Massive Hack Strikes Offshore Cayman National Bank and Trust
Isle of Man, UK – A blast of sunshine has hit a secretive banking network used by global ultra-wealthy figures following a massive hack by “Phineas Fisher“, a notorious self-described “hacktivist”, of Cayman National Bank and Trust, which serves nearly 1,500 accounts in Isle of Man. Transparency collective Distributed Denial of Secrets has began publishing copies of the bank’s servers, a cache of documents as well as communications among bankers and others. Journalists around the world are investigating and have begun releasing stories.
Following the hack, a manifesto was uploaded to the Internet addressing the motivation for hacking financial services companies. Unicorn Riot has embedded the manifesto below which includes previously unpublished code which the author claims was used to break into “Hacking Team” an Italian surveillance company. Hacking Team was an elite corporation that specialized in developing malware until Phineas Fisher hacked them and published their code online. The malware developed by Hacking Team was often used to attack journalists and activists on behalf of repressive governments .
Unicorn Riot has obtained the small HackBack announcement text released exclusively in Spanish, described as “Desde las montañas del Sureste Cibernético” (‘From the mountains of the Cyber Southeast’). It bills itself as a “HackBack” DIY guide for “Una guía DIY para robar bancos” (‘A DIY guide for robbing banks.’) The announcement begins with a tongue-in-cheek dedication to “Subcowmandante Marcos” with an ASCII text-styled pipe-smoking cow referring to former Zapatista spokesperson Subcomandante Marcos.
Also included in the announcement were introductions to common information security tools such as Metasploit and observations about previous major bank hacks, suspicious activities on SWIFT (an international financial network), and art such as a skeleton saying “Be Gay, Do Crimes” in Spanish.
👉🏼 Read more:
https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
https://unicornriot.ninja/wp-content/uploads/2019/11/hackback-announce-text.txt
#hacker #PhineasFisher #hacked #hackback #offshore #bank
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Isle of Man, UK – A blast of sunshine has hit a secretive banking network used by global ultra-wealthy figures following a massive hack by “Phineas Fisher“, a notorious self-described “hacktivist”, of Cayman National Bank and Trust, which serves nearly 1,500 accounts in Isle of Man. Transparency collective Distributed Denial of Secrets has began publishing copies of the bank’s servers, a cache of documents as well as communications among bankers and others. Journalists around the world are investigating and have begun releasing stories.
Following the hack, a manifesto was uploaded to the Internet addressing the motivation for hacking financial services companies. Unicorn Riot has embedded the manifesto below which includes previously unpublished code which the author claims was used to break into “Hacking Team” an Italian surveillance company. Hacking Team was an elite corporation that specialized in developing malware until Phineas Fisher hacked them and published their code online. The malware developed by Hacking Team was often used to attack journalists and activists on behalf of repressive governments .
Unicorn Riot has obtained the small HackBack announcement text released exclusively in Spanish, described as “Desde las montañas del Sureste Cibernético” (‘From the mountains of the Cyber Southeast’). It bills itself as a “HackBack” DIY guide for “Una guía DIY para robar bancos” (‘A DIY guide for robbing banks.’) The announcement begins with a tongue-in-cheek dedication to “Subcowmandante Marcos” with an ASCII text-styled pipe-smoking cow referring to former Zapatista spokesperson Subcomandante Marcos.
Also included in the announcement were introductions to common information security tools such as Metasploit and observations about previous major bank hacks, suspicious activities on SWIFT (an international financial network), and art such as a skeleton saying “Be Gay, Do Crimes” in Spanish.
👉🏼 Read more:
https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
https://unicornriot.ninja/wp-content/uploads/2019/11/hackback-announce-text.txt
#hacker #PhineasFisher #hacked #hackback #offshore #bank
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
How Google Interferes With Its Search Algorithms and Changes Your Results
The internet giant uses blacklists, algorithm tweaks and an army of contractors to shape what you see
👀 More than 100 interviews and the Journal’s own testing of Google’s search results reveal:
‼️ Google made algorithmic changes to its search results that favor big businesses over smaller ones, and in at least one case made changes on behalf of a major advertiser, eBay Inc., contrary to its public position that it never takes that type of action. The company also boosts some major websites, such as Amazon.com Inc. and Facebook Inc., according to people familiar with the matter.
‼️ Google engineers regularly make behind-the-scenes adjustments to other information the company is increasingly layering on top of its basic search results. These features include auto-complete suggestions, boxes called “knowledge panels” and “featured snippets,” and news results, which aren’t subject to the same company policies limiting what engineers can remove or change.
‼️ Despite publicly denying doing so, Google keeps blacklists to remove certain sites or prevent others from surfacing in certain types of results. These moves are separate from those that block sites as required by U.S. or foreign law, such as those featuring child abuse or with copyright infringement, and from changes designed to demote spam sites, which attempt to game the system to appear higher in results.
‼️ In auto-complete, the feature that predicts search terms as the user types a query, Google’s engineers have created algorithms and blacklists to weed out more-incendiary suggestions for controversial subjects, such as abortion or immigration, in effect filtering out inflammatory results on high-profile topics.
‼️ Google employees and executives, including co-founders Larry Page and Sergey Brin, have disagreed on how much to intervene on search results and to what extent. Employees can push for revisions in specific search results, including on topics such as vaccinations and autism.
‼️ To evaluate its search results, Google employs thousands of low-paid contractors whose purpose the company says is to assess the quality of the algorithms’ rankings. Even so, contractors said Google gave feedback to these workers to convey what it considered to be the correct ranking of results, and they revised their assessments accordingly, according to contractors interviewed by the Journal. The contractors’ collective evaluations are then used to adjust algorithms.
👉🏼 Read more (paywall):
https://www.wsj.com/articles/how-google-interferes-with-its-search-algorithms-and-changes-your-results-11573823753
👉🏼 Read more (german/no paywall):
https://netzpolitik.org/2019/der-selbstgebaute-algorithmus/
#DeleteGoogle #manipulation #search #algorithms #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The internet giant uses blacklists, algorithm tweaks and an army of contractors to shape what you see
👀 More than 100 interviews and the Journal’s own testing of Google’s search results reveal:
‼️ Google made algorithmic changes to its search results that favor big businesses over smaller ones, and in at least one case made changes on behalf of a major advertiser, eBay Inc., contrary to its public position that it never takes that type of action. The company also boosts some major websites, such as Amazon.com Inc. and Facebook Inc., according to people familiar with the matter.
‼️ Google engineers regularly make behind-the-scenes adjustments to other information the company is increasingly layering on top of its basic search results. These features include auto-complete suggestions, boxes called “knowledge panels” and “featured snippets,” and news results, which aren’t subject to the same company policies limiting what engineers can remove or change.
‼️ Despite publicly denying doing so, Google keeps blacklists to remove certain sites or prevent others from surfacing in certain types of results. These moves are separate from those that block sites as required by U.S. or foreign law, such as those featuring child abuse or with copyright infringement, and from changes designed to demote spam sites, which attempt to game the system to appear higher in results.
‼️ In auto-complete, the feature that predicts search terms as the user types a query, Google’s engineers have created algorithms and blacklists to weed out more-incendiary suggestions for controversial subjects, such as abortion or immigration, in effect filtering out inflammatory results on high-profile topics.
‼️ Google employees and executives, including co-founders Larry Page and Sergey Brin, have disagreed on how much to intervene on search results and to what extent. Employees can push for revisions in specific search results, including on topics such as vaccinations and autism.
‼️ To evaluate its search results, Google employs thousands of low-paid contractors whose purpose the company says is to assess the quality of the algorithms’ rankings. Even so, contractors said Google gave feedback to these workers to convey what it considered to be the correct ranking of results, and they revised their assessments accordingly, according to contractors interviewed by the Journal. The contractors’ collective evaluations are then used to adjust algorithms.
👉🏼 Read more (paywall):
https://www.wsj.com/articles/how-google-interferes-with-its-search-algorithms-and-changes-your-results-11573823753
👉🏼 Read more (german/no paywall):
https://netzpolitik.org/2019/der-selbstgebaute-algorithmus/
#DeleteGoogle #manipulation #search #algorithms #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
HackBack! - Talking with Phineas Fisher
Hacking as Direct Action against the Surveillance State
We spoke with the world-famous hacker persona and self-proclaimed anarchist revolutionary Phineas Fisher about the politics behind their attacks on the surveillance industry, the ruling party in Turkey, and the Catalan police. Here follows a retrospective on the exploits of Phineas Fisher, followed by their remarks to us.
Hacking is often depicted as something technical, a simple matter of attack and defense. Yet motivations are everything. The same technique that builds oppressive tools can be used as a weapon for emancipation. Hacking, in its purest form, is not about engineering: it is about leveraging power dynamics by short-circuiting technology. It is direct action for the new digital world we all live in.
In the shadows of the techno-empire, the hacking scene became a target for cooptation and infiltration. But the underground cannot be eradicated: from time to time, a new action breaks through the surface. Some of the hackers we admire are coders who produce tools for online privacy and anonymity. Other crews create and distribute alternative media. And then there are those who hack back.
The Lost Hacker Circles
It is no secret, for anyone paying attention, that for a long time the hacker underground was also taking sides in the ongoing war. Yet the effervescence that characterized the underground DIY scene of the past few decades has died down, or at least receded to less visible places.
Pessimists mourned the death of hacker communities in a proliferation of individual desertions. It is true that the techno-military complex succeeded in swelling the ranks of the mercenaries: there is a price at which a particular mindset can be bought, whether with money, success, the feeling of power, or the excitement of playing with fancy toys while chasing what state propaganda labels “the enemy.”
👉🏼 Read more:
https://crimethinc.com/2018/06/05/hackback-talking-with-phineas-fisher-hacking-as-direct-action-against-the-surveillance-state
👉🏼 Regarding: Massive Hack Strikes Offshore Cayman National Bank and Trust
https://t.iss.one/BlackBox_Archiv/716
#PhineasFisher #hacker #HackBack #Interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Hacking as Direct Action against the Surveillance State
We spoke with the world-famous hacker persona and self-proclaimed anarchist revolutionary Phineas Fisher about the politics behind their attacks on the surveillance industry, the ruling party in Turkey, and the Catalan police. Here follows a retrospective on the exploits of Phineas Fisher, followed by their remarks to us.
Hacking is often depicted as something technical, a simple matter of attack and defense. Yet motivations are everything. The same technique that builds oppressive tools can be used as a weapon for emancipation. Hacking, in its purest form, is not about engineering: it is about leveraging power dynamics by short-circuiting technology. It is direct action for the new digital world we all live in.
In the shadows of the techno-empire, the hacking scene became a target for cooptation and infiltration. But the underground cannot be eradicated: from time to time, a new action breaks through the surface. Some of the hackers we admire are coders who produce tools for online privacy and anonymity. Other crews create and distribute alternative media. And then there are those who hack back.
The Lost Hacker Circles
It is no secret, for anyone paying attention, that for a long time the hacker underground was also taking sides in the ongoing war. Yet the effervescence that characterized the underground DIY scene of the past few decades has died down, or at least receded to less visible places.
Pessimists mourned the death of hacker communities in a proliferation of individual desertions. It is true that the techno-military complex succeeded in swelling the ranks of the mercenaries: there is a price at which a particular mindset can be bought, whether with money, success, the feeling of power, or the excitement of playing with fancy toys while chasing what state propaganda labels “the enemy.”
👉🏼 Read more:
https://crimethinc.com/2018/06/05/hackback-talking-with-phineas-fisher-hacking-as-direct-action-against-the-surveillance-state
👉🏼 Regarding: Massive Hack Strikes Offshore Cayman National Bank and Trust
https://t.iss.one/BlackBox_Archiv/716
#PhineasFisher #hacker #HackBack #Interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Ransomware Bites 400 Veterinary Hospitals
National Veterinary Associates (NVA), a California company that owns more than 700 animal care facilities around the globe, is still working to recover from a ransomware attack late last month that affected more than half of those properties, separating many veterinary practices from their patient records, payment systems and practice management software. NVA says it expects to have all facilities fully back up and running normally within the next week.
Agoura Hills, Calif.-based NVA bills itself as is the largest private owner of freestanding veterinary hospitals in the United States. The company’s Web site says it currently owns roughly 700 veterinary hospitals and animal boarding facilities in the United States, Canada, Australia and New Zealand.
NVA said it discovered the ransomware outbreak on the morning of Sunday, Oct. 27, and soon after hired two outside security firms to investigate and remediate the attack. A source close to the investigation told KrebsOnSecurity that NVA was hit with Ryuk, a ransomware strain first spotted in August 2018 that targets mostly large organizations for a high-ransom return.
NVA declined to answer questions about the malware, or whether the NVA paid the ransom demand.
“It was ransomware, but we’ve been referring to it as a malware incident,” said Laura Koester, NVA’s chief marketing officer.
Koester said because every NVA hospital runs their IT operations as they see fit, not all were affected. More importantly, she said, all of the NVA’s hospitals have remained open and able to see clients (animals in need of care), and access to patient records has been fully restored to all affected hospitals.
👉🏼 Read more:
https://krebsonsecurity.com/
#ransomware #hacker #hacked #veterinary #hospitals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
National Veterinary Associates (NVA), a California company that owns more than 700 animal care facilities around the globe, is still working to recover from a ransomware attack late last month that affected more than half of those properties, separating many veterinary practices from their patient records, payment systems and practice management software. NVA says it expects to have all facilities fully back up and running normally within the next week.
Agoura Hills, Calif.-based NVA bills itself as is the largest private owner of freestanding veterinary hospitals in the United States. The company’s Web site says it currently owns roughly 700 veterinary hospitals and animal boarding facilities in the United States, Canada, Australia and New Zealand.
NVA said it discovered the ransomware outbreak on the morning of Sunday, Oct. 27, and soon after hired two outside security firms to investigate and remediate the attack. A source close to the investigation told KrebsOnSecurity that NVA was hit with Ryuk, a ransomware strain first spotted in August 2018 that targets mostly large organizations for a high-ransom return.
NVA declined to answer questions about the malware, or whether the NVA paid the ransom demand.
“It was ransomware, but we’ve been referring to it as a malware incident,” said Laura Koester, NVA’s chief marketing officer.
Koester said because every NVA hospital runs their IT operations as they see fit, not all were affected. More importantly, she said, all of the NVA’s hospitals have remained open and able to see clients (animals in need of care), and access to patient records has been fully restored to all affected hospitals.
👉🏼 Read more:
https://krebsonsecurity.com/
#ransomware #hacker #hacked #veterinary #hospitals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Cutting the Wire
It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform had been sold or moved to a US company. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in a move they called “simple and pragmatic,” as they worked to expand their foothold in the enterprise market. This also came alongside the news that Wire had accepted more than $8 million in Venture Capital (VC) funding from Morpheus Ventures, as well as other investors.
Morpheus Ventures holds a portfolio including companies in healthcare, voice AI, life insurance, and retail customer data analytics: All sectors that have historically used invasive data collection methods to survive. Why would a VC with a portfolio centered on consumer data want to invest in a company whose mission claims to protect that very same information?
Earlier this year, Wire announced they had entered a partnership with FedResults, in a move that would bring Wire's secure messaging platform to US federal agencies. This raised a few eyebrows, but did not alarm the privacy community as Wire remained Swiss based and beholden to Switzerland's strict privacy laws. Today however, while much of Wire's business will continue to be run out of their Swiss offices, with new US-based ownership it is not entirely clear how much jurisdiction the United States will have over Wire data.
This is alarming because it is well known that Wire stores unencrypted metadata for every user.
👉🏼 Read more:
https://blog.privacytools.io/delisting-wire/
#privacytools #delisting #wire #FedResults #messenger #swiss #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform had been sold or moved to a US company. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in a move they called “simple and pragmatic,” as they worked to expand their foothold in the enterprise market. This also came alongside the news that Wire had accepted more than $8 million in Venture Capital (VC) funding from Morpheus Ventures, as well as other investors.
Morpheus Ventures holds a portfolio including companies in healthcare, voice AI, life insurance, and retail customer data analytics: All sectors that have historically used invasive data collection methods to survive. Why would a VC with a portfolio centered on consumer data want to invest in a company whose mission claims to protect that very same information?
Earlier this year, Wire announced they had entered a partnership with FedResults, in a move that would bring Wire's secure messaging platform to US federal agencies. This raised a few eyebrows, but did not alarm the privacy community as Wire remained Swiss based and beholden to Switzerland's strict privacy laws. Today however, while much of Wire's business will continue to be run out of their Swiss offices, with new US-based ownership it is not entirely clear how much jurisdiction the United States will have over Wire data.
This is alarming because it is well known that Wire stores unencrypted metadata for every user.
👉🏼 Read more:
https://blog.privacytools.io/delisting-wire/
#privacytools #delisting #wire #FedResults #messenger #swiss #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
GitHub Archive Program
Preserving open source software for future generations
It is a hidden cornerstone of modern civilization, and the shared heritage of all humanity. The mission of the GitHub Archive Program is to preserve open source software for future generations.
GitHub is partnering with the Long Now Foundation, the Internet Archive, the Software Heritage Foundation, Arctic World Archive, Microsoft Research, the Bodleian Library, and Stanford Libraries to ensure the long-term preservation of the world's open source software. We will protect this priceless knowledge by storing multiple copies, on an ongoing basis, across various data formats and locations, including a very-long-term archive designed to last at least 1,000 years.
👉🏼 Read more:
https://archiveprogram.github.com/
#GitHub #archiveprogram #repo #arctic #norway
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Preserving open source software for future generations
It is a hidden cornerstone of modern civilization, and the shared heritage of all humanity. The mission of the GitHub Archive Program is to preserve open source software for future generations.
GitHub is partnering with the Long Now Foundation, the Internet Archive, the Software Heritage Foundation, Arctic World Archive, Microsoft Research, the Bodleian Library, and Stanford Libraries to ensure the long-term preservation of the world's open source software. We will protect this priceless knowledge by storing multiple copies, on an ongoing basis, across various data formats and locations, including a very-long-term archive designed to last at least 1,000 years.
👉🏼 Read more:
https://archiveprogram.github.com/
#GitHub #archiveprogram #repo #arctic #norway
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Senator Markey Investigation into Amazon Ring Doorbell Reveals Egregiously Lax Privacy Policies and Civil Rights Protections
Lawmaker found Ring has no evidentiary standards for law enforcement to request video footage, no compliance mechanisms to ensure footage of children isn’t collected
Washington (November 19, 2019) – Senator Edward J. Markey (D-Mass.), a member of the Commerce, Science and Transportation Committee and leading champion on Congress on strengthening online privacy, today released alarming findings from his investigation of Amazon doorbell company Ring that reveal little to no privacy policies or civil rights protections for video collected by the technology. Senator Markey began his investigation in September of the internet-connected doorbell company Ring, which Amazon owns, and Ring’s partnership with over 400 police departments. Reports indicate that the partnerships offered law enforcement officials access to video footage captured by Ring’s products. New information also showed that Ring uses targeted language to encourage users to grant the police access to doorbell video footage, proactively courts law enforcement partners, and urges the police to take steps that will increase rates of video sharing. After two inquiries to the company, Senator Markey found an alarming disregard for basic privacy protections for consumers, as well as a lack of codified rules or policies to protect consumers from invasive or even discriminatory information-gathering practices.
“Connected doorbells are well on their way to becoming a mainstay of American households, and the lack of privacy and civil rights protections for innocent residents is nothing short of chilling,” said Senator Markey. “Amazon Ring’s policies are an open door for privacy and civil liberty violations. If you’re an adult walking your dog or a child playing on the sidewalk, you shouldn’t have to worry that Ring’s products are amassing footage of you and that law enforcement may hold that footage indefinitely or share that footage with any third parties. Amazon’s Ring is marketed to help keep families safe, but privacy rights are in real danger as a result of company policies. Amazon is not doing enough to ensure that its products and practices do not run afoul of our civil liberties.”
👉🏼 Read more:
https://www.markey.senate.gov/news/press-releases/senator-markey-investigation-into-amazon-ring-doorbell-reveals-egregiously-lax-privacy-policies-and-civil-rights-protections
#DeleteAmazon #Amazon #ring #surveillance #DataProtection #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Lawmaker found Ring has no evidentiary standards for law enforcement to request video footage, no compliance mechanisms to ensure footage of children isn’t collected
Washington (November 19, 2019) – Senator Edward J. Markey (D-Mass.), a member of the Commerce, Science and Transportation Committee and leading champion on Congress on strengthening online privacy, today released alarming findings from his investigation of Amazon doorbell company Ring that reveal little to no privacy policies or civil rights protections for video collected by the technology. Senator Markey began his investigation in September of the internet-connected doorbell company Ring, which Amazon owns, and Ring’s partnership with over 400 police departments. Reports indicate that the partnerships offered law enforcement officials access to video footage captured by Ring’s products. New information also showed that Ring uses targeted language to encourage users to grant the police access to doorbell video footage, proactively courts law enforcement partners, and urges the police to take steps that will increase rates of video sharing. After two inquiries to the company, Senator Markey found an alarming disregard for basic privacy protections for consumers, as well as a lack of codified rules or policies to protect consumers from invasive or even discriminatory information-gathering practices.
“Connected doorbells are well on their way to becoming a mainstay of American households, and the lack of privacy and civil rights protections for innocent residents is nothing short of chilling,” said Senator Markey. “Amazon Ring’s policies are an open door for privacy and civil liberty violations. If you’re an adult walking your dog or a child playing on the sidewalk, you shouldn’t have to worry that Ring’s products are amassing footage of you and that law enforcement may hold that footage indefinitely or share that footage with any third parties. Amazon’s Ring is marketed to help keep families safe, but privacy rights are in real danger as a result of company policies. Amazon is not doing enough to ensure that its products and practices do not run afoul of our civil liberties.”
👉🏼 Read more:
https://www.markey.senate.gov/news/press-releases/senator-markey-investigation-into-amazon-ring-doorbell-reveals-egregiously-lax-privacy-policies-and-civil-rights-protections
#DeleteAmazon #Amazon #ring #surveillance #DataProtection #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Biggest Data Breaches Of The 21st Century
Did you know it takes an average of 191 days for a company to realize there’s been a data breach? That’s according to a high-profile study conducted by the Ponemon Institute for IBM Security. This slow response is detrimental to business. It especially puts small businesses in a vulnerable position as many of them do not have the resources to deal with cyber attacks.
👉🏼 Infographic:
https://technofaq.org/posts/2019/02/biggest-data-breaches-of-the-21st-century-infographic/
#biggest #data #breaches #infographic
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Did you know it takes an average of 191 days for a company to realize there’s been a data breach? That’s according to a high-profile study conducted by the Ponemon Institute for IBM Security. This slow response is detrimental to business. It especially puts small businesses in a vulnerable position as many of them do not have the resources to deal with cyber attacks.
👉🏼 Infographic:
https://technofaq.org/posts/2019/02/biggest-data-breaches-of-the-21st-century-infographic/
#biggest #data #breaches #infographic
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Amnesty: Facebook and Google violate fundamental human rights
In a report on the "surveillance giants", the human rights organisation sounds the alarm: users would be forced into a "devil's pact".
Facebook and Google have created a private surveillance regime that is largely beyond independent public control: Amnesty International concludes in a report on the "Surveillance Giants" of the Internet published on Thursday. The two US corporations would have gained unprecedented power over the most personal data of millions of people, the human rights organization criticizes, stressing that "privacy abuse is at the heart" of Facebook's and Google's surveillance-based business models.
PDF:
https://cloud.amnesty.de/s/z9koZ4rHZ8NPB5c#pdfviewer
#amnesty #report #surveillance #DeleteFacebook #DeleteGoogle #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
In a report on the "surveillance giants", the human rights organisation sounds the alarm: users would be forced into a "devil's pact".
Facebook and Google have created a private surveillance regime that is largely beyond independent public control: Amnesty International concludes in a report on the "Surveillance Giants" of the Internet published on Thursday. The two US corporations would have gained unprecedented power over the most personal data of millions of people, the human rights organization criticizes, stressing that "privacy abuse is at the heart" of Facebook's and Google's surveillance-based business models.
PDF:
https://cloud.amnesty.de/s/z9koZ4rHZ8NPB5c#pdfviewer
#amnesty #report #surveillance #DeleteFacebook #DeleteGoogle #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Servers of Cock.li searched again
The authorities have again searched the servers of the e-mail and hosting provider Cock.li. Since a few minutes everything is running again. The service was already once before one and before four years in the focus of the authorities. The cause of the latest seizure has not yet been clarified.
https://status.cock.li/
#Cockli #email #authorities #raid #police
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The authorities have again searched the servers of the e-mail and hosting provider Cock.li. Since a few minutes everything is running again. The service was already once before one and before four years in the focus of the authorities. The cause of the latest seizure has not yet been clarified.
https://status.cock.li/
#Cockli #email #authorities #raid #police
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
👎1
Facebook would have let Hitler buy ads for 'final solution'
In wide-ranging speech, actor accuses tech giants of running the ‘greatest propaganda machine in history’
Sacha Baron Cohen has denounced tech giants Facebook, Twitter, YouTube and Google as “the greatest propaganda machine in history” and culpable for a surge in “murderous attacks on religious and ethnic minorities”.
Baron Cohen was speaking on Thursday at Never Is Now, the Anti-Defamation League’s summit on antisemitism and hate in New York, where he was presented with the organisation’s international leadership award. He said that “hate crimes are surging, as are murderous attacks on religious and ethnic minorities” and that “all this hate and violence is being facilitated by a handful of internet companies that amount to the greatest propaganda machine in history”.
He added: “The algorithms these platforms depend on deliberately amplify the type of content that keeps users engaged – stories that appeal to our baser instincts and that trigger outrage and fear. It’s why YouTube recommended videos by the conspiracist Alex Jones billions of times. It’s why fake news outperforms real news, because studies show that lies spread faster than truth … As one headline put it, just think what Goebbels could have done with Facebook.”
“If you pay them, Facebook will run any ‘political’ ad you want, even if it’s a lie,” he said. “And they’ll even help you micro-target those lies to their users for maximum effect. Under this twisted logic, if Facebook were around in the 1930s, it would have allowed Hitler to post 30-second ads on his ‘solution’ to the ‘Jewish problem’.”
👉🏼 Read more:
https://www.theguardian.com/film/2019/nov/22/sacha-baron-cohen-facebook-would-have-sold-final-solution-ads-to-hitler
#DeleteFacebook #propaganda
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
In wide-ranging speech, actor accuses tech giants of running the ‘greatest propaganda machine in history’
Sacha Baron Cohen has denounced tech giants Facebook, Twitter, YouTube and Google as “the greatest propaganda machine in history” and culpable for a surge in “murderous attacks on religious and ethnic minorities”.
Baron Cohen was speaking on Thursday at Never Is Now, the Anti-Defamation League’s summit on antisemitism and hate in New York, where he was presented with the organisation’s international leadership award. He said that “hate crimes are surging, as are murderous attacks on religious and ethnic minorities” and that “all this hate and violence is being facilitated by a handful of internet companies that amount to the greatest propaganda machine in history”.
He added: “The algorithms these platforms depend on deliberately amplify the type of content that keeps users engaged – stories that appeal to our baser instincts and that trigger outrage and fear. It’s why YouTube recommended videos by the conspiracist Alex Jones billions of times. It’s why fake news outperforms real news, because studies show that lies spread faster than truth … As one headline put it, just think what Goebbels could have done with Facebook.”
“If you pay them, Facebook will run any ‘political’ ad you want, even if it’s a lie,” he said. “And they’ll even help you micro-target those lies to their users for maximum effect. Under this twisted logic, if Facebook were around in the 1930s, it would have allowed Hitler to post 30-second ads on his ‘solution’ to the ‘Jewish problem’.”
👉🏼 Read more:
https://www.theguardian.com/film/2019/nov/22/sacha-baron-cohen-facebook-would-have-sold-final-solution-ads-to-hitler
#DeleteFacebook #propaganda
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
110 Nursing Homes Cut Off from Health Records in Ransomware Attack
A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States. The ongoing attack is preventing these care centers from accessing crucial patient medical records, and the IT company’s owner says she fears this incident could soon lead not only to the closure of her business, but also to the untimely demise of some patients.
Milwaukee, Wisc. based Virtual Care Provider Inc. (VCPI) provides IT consulting, Internet access, data storage and security services to some 110 nursing homes and acute-care facilities in 45 states. All told, VCPI is responsible for maintaining approximately 80,000 computers and servers that assist those facilities.
At around 1:30 a.m. CT on Nov. 17, unknown attackers launched a ransomware strain known as Ryuk inside VCPI’s networks, encrypting all data the company hosts for its clients and demanding a whopping $14 million ransom in exchange for a digital key needed to unlock access to the files. Ryuk has made a name for itself targeting businesses that supply services to other companies — particularly cloud-data firms — with the ransom demands set according to the victim’s perceived ability to pay.
In an interview with KrebsOnSecurity today, VCPI chief executive and owner Karen Christianson said the attack had affected virtually all of their core offerings, including Internet service and email, access to patient records, client billing and phone systems, and even VCPI’s own payroll operations that serve nearly 150 company employees.
The care facilities that VCPI serves access their records and other systems outsourced to VCPI by using a Citrix-based virtual private networking (VPN) platform, and Christianson said restoring customer access to this functionality is the company’s top priority right now.
“We have employees asking when we’re going to make payroll,” Christianson said. “But right now all we’re dealing with is getting electronic medical records back up and life-threatening situations handled first.”
Read more:
https://krebsonsecurity.com/2019/11/110-nursing-homes-cut-off-from-health-records-in-ransomware-attack/#more-49619
#Ransomware #attack #breach #hacker #hacked #VCPI
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States. The ongoing attack is preventing these care centers from accessing crucial patient medical records, and the IT company’s owner says she fears this incident could soon lead not only to the closure of her business, but also to the untimely demise of some patients.
Milwaukee, Wisc. based Virtual Care Provider Inc. (VCPI) provides IT consulting, Internet access, data storage and security services to some 110 nursing homes and acute-care facilities in 45 states. All told, VCPI is responsible for maintaining approximately 80,000 computers and servers that assist those facilities.
At around 1:30 a.m. CT on Nov. 17, unknown attackers launched a ransomware strain known as Ryuk inside VCPI’s networks, encrypting all data the company hosts for its clients and demanding a whopping $14 million ransom in exchange for a digital key needed to unlock access to the files. Ryuk has made a name for itself targeting businesses that supply services to other companies — particularly cloud-data firms — with the ransom demands set according to the victim’s perceived ability to pay.
In an interview with KrebsOnSecurity today, VCPI chief executive and owner Karen Christianson said the attack had affected virtually all of their core offerings, including Internet service and email, access to patient records, client billing and phone systems, and even VCPI’s own payroll operations that serve nearly 150 company employees.
The care facilities that VCPI serves access their records and other systems outsourced to VCPI by using a Citrix-based virtual private networking (VPN) platform, and Christianson said restoring customer access to this functionality is the company’s top priority right now.
“We have employees asking when we’re going to make payroll,” Christianson said. “But right now all we’re dealing with is getting electronic medical records back up and life-threatening situations handled first.”
Read more:
https://krebsonsecurity.com/2019/11/110-nursing-homes-cut-off-from-health-records-in-ransomware-attack/#more-49619
#Ransomware #attack #breach #hacker #hacked #VCPI
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Hong Kong protests: China trying to manipulate politics with covert intelligence operation, says whistleblower
Beijing seeks to turn an 'originally democratic and free land into autocratic land', fears defector
A man claiming to be a disillusioned Chinese intelligence operative has told Australian authorities that China’s military intelligence agencies were directly intervening in politics in Hong Kong and Taiwan, buying media coverage, infiltrating universities, funnelling donations to favoured candidates and creating thousands of social media accounts to attack Taiwan’s governing party.
So far, some Western diplomatic officials believe the claims by an asylum-seeker named Wang Liqiang to be reliable at least in part, according to two people briefed on the matter. While some of his details appeared speculative and impossible to verify, the officials were taking his claims seriously, the people said.
If verified, his account would be one of the most detailed ever made public of China’s covert measures to manipulate politics and public opinion in Hong Kong and Taiwan.
Mr Wang’s account, a 17-page plea for political asylum in Australia, reads in parts like an espionage thriller. He detailed code names of covert operations, shadowy business ventures and ultimately his dawning disenchantment with what he described as China’s efforts to stifle democracy and human rights around the world.
“I do not want to see Taiwan becoming a second Hong Kong,” he wrote. “And I would not become an accomplice in the conspiracy of turning an originally democratic and free land into autocratic land.”
Read more:
https://www.independent.co.uk/news/world/asia/hong-kong-protests-china-taiwan-whistleblower-intelligence-australia-a9214671.html
#HongKong #FreeHongKong #Beijing #China #Australia #whistleblower #spy #manipulation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Beijing seeks to turn an 'originally democratic and free land into autocratic land', fears defector
A man claiming to be a disillusioned Chinese intelligence operative has told Australian authorities that China’s military intelligence agencies were directly intervening in politics in Hong Kong and Taiwan, buying media coverage, infiltrating universities, funnelling donations to favoured candidates and creating thousands of social media accounts to attack Taiwan’s governing party.
So far, some Western diplomatic officials believe the claims by an asylum-seeker named Wang Liqiang to be reliable at least in part, according to two people briefed on the matter. While some of his details appeared speculative and impossible to verify, the officials were taking his claims seriously, the people said.
If verified, his account would be one of the most detailed ever made public of China’s covert measures to manipulate politics and public opinion in Hong Kong and Taiwan.
Mr Wang’s account, a 17-page plea for political asylum in Australia, reads in parts like an espionage thriller. He detailed code names of covert operations, shadowy business ventures and ultimately his dawning disenchantment with what he described as China’s efforts to stifle democracy and human rights around the world.
“I do not want to see Taiwan becoming a second Hong Kong,” he wrote. “And I would not become an accomplice in the conspiracy of turning an originally democratic and free land into autocratic land.”
Read more:
https://www.independent.co.uk/news/world/asia/hong-kong-protests-china-taiwan-whistleblower-intelligence-australia-a9214671.html
#HongKong #FreeHongKong #Beijing #China #Australia #whistleblower #spy #manipulation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
TikTok: Cheerfulness and censorship
Never before has a #platform grown as fast as TikTok. We have gained exclusive insight into its content moderation and are publishing excerpts from its moderation rules: TikTok operates a sophisticated system to identify, #control, #suppress and direct content. The platform can throttle videos of #protests and #demonstrations according to its rules.
No #app has been downloaded as often as TikTok in the past year. The video sharing platform is growing rapidly. In November 2019, TikTok broke the 1 billion-user barrier – faster than any other social network ever before. The video app and its culture are currently so popular with children and young people that even the Tagesschau (the major German public TV News programme) now has its own account there.
However, #research by netzpolitik.org shows that TikTok is currently able to #suppress videos of political protests and demonstrations and additionally determine which content is visible, through a variety of means.
☣️ Exclusive insight into content moderation
For this research, netzpolitik.org spoke to a source at #TikTok, looked at moderation criteria and communications, and experimented with specially created accounts to see how well videos with China-critical content are visible on the platform.
TikToks moderation rules, of which netzpolitik.org was able to see different versions, are remarkably thin and widely interpretable – even for the moderators themselves. The strategy, however, is clear: certain content is given the widest possible reach, while others are systematically suppressed.
The successful platform belongs to the #Chinese #technology company #ByteDance. Already in September, the Guardian reported on leaked documents that detailed how TikTok censored political statements on the #Tiananmen #massacre or the independence of #Tibet. The protests in Hong Kong, which are currently attracting worldwide media attention, are virtually invisible on TikTok between selfies and singalongs, even though the app is available in Hong Kong.
Read more:
https://netzpolitik.org/2019/cheerfulness-and-censorship/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Never before has a #platform grown as fast as TikTok. We have gained exclusive insight into its content moderation and are publishing excerpts from its moderation rules: TikTok operates a sophisticated system to identify, #control, #suppress and direct content. The platform can throttle videos of #protests and #demonstrations according to its rules.
No #app has been downloaded as often as TikTok in the past year. The video sharing platform is growing rapidly. In November 2019, TikTok broke the 1 billion-user barrier – faster than any other social network ever before. The video app and its culture are currently so popular with children and young people that even the Tagesschau (the major German public TV News programme) now has its own account there.
However, #research by netzpolitik.org shows that TikTok is currently able to #suppress videos of political protests and demonstrations and additionally determine which content is visible, through a variety of means.
☣️ Exclusive insight into content moderation
For this research, netzpolitik.org spoke to a source at #TikTok, looked at moderation criteria and communications, and experimented with specially created accounts to see how well videos with China-critical content are visible on the platform.
TikToks moderation rules, of which netzpolitik.org was able to see different versions, are remarkably thin and widely interpretable – even for the moderators themselves. The strategy, however, is clear: certain content is given the widest possible reach, while others are systematically suppressed.
The successful platform belongs to the #Chinese #technology company #ByteDance. Already in September, the Guardian reported on leaked documents that detailed how TikTok censored political statements on the #Tiananmen #massacre or the independence of #Tibet. The protests in Hong Kong, which are currently attracting worldwide media attention, are virtually invisible on TikTok between selfies and singalongs, even though the app is available in Hong Kong.
Read more:
https://netzpolitik.org/2019/cheerfulness-and-censorship/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Ep 51: The Indo-Pak Conflict
Darknet Diaries: The Indo-Pak Conflict
#Kashmir is a region right in between #India, #Pakistan, and #China. For the last 70 years Pakistan and India have fought over this region of the world, both wanting to take #control of it. Tensions sometimes heat up which can result in people being killed. When tensions get high in the real world, some people take to the #internet and #hack their rivals as a form of protest. In this episode we’ll explore some of the #hacking that goes on between India and Pakistan.
📻 #DarknetDiaries #podcast
https://darknetdiaries.com/episode/51/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
#Kashmir is a region right in between #India, #Pakistan, and #China. For the last 70 years Pakistan and India have fought over this region of the world, both wanting to take #control of it. Tensions sometimes heat up which can result in people being killed. When tensions get high in the real world, some people take to the #internet and #hack their rivals as a form of protest. In this episode we’ll explore some of the #hacking that goes on between India and Pakistan.
📻 #DarknetDiaries #podcast
https://darknetdiaries.com/episode/51/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
CNAME Cloaking, the dangerous disguise of third-party trackers
How come AdBlock, Adblock Plus, uBlock Origin, Ghostery, Brave and Firefox are letting a third-party tracker from Eulerian, a leading tracking company, execute their script freely on fortuneo.fr, one of the biggest online bank in France?
How come the same thing is happening on thousands of other popular websites worldwide?
What has started to happen in the last few months in the world of third-party tracking is having a major impact on people’s privacy, and it all stayed pretty much under the radar.
👉🏼 Read more 🇬🇧:
https://medium.com/nextdns/cname-cloaking-the-dangerous-disguise-of-third-party-trackers-195205dc522a
👉🏼 Read more 🇩🇪:
https://www.kuketz-blog.de/vorsicht-neue-art-des-trackings-via-cname-cloaking/
#CNAME #Cloaking #tracker #dns #AdBlock #AdblockPlus #uBlock #Ghostery #Brave #Firefox #Eulerian
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
How come AdBlock, Adblock Plus, uBlock Origin, Ghostery, Brave and Firefox are letting a third-party tracker from Eulerian, a leading tracking company, execute their script freely on fortuneo.fr, one of the biggest online bank in France?
How come the same thing is happening on thousands of other popular websites worldwide?
What has started to happen in the last few months in the world of third-party tracking is having a major impact on people’s privacy, and it all stayed pretty much under the radar.
👉🏼 Read more 🇬🇧:
https://medium.com/nextdns/cname-cloaking-the-dangerous-disguise-of-third-party-trackers-195205dc522a
👉🏼 Read more 🇩🇪:
https://www.kuketz-blog.de/vorsicht-neue-art-des-trackings-via-cname-cloaking/
#CNAME #Cloaking #tracker #dns #AdBlock #AdblockPlus #uBlock #Ghostery #Brave #Firefox #Eulerian
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
RIPE is now out of IPv4. This is no testing!
Dear colleagues, Today, at 15:35 UTC+1 on 25 November 2019, we made our final /22 IPv4 allocation from the last remaining addresses in our available pool. We have now run out of IPv4 addresses.
https://mobile.twitter.com/maxischieder/status/1198975161631940608
#RIPE #IPv4 #ipv6
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Dear colleagues, Today, at 15:35 UTC+1 on 25 November 2019, we made our final /22 IPv4 allocation from the last remaining addresses in our available pool. We have now run out of IPv4 addresses.
https://mobile.twitter.com/maxischieder/status/1198975161631940608
#RIPE #IPv4 #ipv6
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Hidden Cam Above Bluetooth Pump Skimmer
Tiny #hidden #spy #cameras are a common sight at #ATMs that have been tampered with by crooks who specialize in retrofitting the machines with #card #skimmers. But until this past week I’d never heard of #hidden cameras being used at gas pumps in tandem with #Bluetooth-based #card #skimming #devices.
Apparently, I’m not alone.
“I believe this is the first time I’ve seen a camera on a gas pump with a Bluetooth card skimmer,” said Detective Matt Jogodka of the Las Vegas #Police Department, referring to the compromised fuel pump pictured below.
👉🏼 Read more:
https://krebsonsecurity.com/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Tiny #hidden #spy #cameras are a common sight at #ATMs that have been tampered with by crooks who specialize in retrofitting the machines with #card #skimmers. But until this past week I’d never heard of #hidden cameras being used at gas pumps in tandem with #Bluetooth-based #card #skimming #devices.
Apparently, I’m not alone.
“I believe this is the first time I’ve seen a camera on a gas pump with a Bluetooth card skimmer,” said Detective Matt Jogodka of the Las Vegas #Police Department, referring to the compromised fuel pump pictured below.
👉🏼 Read more:
https://krebsonsecurity.com/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Sale of 4 Million Stolen Cards Tied to Breaches at 4 Restaurant Chains
On Nov. 23, one of the #cybercrime underground’s largest #bazaars for buying and selling stolen #payment #card #data announced the immediate availability of some four million freshly-#hacked debit and credit cards. #KrebsOnSecurity has learned this latest batch of cards was #siphoned from four different #compromised restaurant chains that are most prevalent across the midwest and eastern #UnitedStates.
👉🏼 Read more:
https://krebsonsecurity.com/2019/11/sale-of-4-million-stolen-cards-tied-to-breaches-at-4-restaurant-chains/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
On Nov. 23, one of the #cybercrime underground’s largest #bazaars for buying and selling stolen #payment #card #data announced the immediate availability of some four million freshly-#hacked debit and credit cards. #KrebsOnSecurity has learned this latest batch of cards was #siphoned from four different #compromised restaurant chains that are most prevalent across the midwest and eastern #UnitedStates.
👉🏼 Read more:
https://krebsonsecurity.com/2019/11/sale-of-4-million-stolen-cards-tied-to-breaches-at-4-restaurant-chains/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
WeChat users in the US say the app is censoring their messages about Hong Kong
#Chinese #Americans who use the Chinese app #WeChat say they are being #censored for writing #messages in support of #HongKong.
WeChat is ubiquitous in China, so for Chinese Americans with family there it is a major blow to be kicked off the app.
This is the latest in a pattern of Chinese #censorship extending into the #US.
Chinese American users of the messaging app WeChat are finding their messages containing political criticism of China — particularly those aimed at the protests in Hong Kong — are being censored, The Verge reports.
In one instance an American information security analyst named Bin Xie had his account taken down after writing "The pro-China candidates totally lost," referring to Hong Kong's recent election in which pro-democracy candidates gained huge ground against pro-China candidates.
"If you have censorship in China, fine," he told The Verge. "But in this country? I'm a Republican, but on WeChat I suffer the same as Democrats — we are all censored."
Xie then joined a WhatsApp group full of Chinese Americans who had similarly been kicked off WeChat for expressing political views.
For Chinese Americans with family in China, being kicked off WeChat is a major problem. The WeChat app is more or less ubiquitous in China, where it covers a broad range of uses. It acts as a messaging app, a dominant payment platform, a social network, and a platform for accomplishing everyday tasks like paying utility bills and booking doctor's appointments. WeChat and its rival Alipay's payment systems have become so everyday that even street vendors and buskers use QR codes rather than accept cash.
👉🏼 Read more:
https://www.businessinsider.com/us-wechat-users-censored-messages-hong-kong-china-2019-11
👉🏼 Read more:
https://www.theverge.com/2019/11/25/20976964/chinese-americans-censorship-wechat-hong-kong-elections-tiktok
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
#Chinese #Americans who use the Chinese app #WeChat say they are being #censored for writing #messages in support of #HongKong.
WeChat is ubiquitous in China, so for Chinese Americans with family there it is a major blow to be kicked off the app.
This is the latest in a pattern of Chinese #censorship extending into the #US.
Chinese American users of the messaging app WeChat are finding their messages containing political criticism of China — particularly those aimed at the protests in Hong Kong — are being censored, The Verge reports.
In one instance an American information security analyst named Bin Xie had his account taken down after writing "The pro-China candidates totally lost," referring to Hong Kong's recent election in which pro-democracy candidates gained huge ground against pro-China candidates.
"If you have censorship in China, fine," he told The Verge. "But in this country? I'm a Republican, but on WeChat I suffer the same as Democrats — we are all censored."
Xie then joined a WhatsApp group full of Chinese Americans who had similarly been kicked off WeChat for expressing political views.
For Chinese Americans with family in China, being kicked off WeChat is a major problem. The WeChat app is more or less ubiquitous in China, where it covers a broad range of uses. It acts as a messaging app, a dominant payment platform, a social network, and a platform for accomplishing everyday tasks like paying utility bills and booking doctor's appointments. WeChat and its rival Alipay's payment systems have become so everyday that even street vendors and buskers use QR codes rather than accept cash.
👉🏼 Read more:
https://www.businessinsider.com/us-wechat-users-censored-messages-hong-kong-china-2019-11
👉🏼 Read more:
https://www.theverge.com/2019/11/25/20976964/chinese-americans-censorship-wechat-hong-kong-elections-tiktok
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
'Suspension won't silence me': Teen speaks out after embedding message about Xinjiang Uyghurs in TikTok make-up vid
A teenager who spoke out about the plight of #Uyghurs in #Xinjiang has challenged the #Chinese-owned social media app #TikTok over its decision to block her from posting new content. #video
📺 https://www.hongkongfp.com/2019/11/27/suspension-wont-silence-teen-speaks-embedding-message-xinjiang-uyghurs-tiktok-make-vid/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
A teenager who spoke out about the plight of #Uyghurs in #Xinjiang has challenged the #Chinese-owned social media app #TikTok over its decision to block her from posting new content. #video
📺 https://www.hongkongfp.com/2019/11/27/suspension-wont-silence-teen-speaks-embedding-message-xinjiang-uyghurs-tiktok-make-vid/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN