016 to $1.37 billion in 2020.
When profits from illicit sales leave Hydra seller accounts, the money trails go dark. Sellers use veiled, in-region financial operators to convert their withdrawals into Russian fiat currencies and obfuscate further steps in the financial chain.
https://go.flashpoint-intel.com/docs/chainalysis-hydra-cryptocurrency-cybercrime
#chainalysis #cryptocurrency #hydra #cybercrime #research #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Japanese government agencies suffer data breaches after Fujitsu hack
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool.
Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
It is not yet clear if this breach occurred because of a vulnerability exploit, or a targeted supply-chain attack, and an investigation is ongoing.
Attackers accessed at least 76,000 email addresses
Yesterday, the Ministry of Land, Infrastructure, Transport and Tourism and the National Cyber Security Center (NISC) of Japan announced that attackers were able to obtain inside information via Fujitsu's information-sharing tool.
Fujitsu also said that attackers had gained unauthorized access to projects that used ProjectWEB, and stolen proprietary data.
Fujitsu's ProjectWEB enables companies and organizations to exchange information internally, with project managers and stakeholders, for example.
https://www.bleepingcomputer.com/news/security/japanese-government-agencies-suffer-data-breaches-after-fujitsu-hack/
#japanese #gov #data #breach #fujitsu #attack
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool.
Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
It is not yet clear if this breach occurred because of a vulnerability exploit, or a targeted supply-chain attack, and an investigation is ongoing.
Attackers accessed at least 76,000 email addresses
Yesterday, the Ministry of Land, Infrastructure, Transport and Tourism and the National Cyber Security Center (NISC) of Japan announced that attackers were able to obtain inside information via Fujitsu's information-sharing tool.
Fujitsu also said that attackers had gained unauthorized access to projects that used ProjectWEB, and stolen proprietary data.
Fujitsu's ProjectWEB enables companies and organizations to exchange information internally, with project managers and stakeholders, for example.
https://www.bleepingcomputer.com/news/security/japanese-government-agencies-suffer-data-breaches-after-fujitsu-hack/
#japanese #gov #data #breach #fujitsu #attack
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BleepingComputer
Japanese government agencies suffer data breaches after Fujitsu hack
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool. Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
Media is too big
VIEW IN TELEGRAM
Cyber Crime, How Bad Can it Be?
In this episode we take a look at just how bad a cyber attack on a small business or individual could be as well as the things you can do to protect yourself from such an attack.
https://www.youtube.com/watch?v=GzTE5rm4SDo
#hak5 #cybercrime #cyberattack #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
In this episode we take a look at just how bad a cyber attack on a small business or individual could be as well as the things you can do to protect yourself from such an attack.
https://www.youtube.com/watch?v=GzTE5rm4SDo
#hak5 #cybercrime #cyberattack #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
New TeamNewPipe/NewPipe release: v0.21.3 (stable)
### New
- Allow installation on external storage #6037
- Added debug option to disable media tunneling #6288
### Improved
- Remove extra newlines in strings #6274
- [PeerTube] Added workaround for HLS streams #6307
- Persistent backup/import location #6319
### Fixed
- Only show 'download has started' toast when download is started #6139
- Do not set reCaptcha cookie when there is no cookie stored #5997
- Dismiss previous snackbars when deleting downloads #5671
- [Player] Improve cache performance by fixing
- [Player] Fixed player not automatically playing #6266
- [Player] Fixed stuttering on Lineage OS by downgrading ExoPlayer to 2.12 #6294
- Fixed trying to delete object not in list #6127
- Fix ErrorActivity actionbar back button not working #6312
- Make some minor changes #6308
### Development
- Replaced if/else with switch in ErrorActivity #6109
- Use Animator.addListener() extension. #6152
- Fix some warnings #6189
- Update actions/setup-java to v2 #6079
https://github.com/TeamNewPipe/NewPipe/releases/tag/v0.21.3
💡 👉🏼 NewPipe's GitHub releases
https://t.iss.one/newpipe_releases
#newpipe #update
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
### New
- Allow installation on external storage #6037
- Added debug option to disable media tunneling #6288
### Improved
- Remove extra newlines in strings #6274
- [PeerTube] Added workaround for HLS streams #6307
- Persistent backup/import location #6319
### Fixed
- Only show 'download has started' toast when download is started #6139
- Do not set reCaptcha cookie when there is no cookie stored #5997
- Dismiss previous snackbars when deleting downloads #5671
- [Player] Improve cache performance by fixing
fragmentSize is below the minimum warning #6238 - [Player] Fixed player not automatically playing #6266
- [Player] Fixed stuttering on Lineage OS by downgrading ExoPlayer to 2.12 #6294
- Fixed trying to delete object not in list #6127
- Fix ErrorActivity actionbar back button not working #6312
- Make some minor changes #6308
### Development
- Replaced if/else with switch in ErrorActivity #6109
- Use Animator.addListener() extension. #6152
- Fix some warnings #6189
- Update actions/setup-java to v2 #6079
https://github.com/TeamNewPipe/NewPipe/releases/tag/v0.21.3
💡 👉🏼 NewPipe's GitHub releases
https://t.iss.one/newpipe_releases
#newpipe #update
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
Release v0.21.3 · TeamNewPipe/NewPipe
➡️ Blog post for this release
New
Allow installation on external storage #6037
Added debug option to disable media tunneling #6288
Improved
Remove extra newlines in strings #6274
[PeerTube] Add...
New
Allow installation on external storage #6037
Added debug option to disable media tunneling #6288
Improved
Remove extra newlines in strings #6274
[PeerTube] Add...
Media is too big
VIEW IN TELEGRAM
Boss of ATM Skimming Syndicate Arrested in Mexico
Florian “The Shark” Tudor, the alleged ringleader of a prolific ATM skimming gang that siphoned hundreds of millions of dollars from bank accounts of tourists visiting Mexico over the last eight years, was arrested in Mexico City on Thursday in response to an extradition warrant from a Romanian court.
Tudor, a native of Craiova, Romania, moved to Mexico to set up Top Life Servicios, an ATM servicing company which managed a fleet of relatively new ATMs based in Mexico branded as Intacash.
https://krebsonsecurity.com/2021/05/boss-of-atm-skimming-syndicate-arrested-in-mexico/
💡 The Riviera Maya Gang: Cash, Crime, Killing
https://www.youtube.com/watch?v=O9jf-RtpPXM
#atm #skimming #syndicate #tudor #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Florian “The Shark” Tudor, the alleged ringleader of a prolific ATM skimming gang that siphoned hundreds of millions of dollars from bank accounts of tourists visiting Mexico over the last eight years, was arrested in Mexico City on Thursday in response to an extradition warrant from a Romanian court.
Tudor, a native of Craiova, Romania, moved to Mexico to set up Top Life Servicios, an ATM servicing company which managed a fleet of relatively new ATMs based in Mexico branded as Intacash.
https://krebsonsecurity.com/2021/05/boss-of-atm-skimming-syndicate-arrested-in-mexico/
💡 The Riviera Maya Gang: Cash, Crime, Killing
https://www.youtube.com/watch?v=O9jf-RtpPXM
#atm #skimming #syndicate #tudor #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
More than half of Europeans want to replace lawmakers with AI, study says
Researchers at IE University's Center for the Governance of Change asked 2,769 people from 11 countries worldwide how they would feel about reducing the number of national parliamentarians in their country and giving those seats to an AI that would have access to their data.
The results, published Thursday, showed that despite AI's clear and obvious limitations, 51% of Europeans said they were in favor of such a move.
Outside Europe, some 75% of people surveyed in China supported the idea of replacing parliamentarians with AI, while 60% of American respondents opposed it.
https://www.cnbc.com/2021/05/27/europeans-want-to-replace-lawmakers-with-ai.html
#wtf #eu #lawmakers #ai #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Researchers at IE University's Center for the Governance of Change asked 2,769 people from 11 countries worldwide how they would feel about reducing the number of national parliamentarians in their country and giving those seats to an AI that would have access to their data.
The results, published Thursday, showed that despite AI's clear and obvious limitations, 51% of Europeans said they were in favor of such a move.
Outside Europe, some 75% of people surveyed in China supported the idea of replacing parliamentarians with AI, while 60% of American respondents opposed it.
https://www.cnbc.com/2021/05/27/europeans-want-to-replace-lawmakers-with-ai.html
#wtf #eu #lawmakers #ai #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
CNBC
More than half of Europeans want to replace lawmakers with AI, study says
A study from IE University has found that most Europeans would like to see some of their members of parliament replaced by algorithms.
US Soldiers Expose Nuclear Weapons Secrets Via Flashcard Apps
For US soldiers tasked with the custody of nuclear weapons in Europe, the stakes are high. Security protocols are lengthy, detailed and need to be known by heart. To simplify this process, some service members have been using publicly visible flashcard learning apps — inadvertently revealing a multitude of sensitive security protocols about US nuclear weapons and the bases at which they are stored.
While the presence of US nuclear weapons in Europe has long been detailed by various leaked documents, photos and statements by retired officials, their specific locations are officially still a secret with governments neither confirming nor denying their presence.
As many campaigners and parliamentarians in some European nations see it, this ambiguity has often hampered open and democratic debate about the rights and wrongs of hosting nuclear weapons.
However, the flashcards studied by soldiers tasked with guarding these devices reveal not just the bases, but even identify the exact shelters with “hot” vaults that likely contain nuclear weapons.
They also detail intricate security details and protocols such as the positions of cameras, the frequency of patrols around the vaults, secret duress words that signal when a guard is being threatened and the unique identifiers that a restricted area badge needs to have.
https://www.bellingcat.com/news/2021/05/28/us-soldiers-expose-nuclear-weapons-secrets-via-flashcard-apps/
#bellingcat #usa #soldiers #expose #nuclear #waepons #secrets #flashcard #apps
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
For US soldiers tasked with the custody of nuclear weapons in Europe, the stakes are high. Security protocols are lengthy, detailed and need to be known by heart. To simplify this process, some service members have been using publicly visible flashcard learning apps — inadvertently revealing a multitude of sensitive security protocols about US nuclear weapons and the bases at which they are stored.
While the presence of US nuclear weapons in Europe has long been detailed by various leaked documents, photos and statements by retired officials, their specific locations are officially still a secret with governments neither confirming nor denying their presence.
As many campaigners and parliamentarians in some European nations see it, this ambiguity has often hampered open and democratic debate about the rights and wrongs of hosting nuclear weapons.
However, the flashcards studied by soldiers tasked with guarding these devices reveal not just the bases, but even identify the exact shelters with “hot” vaults that likely contain nuclear weapons.
They also detail intricate security details and protocols such as the positions of cameras, the frequency of patrols around the vaults, secret duress words that signal when a guard is being threatened and the unique identifiers that a restricted area badge needs to have.
https://www.bellingcat.com/news/2021/05/28/us-soldiers-expose-nuclear-weapons-secrets-via-flashcard-apps/
#bellingcat #usa #soldiers #expose #nuclear #waepons #secrets #flashcard #apps
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
bellingcat
US Soldiers Expose Nuclear Weapons Secrets Via Flashcard Apps - bellingcat
Online study aids used by US soldiers contained detailed information about base security and the location of nuclear devices in Europe.
This media is not supported in your browser
VIEW IN TELEGRAM
The Robot Smiled Back
Columbia Engineering researchers use AI to teach robots to make appropriate reactive human facial expressions, an ability that could build trust between humans and their robotic co-workers and care-givers.
https://www.youtube.com/watch?v=1vBLI-q04kM
https://telegra.ph/The-Robot-Smiled-Back-05-28
via www.newswise.com
#research #robots #ai #facial #expressions #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Columbia Engineering researchers use AI to teach robots to make appropriate reactive human facial expressions, an ability that could build trust between humans and their robotic co-workers and care-givers.
https://www.youtube.com/watch?v=1vBLI-q04kM
https://telegra.ph/The-Robot-Smiled-Back-05-28
via www.newswise.com
#research #robots #ai #facial #expressions #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Your iPhone (and iCloud backups) are full of gigabytes-worth of old iMessages that are virtually impossible to read
Many iPhone owners have iMessages from years ago that they can’t access. For example, my wife and I simply want to read the first few messages that we exchanged in 2017, but we can’t.
Yet we pay for the right to read these messages in two ways: precious space our 64GB iPhones (and Macs) and iCloud storage, which Apple charges us for each month. Many other people have had this problem for several years, a quick Google search reveals ...
The cumbersome way Apple lets you (theoretically) access old messages is to “scroll to the top” of your conversation, but it’s extremely time consuming and doesn’t work in practice. Yesterday I tried to scroll to the “top” of my iMessages that were from and to my wife. After just a few minutes, my computer with 16GB of RAM started “beach balling” and the app froze before I could even get to messages from 6 months ago. Meanwhile, my wife tried to access our earliest messages on her iPhone 8 Plus and it was even sadder: after over 45 minutes of scrolling, she got within a year of the conversation’s beginning and then the iMessages app crashed on her.
https://keydiscussions.com/2021/05/28/apple-charges-for-storing-gigabytes-worth-of-old-imessages-you-cant-reliably-access/
#apple #imessages #storage #iCloud
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Many iPhone owners have iMessages from years ago that they can’t access. For example, my wife and I simply want to read the first few messages that we exchanged in 2017, but we can’t.
Yet we pay for the right to read these messages in two ways: precious space our 64GB iPhones (and Macs) and iCloud storage, which Apple charges us for each month. Many other people have had this problem for several years, a quick Google search reveals ...
The cumbersome way Apple lets you (theoretically) access old messages is to “scroll to the top” of your conversation, but it’s extremely time consuming and doesn’t work in practice. Yesterday I tried to scroll to the “top” of my iMessages that were from and to my wife. After just a few minutes, my computer with 16GB of RAM started “beach balling” and the app froze before I could even get to messages from 6 months ago. Meanwhile, my wife tried to access our earliest messages on her iPhone 8 Plus and it was even sadder: after over 45 minutes of scrolling, she got within a year of the conversation’s beginning and then the iMessages app crashed on her.
https://keydiscussions.com/2021/05/28/apple-charges-for-storing-gigabytes-worth-of-old-imessages-you-cant-reliably-access/
#apple #imessages #storage #iCloud
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
IE-CGC-European-Tech-Insights-2021-(Part-II).pdf
5.1 MB
Embracing and Governing Technological Disruption
There has always existed an interplay between human-kind and technology’s promise to improve our lives. Seldom, and certainly not in modern times, has the adoption of technology accelerated as quickly as it has with the Covid-19 pandemic.
https://docs.ie.edu/cgc/IE-CGC-European-Tech-Insights-2021-%28Part-II%29.pdf
💡 👉🏼 related article:
More than half of Europeans want to replace lawmakers with AI, study says
https://www.cnbc.com/2021/05/27/europeans-want-to-replace-lawmakers-with-ai.html
#eu #tech #insights #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
There has always existed an interplay between human-kind and technology’s promise to improve our lives. Seldom, and certainly not in modern times, has the adoption of technology accelerated as quickly as it has with the Covid-19 pandemic.
https://docs.ie.edu/cgc/IE-CGC-European-Tech-Insights-2021-%28Part-II%29.pdf
💡 👉🏼 related article:
More than half of Europeans want to replace lawmakers with AI, study says
https://www.cnbc.com/2021/05/27/europeans-want-to-replace-lawmakers-with-ai.html
#eu #tech #insights #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The Pirate Bay Remains Resilient, 15 Years After The Raid
Fifteen years ago today The Pirate Bay was raided by dozens of Swedish police officers. The entertainment industries hoped that this would permanently shut down the site, but that was not the case. Instead, the police action inadvertently helped to create one of the most resilient and iconic websites on the Internet.
There are a handful of traditions we have at #TorrentFreak, and remembering the first raid on The Pirate Bay is one of them.
Not only was it the first major story we covered, it also had a significant impact on how the piracy ecosystem evolved over the years. It also changed the lives of the site’s co-founders, who were eventually convicted.
While a lot has changed over the years, The Pirate Bay is still around and there are no signs that this will change anytime soon. What many people may not realize, however, is that without a few essential keystrokes in the site’s early years, the site would be a distant memory today.
This is what happened....
https://torrentfreak.com/the-pirate-bay-remains-resilient-15-years-after-the-raid-210531/
#piratebay #raid
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Fifteen years ago today The Pirate Bay was raided by dozens of Swedish police officers. The entertainment industries hoped that this would permanently shut down the site, but that was not the case. Instead, the police action inadvertently helped to create one of the most resilient and iconic websites on the Internet.
There are a handful of traditions we have at #TorrentFreak, and remembering the first raid on The Pirate Bay is one of them.
Not only was it the first major story we covered, it also had a significant impact on how the piracy ecosystem evolved over the years. It also changed the lives of the site’s co-founders, who were eventually convicted.
While a lot has changed over the years, The Pirate Bay is still around and there are no signs that this will change anytime soon. What many people may not realize, however, is that without a few essential keystrokes in the site’s early years, the site would be a distant memory today.
This is what happened....
https://torrentfreak.com/the-pirate-bay-remains-resilient-15-years-after-the-raid-210531/
#piratebay #raid
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
The Pirate Bay Remains Resilient, 15 Years After The Raid * TorrentFreak
Fifteen years ago today The Pirate Bay was raided by Swedish police. The plan was to shut the site down, but that failed.
Shieldy got acquired by 1inch Network
I am announcing the acquisition of Shieldy Telegram bot by 1inch Network and telling you my personal story of how I've built, grown and sold Shieldy in detail.
I'm thrilled to announce that @shieldy_bot is now in better hands that are more suitable to grow it past the 20 000 000 users point. I believe that the new owner of Shieldy has better chances of supporting this open-source solution in the long run and bringing more value to the users. After all, I'm just a single guy standing in front of my computer writing code. 1inch has way more resources than I.
In the previous article, I've described how I calculated an estimated value of Shieldy and how I got three acquisition offers ranging from $100 000 to $150 000, which I rejected. In this article, I'm going to tell you the story of Shieldy. Starting from the beginning and up to the point when I sold it to 1inch for $329 000. How and why I built it, how it became popular, how I could find a better future maintainer and why I picked 1inch to succeed me in owning Shieldy (yes, I was fortunate enough to choose my successor). Keep reading!
https://blog.borodutch.com/shieldy-got-acquired-by-1inch-exchange/
https://1inch.io/
#tg #telegram #bot #shieldy #borodutch
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
I am announcing the acquisition of Shieldy Telegram bot by 1inch Network and telling you my personal story of how I've built, grown and sold Shieldy in detail.
I'm thrilled to announce that @shieldy_bot is now in better hands that are more suitable to grow it past the 20 000 000 users point. I believe that the new owner of Shieldy has better chances of supporting this open-source solution in the long run and bringing more value to the users. After all, I'm just a single guy standing in front of my computer writing code. 1inch has way more resources than I.
In the previous article, I've described how I calculated an estimated value of Shieldy and how I got three acquisition offers ranging from $100 000 to $150 000, which I rejected. In this article, I'm going to tell you the story of Shieldy. Starting from the beginning and up to the point when I sold it to 1inch for $329 000. How and why I built it, how it became popular, how I could find a better future maintainer and why I picked 1inch to succeed me in owning Shieldy (yes, I was fortunate enough to choose my successor). Keep reading!
https://blog.borodutch.com/shieldy-got-acquired-by-1inch-exchange/
https://1inch.io/
#tg #telegram #bot #shieldy #borodutch
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Golden Borodutch
Shieldy got acquired by 1inch Network
I am announcing the acquisition of Shieldy Telegram bot by 1inch Network and telling you my personal story of how I've built, grown and sold Shieldy in detail
Mass scale manipulation of Twitter Trends discovered
New EPFL research has found that almost half of local Twitter trending topics in Turkey are fake, a scale of manipulation previously unheard of. It also proves for the first time that many trends are created solely by bots due to a vulnerability in Twitter’s Trends algorithm.
Social media has become ubiquitous in our modern, daily lives. It has changed the way that people interact, connecting us in previously unimaginable ways. Yet, where once our social media networks probably consisted of a small circle of friends most of us are now part of much larger communities that can influence what we read, do, and even think.
One influencing mechanism, for example, is ‘Twitter Trends’. The platform uses an algorithm to determine hashtag-driven topics that become popular at a given point in time, alerting twitter users to the top words, phrases, subjects and popular hashtags globally and locally.
Now, new EPFL research focused on Turkey, from the Distributed Information Systems Laboratory, part of the School of Computer and Communication Sciences has found a vulnerability in the algorithm that decides Twitter Trending Topics: it does not take deletions into account. This allows attackers to push the trends they want to the top of Twitter Trends despite deleting their tweets which contain the candidate trend shortly afterwards.
https://actu.epfl.ch/news/mass-scale-manipulation-of-twitter-trends-discov-2/
💡 Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends (PDF)
https://arxiv.org/pdf/1910.07783.pdf
#twitter #manipulation #turkey #research #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
New EPFL research has found that almost half of local Twitter trending topics in Turkey are fake, a scale of manipulation previously unheard of. It also proves for the first time that many trends are created solely by bots due to a vulnerability in Twitter’s Trends algorithm.
Social media has become ubiquitous in our modern, daily lives. It has changed the way that people interact, connecting us in previously unimaginable ways. Yet, where once our social media networks probably consisted of a small circle of friends most of us are now part of much larger communities that can influence what we read, do, and even think.
One influencing mechanism, for example, is ‘Twitter Trends’. The platform uses an algorithm to determine hashtag-driven topics that become popular at a given point in time, alerting twitter users to the top words, phrases, subjects and popular hashtags globally and locally.
Now, new EPFL research focused on Turkey, from the Distributed Information Systems Laboratory, part of the School of Computer and Communication Sciences has found a vulnerability in the algorithm that decides Twitter Trending Topics: it does not take deletions into account. This allows attackers to push the trends they want to the top of Twitter Trends despite deleting their tweets which contain the candidate trend shortly afterwards.
https://actu.epfl.ch/news/mass-scale-manipulation-of-twitter-trends-discov-2/
💡 Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends (PDF)
https://arxiv.org/pdf/1910.07783.pdf
#twitter #manipulation #turkey #research #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
actu.epfl.ch
Mass scale manipulation of Twitter Trends discovered
New EPFL research has found that almost half of local Twitter trending topics in Turkey are fake, a scale of manipulation previously unheard of. It also proves for the first time that many trends are created solely by bots due to a vulnerability in Twitter’s…
FUJIFILM shuts down network after suspected ransomware attack
FujiFilm is investigating a ransomware attack and has shut down portions of its network to prevent the attack's spread.
FujiFilm, also known as just Fuji, is a Japanese multinational conglomerate headquartered in Tokyo, Japan, which initially started in optical film and cameras. It has grown to include pharmaceuticals, storage devices, photocopiers and printers (XEROX), and digital cameras.
FUJIFILM earned $20.1 billion in 2020 and has 37,151 employees worldwide.
Today, FUJIFILM announced that their Tokyo headquarters suffered a cyberattack Tuesday night that they indicate is a ransomware attack.
"FUJIFILM Corporation is currently carrying out an investigation into possible unauthorized access to its server from outside of the company. As part of this investigation, the network is partially shut down and disconnected from external correspondence," FUJIFILM said in a statement.
"We want to state what we understand as of now and the measures that the company has taken. In the late evening of June 1, 2021, we became aware of the possibility of a ransomware attack. As a result, we have taken measures to suspend all affected systems in coordination with our various global entities."
"We are currently working to determine the extent and the scale of the issue. We sincerely apologize to our customers and business partners for the inconvenience this has caused."
Due to the partial network outage, FUJIFILM USA has added an alert to the top of their website stating that they are experiencing network problems that are impacting their email and phone systems.
https://www.bleepingcomputer.com/news/security/fujifilm-shuts-down-network-after-suspected-ransomware-attack/
#fujifilm #ransomware #attack
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
FujiFilm is investigating a ransomware attack and has shut down portions of its network to prevent the attack's spread.
FujiFilm, also known as just Fuji, is a Japanese multinational conglomerate headquartered in Tokyo, Japan, which initially started in optical film and cameras. It has grown to include pharmaceuticals, storage devices, photocopiers and printers (XEROX), and digital cameras.
FUJIFILM earned $20.1 billion in 2020 and has 37,151 employees worldwide.
Today, FUJIFILM announced that their Tokyo headquarters suffered a cyberattack Tuesday night that they indicate is a ransomware attack.
"FUJIFILM Corporation is currently carrying out an investigation into possible unauthorized access to its server from outside of the company. As part of this investigation, the network is partially shut down and disconnected from external correspondence," FUJIFILM said in a statement.
"We want to state what we understand as of now and the measures that the company has taken. In the late evening of June 1, 2021, we became aware of the possibility of a ransomware attack. As a result, we have taken measures to suspend all affected systems in coordination with our various global entities."
"We are currently working to determine the extent and the scale of the issue. We sincerely apologize to our customers and business partners for the inconvenience this has caused."
Due to the partial network outage, FUJIFILM USA has added an alert to the top of their website stating that they are experiencing network problems that are impacting their email and phone systems.
https://www.bleepingcomputer.com/news/security/fujifilm-shuts-down-network-after-suspected-ransomware-attack/
#fujifilm #ransomware #attack
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BleepingComputer
FUJIFILM shuts down network after suspected ransomware attack
FujiFilm is investigating a ransomware attack and has shut down portions of its network to prevent the attack's spread.