Media is too big
VIEW IN TELEGRAM
Nextcloud Tor Hidden Service! (.onion) Featuring Pine64 A64 LTS
Howto: self host Nextcloud as a Tor (.onion) Hidden Service using a Single Board Computer! Darkweb Nextcloud from start to finish!
⚠️ This video leaves a functional Nextcloud Hidden Service, but hardening is needed.
https://devtube.dev-wiki.de/videos/watch/79ff6de5-f7a8-4d96-aa54-710756b49666
#nextcloud #tor #onion #darkweb #pine64 #guide #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
Howto: self host Nextcloud as a Tor (.onion) Hidden Service using a Single Board Computer! Darkweb Nextcloud from start to finish!
⚠️ This video leaves a functional Nextcloud Hidden Service, but hardening is needed.
https://devtube.dev-wiki.de/videos/watch/79ff6de5-f7a8-4d96-aa54-710756b49666
#nextcloud #tor #onion #darkweb #pine64 #guide #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
This is no ordinary spying. Our most intimate selves are now exposed
The Pegasus project shows we could all soon be ruled by states that know everything about us, while we know less and less about them
Here in India, the summer of dying is quickly morphing into what looks very much like a summer of spying.
The second wave of coronavirus has retreated, after leaving an estimated 4 million Indians dead. The official government figure for the number of deaths is a tenth of that – 400,000. In Narendra Modi’s dystopia, even as the smoke dwindled in crematoriums and the earth settled in graveyards, gigantic hoardings appeared on our streets saying “Thank you Modiji”. (An expression of the people’s gratitude-in-advance for the “free vaccine” that remains largely unavailable, and which 95% of the population is yet to receive.) As far as Modi’s government is concerned, any attempt to tabulate the true death toll is a conspiracy against India – as if the millions more who died were simply actors who lay down spitefully in the shallow, mass graves that you saw in aerial photos, or floated themselves into rivers disguised as corpses, or cremated themselves on city sidewalks, motivated solely by the desire to sully India’s international reputation.
This same charge has now been levelled by the Indian government and its embedded media against the international consortium of investigative journalists from 17 news organisations who worked with Forbidden Stories and Amnesty International to break an extraordinary story about global surveillance on a massive scale. India appears in these reports, alongside a group of countries whose governments appear to have bought Pegasus spyware developed by NSO Group, an Israeli surveillance firm. NSO, for its part, has said that it sells its technology only to governments that have been vetted for their human rights record and undertake to use it only for purposes of national security – to track terrorists and criminals.
The other countries that seem to have passed NSO’s human rights test include Rwanda, Saudi Arabia, Bahrain, the UAE and Mexico. So who, exactly, has agreed upon the definition of “terrorists” and “criminals”? Is this simply up to NSO and its clients?
https://www.theguardian.com/commentisfree/2021/jul/27/spying-pegasus-project-states-arundhati-roy
#comment #pegasus #nso #india
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The Pegasus project shows we could all soon be ruled by states that know everything about us, while we know less and less about them
Here in India, the summer of dying is quickly morphing into what looks very much like a summer of spying.
The second wave of coronavirus has retreated, after leaving an estimated 4 million Indians dead. The official government figure for the number of deaths is a tenth of that – 400,000. In Narendra Modi’s dystopia, even as the smoke dwindled in crematoriums and the earth settled in graveyards, gigantic hoardings appeared on our streets saying “Thank you Modiji”. (An expression of the people’s gratitude-in-advance for the “free vaccine” that remains largely unavailable, and which 95% of the population is yet to receive.) As far as Modi’s government is concerned, any attempt to tabulate the true death toll is a conspiracy against India – as if the millions more who died were simply actors who lay down spitefully in the shallow, mass graves that you saw in aerial photos, or floated themselves into rivers disguised as corpses, or cremated themselves on city sidewalks, motivated solely by the desire to sully India’s international reputation.
This same charge has now been levelled by the Indian government and its embedded media against the international consortium of investigative journalists from 17 news organisations who worked with Forbidden Stories and Amnesty International to break an extraordinary story about global surveillance on a massive scale. India appears in these reports, alongside a group of countries whose governments appear to have bought Pegasus spyware developed by NSO Group, an Israeli surveillance firm. NSO, for its part, has said that it sells its technology only to governments that have been vetted for their human rights record and undertake to use it only for purposes of national security – to track terrorists and criminals.
The other countries that seem to have passed NSO’s human rights test include Rwanda, Saudi Arabia, Bahrain, the UAE and Mexico. So who, exactly, has agreed upon the definition of “terrorists” and “criminals”? Is this simply up to NSO and its clients?
https://www.theguardian.com/commentisfree/2021/jul/27/spying-pegasus-project-states-arundhati-roy
#comment #pegasus #nso #india
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
the Guardian
This is no ordinary spying. Our most intimate selves are now exposed | Arundhati Roy
The Pegasus project shows we could all soon be ruled by states that know everything about us, says novelist and activist Arundhati Roy
Former intelligence analyst sentenced to 45 months in prison
Former intelligence analyst Daniel Everette Hale was arrested on May 9, 2019, and charged with leaking classified information about drone warfare and other counterterrorism measures to a reporter.
Hale has been charged with five crimes related to the disclosure of military-related information, and could face up to 50 years in prison if convicted.
https://nitter.pussthecat.org/FreedomofPress/status/1420062103554166791
via Twitter
💡 Read as well: 👇🏽
Former intelligence analyst charged with leaking classified documents to reporter
https://pressfreedomtracker.us/all-incidents/former-intelligence-analyst-charged-leaking-classified-documents-reporter/
#whistleblower #usa #hale
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Former intelligence analyst Daniel Everette Hale was arrested on May 9, 2019, and charged with leaking classified information about drone warfare and other counterterrorism measures to a reporter.
Hale has been charged with five crimes related to the disclosure of military-related information, and could face up to 50 years in prison if convicted.
https://nitter.pussthecat.org/FreedomofPress/status/1420062103554166791
via Twitter
💡 Read as well: 👇🏽
Former intelligence analyst charged with leaking classified documents to reporter
https://pressfreedomtracker.us/all-incidents/former-intelligence-analyst-charged-leaking-classified-documents-reporter/
#whistleblower #usa #hale
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Nitter
Freedom of the Press (@FreedomofPress)
BREAKING: Drone whistleblower Daniel Hale sentenced to 45 months in prison. Not the maximum term he faced, but still a shamefully excessive punishment for following his conscience and bringing important information to the American public.
Leaks to press in the public interest shouldn't be prosecuted under the Espionage Act. Period.
Daniel Hale helped the public learn about a lethal program that never should have been kept secret. He should be thanked, not sentenced as a spy.
https://nitter.pussthecat.org/ACLU/status/1420086837897478147
via Twitter
💡 Read as well: 👇🏽
Former intelligence analyst sentenced to 45 months in prison
https://t.iss.one/BlackBox_Archiv/2428
#whistleblower #usa #hale
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Daniel Hale helped the public learn about a lethal program that never should have been kept secret. He should be thanked, not sentenced as a spy.
https://nitter.pussthecat.org/ACLU/status/1420086837897478147
via Twitter
💡 Read as well: 👇🏽
Former intelligence analyst sentenced to 45 months in prison
https://t.iss.one/BlackBox_Archiv/2428
#whistleblower #usa #hale
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Illegal streaming service shut down and man arrested
A police operation working closely with FACT who investigate cybercrime, fraud and other IP crime, have arrested a man in Shrewsbury in connection with suspected illegal streaming of premium television channels, and other copyrighted material.
A 56 year old man was arrested for Money Laundering (s327 Proceeds of Crime Act 2002) and encouraging or assisting in the commission of an either way offence namely obtaining services dishonestly (s44 Serious Crime Act 2007 and s11 Fraud act 2006). This was following an investigation in partnership with FACT. He was taken to Shrewsbury Police Station for questioning and has now been released under investigation pending further enquiries.
During the warrant, officers were able to access and disrupt the online platform, disable the suspected illegal streams and deliver an on screen message to those who receive them warning that the content accessed is suspected to be unlawful.
Sergeant Ian Osborne from West Mercia’s Cyber Crime Unit said: “This operation is the unit's first arrest in relation to online streaming and sends out a strong message that we are homing in on those who knowingly commit or facilitate online copyright infringement."
"Not only is there an enormous loss to the entertainment industry with this particular operation but it is also unfair that millions of people work hard to afford their subscription-only TV services while others cheat the system."
https://www.westmercia.police.uk/news/west-mercia/news/2021/july/illegal-streaming-service-shut-down-and-man-arrested/
#illegal #streaming #shutdown #police #uk #fact
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A police operation working closely with FACT who investigate cybercrime, fraud and other IP crime, have arrested a man in Shrewsbury in connection with suspected illegal streaming of premium television channels, and other copyrighted material.
A 56 year old man was arrested for Money Laundering (s327 Proceeds of Crime Act 2002) and encouraging or assisting in the commission of an either way offence namely obtaining services dishonestly (s44 Serious Crime Act 2007 and s11 Fraud act 2006). This was following an investigation in partnership with FACT. He was taken to Shrewsbury Police Station for questioning and has now been released under investigation pending further enquiries.
During the warrant, officers were able to access and disrupt the online platform, disable the suspected illegal streams and deliver an on screen message to those who receive them warning that the content accessed is suspected to be unlawful.
Sergeant Ian Osborne from West Mercia’s Cyber Crime Unit said: “This operation is the unit's first arrest in relation to online streaming and sends out a strong message that we are homing in on those who knowingly commit or facilitate online copyright infringement."
"Not only is there an enormous loss to the entertainment industry with this particular operation but it is also unfair that millions of people work hard to afford their subscription-only TV services while others cheat the system."
https://www.westmercia.police.uk/news/west-mercia/news/2021/july/illegal-streaming-service-shut-down-and-man-arrested/
#illegal #streaming #shutdown #police #uk #fact
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
We need more protection from government surveillance — not less
The ability to communicate securely via encryption is essential to the protection of democracy and human rights.
Joint open letter by 13 NGOs to the editor of Politico Europe in response to the Op Ed by Head of Europol & NY District Attorney on encryption, July 27, 2021
In their opinion piece “The last refuge of the criminal: Encrypted smartphones” (July 26), Catherine De Bolle, executive director of Europol, and Cyrus R. Vance, Jr., district attorney of New York County, made an extraordinary bid to undermine encryption, barely a week after the Pegasus scandal rocked the globe and exposed the perils of government surveillance facilitated by tech companies.
The headline itself will be particularly jarring to the hundreds of journalists and human rights defenders currently in detention all around the world. Their “crime”? Defending the rights of others and standing up for democracy.
In Turkey, to cite one example, many have gone to prison simply for using encrypted messaging services — an act in itself deemed criminal by the authorities. As we saw with Pegasus, Europe is no exception to this trend, with three Hungarian investigative journalists targeted.
Human rights defenders and journalists are not the only groups for whom encryption is essential. Members of the LGBTQ+ community depend on end-to-end encryption to help ensure their privacy and safety. Domestic violence survivors rely on end-to-end encryption tools to provide a secure channel to make plans and communicate with trusted individuals.
Encryption helps prevent spies, criminals and hostile governments from accessing and exploiting confidential communications; stealing personal, financial and other types of data; penetrating computer systems and databases and causing wide-scale, systemic disruptions to economies, infrastructure and security.
The claim that the authors support “strong encryption, just not unregulated encryption” is unfortunately misleading. As any technologist or engineer will confirm, communications are either end-to-end encrypted, or they are not. This is a question of computer science.
“Regulated encryption” is simply a euphemism for government backdoors into our communications. Backdoors undermine the security of communications, leaving them open and vulnerable to attacks from malevolent actors. There is no such thing as a backdoor for only the good guys. Even if there was, the Pegasus scandal is a reminder that not all governments are “good” and that “good governments” can act badly.
https://www.fidh.org/en/international-advocacy/european-union/we-need-more-protection-from-government-surveillance-not-less
#encryption #surveillance #eu
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The ability to communicate securely via encryption is essential to the protection of democracy and human rights.
Joint open letter by 13 NGOs to the editor of Politico Europe in response to the Op Ed by Head of Europol & NY District Attorney on encryption, July 27, 2021
In their opinion piece “The last refuge of the criminal: Encrypted smartphones” (July 26), Catherine De Bolle, executive director of Europol, and Cyrus R. Vance, Jr., district attorney of New York County, made an extraordinary bid to undermine encryption, barely a week after the Pegasus scandal rocked the globe and exposed the perils of government surveillance facilitated by tech companies.
The headline itself will be particularly jarring to the hundreds of journalists and human rights defenders currently in detention all around the world. Their “crime”? Defending the rights of others and standing up for democracy.
In Turkey, to cite one example, many have gone to prison simply for using encrypted messaging services — an act in itself deemed criminal by the authorities. As we saw with Pegasus, Europe is no exception to this trend, with three Hungarian investigative journalists targeted.
Human rights defenders and journalists are not the only groups for whom encryption is essential. Members of the LGBTQ+ community depend on end-to-end encryption to help ensure their privacy and safety. Domestic violence survivors rely on end-to-end encryption tools to provide a secure channel to make plans and communicate with trusted individuals.
Encryption helps prevent spies, criminals and hostile governments from accessing and exploiting confidential communications; stealing personal, financial and other types of data; penetrating computer systems and databases and causing wide-scale, systemic disruptions to economies, infrastructure and security.
The claim that the authors support “strong encryption, just not unregulated encryption” is unfortunately misleading. As any technologist or engineer will confirm, communications are either end-to-end encrypted, or they are not. This is a question of computer science.
“Regulated encryption” is simply a euphemism for government backdoors into our communications. Backdoors undermine the security of communications, leaving them open and vulnerable to attacks from malevolent actors. There is no such thing as a backdoor for only the good guys. Even if there was, the Pegasus scandal is a reminder that not all governments are “good” and that “good governments” can act badly.
https://www.fidh.org/en/international-advocacy/european-union/we-need-more-protection-from-government-surveillance-not-less
#encryption #surveillance #eu
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
International Federation for Human Rights
We need more protection from government surveillance — not less
The ability to communicate securely via encryption is essential to the protection of democracy and human rights.
Joint open letter by 13 NGOs to (...)
Joint open letter by 13 NGOs to (...)
Media is too big
VIEW IN TELEGRAM
Pegasus Project Reveals Phone Spyware Targets - ThreatWire
The REvil Decryption Key is Obtained, Windows & Linux are Vulnerable to Privilege Escalation Attacks, and the Pegasus Project Reveals Phone Spyware Targeting! All that coming up now on ThreatWire.
https://www.youtube.com/watch?v=mJfCTJRs1io
#revil #pegasus #spyware #threatwire #hak5 #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
The REvil Decryption Key is Obtained, Windows & Linux are Vulnerable to Privilege Escalation Attacks, and the Pegasus Project Reveals Phone Spyware Targeting! All that coming up now on ThreatWire.
https://www.youtube.com/watch?v=mJfCTJRs1io
#revil #pegasus #spyware #threatwire #hak5 #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
Cinny — Yet another matrix client
Imagine a matrix client...
Where you can enjoy the conversation using simple, elegant and secure interface protected by e2ee with the power of open source.
https://cinny.in/
👉🏽Found @: https://t.iss.one/v1_links
#cinny #matrix
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Imagine a matrix client...
Where you can enjoy the conversation using simple, elegant and secure interface protected by e2ee with the power of open source.
https://cinny.in/
👉🏽Found @: https://t.iss.one/v1_links
#cinny #matrix
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
cinny.in
A Matrix client where you can enjoy the conversation using simple, elegant and secure interface protected by e2ee with the power of open source.
Windows encryption Bitlocker bypassed despite TPM protection
From Stolen Laptop to Inside the Company Network
What can you do with a stolen laptop? Can you get access to our internal network? That was the question a client wanted answered recently. Spoiler alert: Yes, yes you can. This post will walk you through how we took a “stolen” corporate laptop and chained several exploits together to get inside the client’s corporate network.
We received a Lenovo laptop preconfigured with the standard security stack for this organization. We didn’t get any information about this laptop, no test credentials, no configuration details, no nothing, it was a 100% blackbox test. Once the laptop came in, we opened the shipping box and got to work. After we did our reconnaissance of the laptop (BIOS settings, normal boot operation, hardware details, etc) we noted a lot of best practices were being followed, negating many common attacks.
https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
#encryption #bitlocker #tpm #lenovo
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
From Stolen Laptop to Inside the Company Network
What can you do with a stolen laptop? Can you get access to our internal network? That was the question a client wanted answered recently. Spoiler alert: Yes, yes you can. This post will walk you through how we took a “stolen” corporate laptop and chained several exploits together to get inside the client’s corporate network.
We received a Lenovo laptop preconfigured with the standard security stack for this organization. We didn’t get any information about this laptop, no test credentials, no configuration details, no nothing, it was a 100% blackbox test. Once the laptop came in, we opened the shipping box and got to work. After we did our reconnaissance of the laptop (BIOS settings, normal boot operation, hardware details, etc) we noted a lot of best practices were being followed, negating many common attacks.
https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
#encryption #bitlocker #tpm #lenovo
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Orbiter Space Flight Simulator
Orbiter is a spaceflight simulator based on Newtonian mechanics. Its playground is our solar system with many of its major bodies – the sun, planets and moons. You take control of a spacecraft – either historic, hypothetical, or purely science fiction. Orbiter is unlike most commercial computer games with a space theme – there are no predefined missions to complete (except the ones you set yourself), no aliens to destroy and no goods to trade.
Instead, you will get a pretty good idea about what is involved in real space flight – how to plan an ascent into orbit, how to rendezvous with a space station, or how to fly to another planet. It is more difficult, but also more of a challenge. Some people get hooked, others get bored. Finding out for yourself is easy – simply give it a try. Orbiter is free, so you don’t need to invest more than a bit of your spare time.
https://github.com/mschweiger/orbiter
💡 Read as well: 👇🏽
https://www.orbiter-forum.com/threads/orbiter-is-now-open-source.40023/
#orbiter #spaceflight #simulator #opensource
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Orbiter is a spaceflight simulator based on Newtonian mechanics. Its playground is our solar system with many of its major bodies – the sun, planets and moons. You take control of a spacecraft – either historic, hypothetical, or purely science fiction. Orbiter is unlike most commercial computer games with a space theme – there are no predefined missions to complete (except the ones you set yourself), no aliens to destroy and no goods to trade.
Instead, you will get a pretty good idea about what is involved in real space flight – how to plan an ascent into orbit, how to rendezvous with a space station, or how to fly to another planet. It is more difficult, but also more of a challenge. Some people get hooked, others get bored. Finding out for yourself is easy – simply give it a try. Orbiter is free, so you don’t need to invest more than a bit of your spare time.
https://github.com/mschweiger/orbiter
💡 Read as well: 👇🏽
https://www.orbiter-forum.com/threads/orbiter-is-now-open-source.40023/
#orbiter #spaceflight #simulator #opensource
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
GitHub - orbitersim/orbiter: Open-source repository of Orbiter Space Flight Simulator
Open-source repository of Orbiter Space Flight Simulator - orbitersim/orbiter
Activision Blizzard Hires Notorious Union-Busting Firm WilmerHale
Yesterday, July the 28th, many of Activision’s 9,500 workers walked off the job to protest the culture of harassment and discrimination present at the company. Activision Blizzard is currently being sued by the state of California over alleged sexual harassment and ‘frat boy’ culture. The complaint from California asserts that “[f]emale employees receive lower starting pay and also earn less than male employees for substantially similar work.”
The lawsuit shows wide-ranging discrimination towards women from the company. The complaint notes that the company is “only 20 percent women.” Its top leadership is also exclusively male and white,” and that “very few women ever reach top roles in the company.” The women who do reach higher roles earn less salary, incentive pay, and total compensation than their male peers, as evidenced in Activision’s own records.
Activision has called in the experts to put down the claims of sexual harassment and discrimination and stop the protests by workers. Activision has hired WilmerHale. WilmerHale has been hired to “review” Activision’s policies. Wilmerhale’s own site advertises its expertise as “union awareness and avoidance.” They use attorneys and experts to develop “union avoidance strategies and union organizational campaigns.” WilmerHale was used extensively by Amazon to spread anti-union misinformation and propaganda to “sow doubts about the unionization drive.” WilmerHale was the firm that killed unionization efforts at an Amazon center in Bessemer, Alabama.
https://www.promethean.news/news/activision-hires-notorious-union-busting-firm-wilmerhale
#activision #blizzard #WilmerHale #amazon
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Yesterday, July the 28th, many of Activision’s 9,500 workers walked off the job to protest the culture of harassment and discrimination present at the company. Activision Blizzard is currently being sued by the state of California over alleged sexual harassment and ‘frat boy’ culture. The complaint from California asserts that “[f]emale employees receive lower starting pay and also earn less than male employees for substantially similar work.”
The lawsuit shows wide-ranging discrimination towards women from the company. The complaint notes that the company is “only 20 percent women.” Its top leadership is also exclusively male and white,” and that “very few women ever reach top roles in the company.” The women who do reach higher roles earn less salary, incentive pay, and total compensation than their male peers, as evidenced in Activision’s own records.
Activision has called in the experts to put down the claims of sexual harassment and discrimination and stop the protests by workers. Activision has hired WilmerHale. WilmerHale has been hired to “review” Activision’s policies. Wilmerhale’s own site advertises its expertise as “union awareness and avoidance.” They use attorneys and experts to develop “union avoidance strategies and union organizational campaigns.” WilmerHale was used extensively by Amazon to spread anti-union misinformation and propaganda to “sow doubts about the unionization drive.” WilmerHale was the firm that killed unionization efforts at an Amazon center in Bessemer, Alabama.
https://www.promethean.news/news/activision-hires-notorious-union-busting-firm-wilmerhale
#activision #blizzard #WilmerHale #amazon
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Hollows Hunter
Hollows Hunter allows you to scan your full system, searching for potentially malicious implants, and extract them for further analysis.
It is an application based on PE-sieve (a library version), so there is a big overlap of the features between those two. They have a similar command-line interface, but while PE-sieve is an engine dedicated to scanning a single process, Hollows Hunter offers many additional features and filters on the top of this base.
https://github.com/hasherezade/hollows_hunter
#hollowshunter #tool #antimalware #forensics #analysis
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Hollows Hunter allows you to scan your full system, searching for potentially malicious implants, and extract them for further analysis.
It is an application based on PE-sieve (a library version), so there is a big overlap of the features between those two. They have a similar command-line interface, but while PE-sieve is an engine dedicated to scanning a single process, Hollows Hunter offers many additional features and filters on the top of this base.
https://github.com/hasherezade/hollows_hunter
#hollowshunter #tool #antimalware #forensics #analysis
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
GitHub - hasherezade/hollows_hunter: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants…
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches). - hasherezade/hollows_hunter
Hacker downloads close to 300,000 personal ID photos
A hacker was able to obtain over 280,000 personal identity photos following an attack on the state information system last Friday. The suspect is reportedly a resident of Tallinn.
The culprit had already obtained personal names and ID codes and was able to obtain a third component, the photos, by making individual requests from thousands of IP addresses.
This data was not, however, enough for the hacker to access e-state services, meaning the normal means of authentication (ID card, mobile ID and SMART ID) have not been compromised.
A Information System Authority RIA database holding document photos was compromised.
Speaking at a press conference Wednesday, Oskar Gross, head of the central criminal police cyber crime office, said that: "To date, the individual who committed the attack has had the data he hacked seized and confiscated by the police," adding that the perpetrator was a resident of Tallinn.
https://news.err.ee/1608291072/hacker-downloads-close-to-300-000-personal-id-photos
#hacker #breach #estonia
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A hacker was able to obtain over 280,000 personal identity photos following an attack on the state information system last Friday. The suspect is reportedly a resident of Tallinn.
The culprit had already obtained personal names and ID codes and was able to obtain a third component, the photos, by making individual requests from thousands of IP addresses.
This data was not, however, enough for the hacker to access e-state services, meaning the normal means of authentication (ID card, mobile ID and SMART ID) have not been compromised.
A Information System Authority RIA database holding document photos was compromised.
Speaking at a press conference Wednesday, Oskar Gross, head of the central criminal police cyber crime office, said that: "To date, the individual who committed the attack has had the data he hacked seized and confiscated by the police," adding that the perpetrator was a resident of Tallinn.
https://news.err.ee/1608291072/hacker-downloads-close-to-300-000-personal-id-photos
#hacker #breach #estonia
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
err.ee
Hacker downloads close to 300,000 personal ID photos
A hacker was able to obtain over 280,000 personal identity photos following an attack on the state information system last Friday. The suspect is reportedly a resident of Tallinn.
Kernel Pwning with eBPF: a Love Story
At Grapl we believe that in order to build the best defensive system we need to deeply understand attacker behaviors. As part of that goal we're investing in offensive security research. Keep up with our blog for new research on high risk vulnerabilities, exploitation, and advanced threat tactics.
Find the released local privilege escalation (LPE) Proof-of-Concept for CVE-2021-3490 here: https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490. It targets Ubuntu 20.10 (Groovy Gorilla) kernels 5.8.0-25.26 through 5.8.0-52.58. and Ubuntu 21.04 (Hirsute Hippo) 5.11.0-16.17.
This blog post is intended to give a detailed overview of eBPF from the perspective of an exploit developer.
https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
#linux #kernel #pwning #ebpf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
At Grapl we believe that in order to build the best defensive system we need to deeply understand attacker behaviors. As part of that goal we're investing in offensive security research. Keep up with our blog for new research on high risk vulnerabilities, exploitation, and advanced threat tactics.
Find the released local privilege escalation (LPE) Proof-of-Concept for CVE-2021-3490 here: https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490. It targets Ubuntu 20.10 (Groovy Gorilla) kernels 5.8.0-25.26 through 5.8.0-52.58. and Ubuntu 21.04 (Hirsute Hippo) 5.11.0-16.17.
This blog post is intended to give a detailed overview of eBPF from the perspective of an exploit developer.
https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
#linux #kernel #pwning #ebpf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
GitHub - chompie1337/Linux_LPE_eBPF_CVE-2021-3490
Contribute to chompie1337/Linux_LPE_eBPF_CVE-2021-3490 development by creating an account on GitHub.
Meet Paragon: An American-Funded, Super-Secretive Israeli Surveillance Startup That ‘Hacks WhatsApp And Signal’
Paragon Solutions doesn’t have a website. There’s very little information at all about them online, even if the Tel Aviv-based smartphone surveillance startup’s employees are all over LinkedIn, more than 50 of them. That’s not a bad headcount for a company that’s still in stealth mode.
But it does have a cofounder, director and chief shareholder that will turn heads: Ehud Schneorson, the former commander of Israel’s NSA equivalent, known as Unit 8200. The other cofounders - CEO Idan Nurick, CTO Igor Bogudlov and vice president of research Liad Avraham - are ex-Israeli intelligence too. Also on the board is cofounding director and former Israeli prime minister Ehud Barak. They also have a significant American financial backer: Boston, Massachusetts-based Battery Ventures. According to two senior employees at companies in the Israeli surveillance industry, who spoke on the condition of anonymity, the venture capital business put in between $5 and $10 million, though Battery declined to comment on the nature of its investment, which is only mentioned in brief on the company’s website.
Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted instant messaging communications, whether that’s WhatsApp, Signal, Facebook Messenger or Gmail, the industry sources said. One other spyware industry executive said it also promises to get longer-lasting access to a device, even when it’s rebooted.
https://www.forbes.com/sites/thomasbrewster/2021/07/29/paragon-is-an-nso-competitor-and-an-american-funded-israeli-surveillance-startup-that-hacks-encrypted-apps-like-whatsapp-and-signal/
#paragon #hacking #surveillance #spyware #israel #usa #whatsapp #signal
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Paragon Solutions doesn’t have a website. There’s very little information at all about them online, even if the Tel Aviv-based smartphone surveillance startup’s employees are all over LinkedIn, more than 50 of them. That’s not a bad headcount for a company that’s still in stealth mode.
But it does have a cofounder, director and chief shareholder that will turn heads: Ehud Schneorson, the former commander of Israel’s NSA equivalent, known as Unit 8200. The other cofounders - CEO Idan Nurick, CTO Igor Bogudlov and vice president of research Liad Avraham - are ex-Israeli intelligence too. Also on the board is cofounding director and former Israeli prime minister Ehud Barak. They also have a significant American financial backer: Boston, Massachusetts-based Battery Ventures. According to two senior employees at companies in the Israeli surveillance industry, who spoke on the condition of anonymity, the venture capital business put in between $5 and $10 million, though Battery declined to comment on the nature of its investment, which is only mentioned in brief on the company’s website.
Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted instant messaging communications, whether that’s WhatsApp, Signal, Facebook Messenger or Gmail, the industry sources said. One other spyware industry executive said it also promises to get longer-lasting access to a device, even when it’s rebooted.
https://www.forbes.com/sites/thomasbrewster/2021/07/29/paragon-is-an-nso-competitor-and-an-american-funded-israeli-surveillance-startup-that-hacks-encrypted-apps-like-whatsapp-and-signal/
#paragon #hacking #surveillance #spyware #israel #usa #whatsapp #signal
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Forbes
Meet Paragon: An American-Funded, Super-Secretive Israeli Surveillance Startup That ‘Hacks WhatsApp And Signal’
NSO has a new competitor, one cofounded by the former commander of Israel’s NSA equivalent, Unit 8200. It’s promising to only sell to democratic regimes.
Media is too big
VIEW IN TELEGRAM
Fighting porch pirates with artificial intelligence (and flour)
I got a package stolen, so I did the only thing I know how to do - build an unnecessarily complicated and ethically ambiguous machine.
This is the story of how I built a machine to recognize if a package is being stolen from my porch, and respond accordingly. The project uses a combination of python, tensorflow, and the last of my sanity.
https://github.com/rydercalmdown/package_theft_preventor
https://www.youtube.com/watch?v=nPnOtm1Uadw
#ai #machinelearning #porchpirates #packagetheive #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
I got a package stolen, so I did the only thing I know how to do - build an unnecessarily complicated and ethically ambiguous machine.
This is the story of how I built a machine to recognize if a package is being stolen from my porch, and respond accordingly. The project uses a combination of python, tensorflow, and the last of my sanity.
https://github.com/rydercalmdown/package_theft_preventor
https://www.youtube.com/watch?v=nPnOtm1Uadw
#ai #machinelearning #porchpirates #packagetheive #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
felix_acmmm21_faketagger.pdf
4 MB
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking
The system, entitled FakeTagger, uses an encoder/decoder process to embed visually indiscernible ID information into images at a low enough level that the injected information will be interpreted as essential facial characteristic data, and therefore passed through abstraction processes intact, in the same way, for instance, as eye or mouth data.
https://www.unite.ai/identifying-deepfake-data-sources-with-ai-based-tagging-faketagger/
https://xujuefei.com/felix_acmmm21_faketagger.pdf
#faketagger #deepfake #tracking #tagging #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The system, entitled FakeTagger, uses an encoder/decoder process to embed visually indiscernible ID information into images at a low enough level that the injected information will be interpreted as essential facial characteristic data, and therefore passed through abstraction processes intact, in the same way, for instance, as eye or mouth data.
https://www.unite.ai/identifying-deepfake-data-sources-with-ai-based-tagging-faketagger/
https://xujuefei.com/felix_acmmm21_faketagger.pdf
#faketagger #deepfake #tracking #tagging #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
PwnedPiper vulnerabilities impact 80% of major hospitals in North America
Details have been published today about a collection of nine vulnerabilities known as PwnedPiper that impact a common type of medical equipment that’s installed in roughly 80% of all major hospitals in North America.
The TransLogic Pneumatic Tube Systems (PTS), from Swisslog Healthcare, is a complex system that uses compressed air to move medical supplies (lab samples, medicine, blood products, etc.) using tubes that connect different departments inside large hospitals.
Installed in more than 3,000 hospitals, TransLogic systems effectively work as the blood vessels of modern hospitals as they allow the movement of sensitive medical material while keeping nurses free to provide patient care.
In research published today, IoT security firm Armis said it discovered nine vulnerabilities in the Nexus Control Panel, the software that doctors and nurses use to control how medical material moves between hospital sections.
“These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital,” the Armis team said today.
“This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information,” the company added.
While the vulnerabilities can be exploited only if an attacker can connect or has a foothold on the hospital’s internal network, the PwndPiper issues were deemed extremely severe due to the prevalence of TransLogic devices across North America and how easy they could be weaponized to impact a hospital’s ability to provide proper medical care.
The issues —listed at the bottom of this article— were discovered in May and reported to Swisslog Healthcare, Armis said.
“A software update for all but one of the vulnerabilities has been developed, and specific mitigation strategies for the remaining vulnerability are available for customers,” a Swisslog Healthcare spokesperson told The Record in an email.
The company has released today version 7.2.5.7 of the Nexus Control Panel, along with a blog post with additional information for its customers. It also said the issue is primarily restricted to hospitals in North America, where most of these tube systems are installed, and that a patch for the ninth issue is expected later this year.
https://therecord.media/pwnedpiper-vulnerabilities-impact-80-of-major-hospitals-in-north-america/
#PwnedPiper #vulnerabilities #hospitals #usa #swisslog
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Details have been published today about a collection of nine vulnerabilities known as PwnedPiper that impact a common type of medical equipment that’s installed in roughly 80% of all major hospitals in North America.
The TransLogic Pneumatic Tube Systems (PTS), from Swisslog Healthcare, is a complex system that uses compressed air to move medical supplies (lab samples, medicine, blood products, etc.) using tubes that connect different departments inside large hospitals.
Installed in more than 3,000 hospitals, TransLogic systems effectively work as the blood vessels of modern hospitals as they allow the movement of sensitive medical material while keeping nurses free to provide patient care.
In research published today, IoT security firm Armis said it discovered nine vulnerabilities in the Nexus Control Panel, the software that doctors and nurses use to control how medical material moves between hospital sections.
“These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital,” the Armis team said today.
“This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information,” the company added.
While the vulnerabilities can be exploited only if an attacker can connect or has a foothold on the hospital’s internal network, the PwndPiper issues were deemed extremely severe due to the prevalence of TransLogic devices across North America and how easy they could be weaponized to impact a hospital’s ability to provide proper medical care.
The issues —listed at the bottom of this article— were discovered in May and reported to Swisslog Healthcare, Armis said.
“A software update for all but one of the vulnerabilities has been developed, and specific mitigation strategies for the remaining vulnerability are available for customers,” a Swisslog Healthcare spokesperson told The Record in an email.
The company has released today version 7.2.5.7 of the Nexus Control Panel, along with a blog post with additional information for its customers. It also said the issue is primarily restricted to hospitals in North America, where most of these tube systems are installed, and that a patch for the ninth issue is expected later this year.
https://therecord.media/pwnedpiper-vulnerabilities-impact-80-of-major-hospitals-in-north-america/
#PwnedPiper #vulnerabilities #hospitals #usa #swisslog
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
ProtonMail: User data for the USA thanks to good cooperation with authorities
ProtonMail, which claims to be a "secure e-mail service from Switzerland," supplies user data to security authorities. User data also goes to law enforcement agencies in the USA, as a current case shows.
The proceedings concern threats against, among others, the well-known immunologist Anthony Fauci. In a series of emails, the sender threatened, among other things, to kill Fauci and his family.
As the U.S. Department of Justice writes, the defendant used "an email account from a provider of secure, encrypted email services based in Switzerland."
According to the corresponding affidavit, this email service was ProtonMail. The relevant emails end accordingly with "Sent with ProtonMail Secure Email".
On the basis of data from ProtonMail, which was sent to the USA by way of legal assistance, it emerged that the defendant had used several user accounts at ProtonMail.
According to his own statements, the accused had switched to ProtonMail because he believed he was protected by Swiss data protection law and end-to-end encryption. Nevertheless, the sender could be identified in the interaction of data from ProtonMail as well as other online services.
https://steigerlegal.ch/2021/08/02/protonmail-daten-usa/
https://www.justice.gov/usao-md/press-release/file/1416926/download
#protonmail #usa #doj #userdata #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
ProtonMail, which claims to be a "secure e-mail service from Switzerland," supplies user data to security authorities. User data also goes to law enforcement agencies in the USA, as a current case shows.
The proceedings concern threats against, among others, the well-known immunologist Anthony Fauci. In a series of emails, the sender threatened, among other things, to kill Fauci and his family.
As the U.S. Department of Justice writes, the defendant used "an email account from a provider of secure, encrypted email services based in Switzerland."
According to the corresponding affidavit, this email service was ProtonMail. The relevant emails end accordingly with "Sent with ProtonMail Secure Email".
On the basis of data from ProtonMail, which was sent to the USA by way of legal assistance, it emerged that the defendant had used several user accounts at ProtonMail.
According to his own statements, the accused had switched to ProtonMail because he believed he was protected by Swiss data protection law and end-to-end encryption. Nevertheless, the sender could be identified in the interaction of data from ProtonMail as well as other online services.
https://steigerlegal.ch/2021/08/02/protonmail-daten-usa/
https://www.justice.gov/usao-md/press-release/file/1416926/download
#protonmail #usa #doj #userdata #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Steiger Legal
ProtonMail: Nutzerdaten für die USA dank Rechtshilfe und guter Zusammenarbeit mit Behörden – Steiger Legal
ProtonMail, nach eigenen Angaben ein «sicherer E-Mail-Dienst aus der Schweiz», liefert Nutzerdaten an Sicherheitsbehörden. Nutzerdaten gehen auch an Strafverfolgungsbehörden in den USA, wie ein aktuelles Verfahren zeigt. Das Verfahren betrifft …
Shares slide after China brands online games 'electronic drugs'
Shares in two of China's biggest online gaming firms have slipped after a state media outlet called them "electronic drugs".
Tencent and NetEase shares fell more than 10% in early Hong Kong trade before regaining some of those losses.
Investors are increasingly concerned about Beijing cracking down on firms.
In recent months authorities have announced a series of measures to tighten their grip on technology and private education companies.
An article published by the state-run Economic Information Daily said many teenagers had become addicted to online gaming and it was having a negative impact on them. The news outlet is affiliated with the official Xinhua news agency.
The article cited Tencent's hugely popular game Honor of Kings, saying students were playing it for up to eight hours a day, and asked for more curbs on the industry.
"No industry, no sport, can be allowed to develop in a way that will destroy a generation," it said before going on to liken online games to "spiritual opium".
Tencent has said it would introduce measures to reduce children's access to and time spent on its Honor of Kings game. The company also said it plans to eventually roll out the policy to all of its games.`
The recovery in share prices came as Economic Information Daily deleted the article from its account on the Wechat social media platform.
Tencent also saw its shares fall last week after being ordered to end exclusive music licensing deals with record labels around the world.
The move was aimed at tackling the technology giant's dominance of online music streaming in the country - it currently controls more than 80% of China's exclusive music streaming rights after an acquisition in 2016.
Tencent is only one of a number of Chinese companies listed in the US, Hong Kong and mainland China to see shares fall sharply this year as Beijing clamps down on the country's technology and education industries.
Last week saw shares in Chinese online tutoring firms slump after they were stripped of the ability to make a profit from teaching core subjects in China.
The new guidelines also restricted foreign investment in the industry.
https://www.bbc.com/news/business-58066659
#china #online #gaming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Shares in two of China's biggest online gaming firms have slipped after a state media outlet called them "electronic drugs".
Tencent and NetEase shares fell more than 10% in early Hong Kong trade before regaining some of those losses.
Investors are increasingly concerned about Beijing cracking down on firms.
In recent months authorities have announced a series of measures to tighten their grip on technology and private education companies.
An article published by the state-run Economic Information Daily said many teenagers had become addicted to online gaming and it was having a negative impact on them. The news outlet is affiliated with the official Xinhua news agency.
The article cited Tencent's hugely popular game Honor of Kings, saying students were playing it for up to eight hours a day, and asked for more curbs on the industry.
"No industry, no sport, can be allowed to develop in a way that will destroy a generation," it said before going on to liken online games to "spiritual opium".
Tencent has said it would introduce measures to reduce children's access to and time spent on its Honor of Kings game. The company also said it plans to eventually roll out the policy to all of its games.`
The recovery in share prices came as Economic Information Daily deleted the article from its account on the Wechat social media platform.
Tencent also saw its shares fall last week after being ordered to end exclusive music licensing deals with record labels around the world.
The move was aimed at tackling the technology giant's dominance of online music streaming in the country - it currently controls more than 80% of China's exclusive music streaming rights after an acquisition in 2016.
Tencent is only one of a number of Chinese companies listed in the US, Hong Kong and mainland China to see shares fall sharply this year as Beijing clamps down on the country's technology and education industries.
Last week saw shares in Chinese online tutoring firms slump after they were stripped of the ability to make a profit from teaching core subjects in China.
The new guidelines also restricted foreign investment in the industry.
https://www.bbc.com/news/business-58066659
#china #online #gaming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BBC News
Shares slide after China brands online games 'electronic drugs'
In recent months Beijing has cracked down on China's technology and private education industries.
Blizzard Entertainment president steps down after workplace protests.
Activision Blizzard, the video game maker, said on Tuesday that the president of its Blizzard Entertainment studio was stepping down immediately, as the company grapples with the fallout from allegations of workplace harassment and discrimination.
Activision, known for Call of Duty and other popular gaming franchises, has been under pressure following a lawsuit filed on July 20 by the state of California. The lawsuit accused the company of fostering a “frat boy workplace culture” in which men joked about rape and women were routinely harassed and paid less than their male colleagues.
Many of the misconduct accusations in the lawsuit focused on the Blizzard division, with which Activision merged through a 2008 deal with Vivendi Games.
The departing executive, J. Allen Brack, will be replaced by two Blizzard executives, Jen Oneal and Mike Ybarra, who will be co-leaders of the studio, Activision said in a statement. Mr. Brack was mentioned in the lawsuit as an executive who had failed to take “effective remedial measures” when sexual harassment and discrimination complaints were brought to him.
Bobby Kotick, Activision’s chief executive, initially stumbled in his response to the lawsuit but has since moved aggressively to contain employee discontent. Activision was at first dismissive of the allegations, and more than 1,500 employees last week staged a walkout to protest the response and to urge executives to take the issues seriously.
On the eve of the walkout, Mr. Kotick apologized and said Activision would improve its culture and hire the law firm WilmerHale to review the company’s policies. “I am sorry that we did not provide the right empathy and understanding,” he told employees at the time. Activision is set to report earnings later on Tuesday, when Mr. Kotick is expected to speak.
https://www.nytimes.com/2021/08/03/business/blizzard-entertainment-activision.html
#blizzard
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Activision Blizzard, the video game maker, said on Tuesday that the president of its Blizzard Entertainment studio was stepping down immediately, as the company grapples with the fallout from allegations of workplace harassment and discrimination.
Activision, known for Call of Duty and other popular gaming franchises, has been under pressure following a lawsuit filed on July 20 by the state of California. The lawsuit accused the company of fostering a “frat boy workplace culture” in which men joked about rape and women were routinely harassed and paid less than their male colleagues.
Many of the misconduct accusations in the lawsuit focused on the Blizzard division, with which Activision merged through a 2008 deal with Vivendi Games.
The departing executive, J. Allen Brack, will be replaced by two Blizzard executives, Jen Oneal and Mike Ybarra, who will be co-leaders of the studio, Activision said in a statement. Mr. Brack was mentioned in the lawsuit as an executive who had failed to take “effective remedial measures” when sexual harassment and discrimination complaints were brought to him.
Bobby Kotick, Activision’s chief executive, initially stumbled in his response to the lawsuit but has since moved aggressively to contain employee discontent. Activision was at first dismissive of the allegations, and more than 1,500 employees last week staged a walkout to protest the response and to urge executives to take the issues seriously.
On the eve of the walkout, Mr. Kotick apologized and said Activision would improve its culture and hire the law firm WilmerHale to review the company’s policies. “I am sorry that we did not provide the right empathy and understanding,” he told employees at the time. Activision is set to report earnings later on Tuesday, when Mr. Kotick is expected to speak.
https://www.nytimes.com/2021/08/03/business/blizzard-entertainment-activision.html
#blizzard
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
NY Times
Blizzard Entertainment president steps down after workplace protests.
The video game studio’s parent company, Activision Blizzard, has been accused of fostering a “frat boy workplace culture.”