Your sites A visit can reveal (almost) everything about you. If you’re looking for health information, reading about unions, or doing detailed research on certain types of crime, you can provide a wealth of personal details that a bad guy can’t get enough of. can be used against you. Researchers this week have details a new attack, using basic web functions, can unmask anonymous users online. The attack uses common web browser features — found in all major browsers — and CPU functions to analyze whether you’re logged into services like Twitter or Facebook and then identify you.
Elsewhere, we have detailed how Russia’s Killnet “hacktivist” group is attacking countries that support Ukraine but not directly involved in the war. Killnet has launched DDoS attacks against official government websites and businesses in Germany, the United States, Italy, Romania, Norway, and Lithuania in recent months. And it’s just one of a bunch of pro-Russian hacktivists causing chaos.
We also reviewed a New privacy scandal in India where donors to nonprofits have turned over their details and information to the police without their consent. We also reviewed The “debunked” attack can steal data from Intel and AMD chips. And we reviewed the committee’s ongoing January 6 hearings — and predict what will come.
But that’s not all. Each week, we compile news that we don’t break or cover in depth. Click on the title to read the full story. And it’s safe out there!
Over the years, the Amazon-owned security camera company Ring has built relationships with law enforcement. At the beginning of 2021, Amazon achieved more 2,000 partnerships with police and fire departments across the United States, building a huge surveillance network with officials who can request video to help with investigations. In the UK, Ring has partnered with the police force to donate cameras to local residents.
This week, Amazon admitted to handing over police footage captured on Ring cameras without the owner’s permission. Like first reported by PoliticoRing has shown the footage to law enforcement officials at least 11 times this year. This is the first time the company has admitted to transferring data without consent or order. The move would add to concerns about Ring’s cameras, which have been criticized by advocacy groups and lawmakers for eroding people’s privacy and make surveillance technology popular. In response, Ring said it doesn’t give anyone “uncontrolled” access to customer data or video, but can hand over data without permission in emergency situations that threaten death. death or serious harm to a person.
In 2017, Vault 7 Leaks have revealed the CIA’s most powerful and secret hacking tools. Files published by WikiLeaks show the agency Can hack a Mac, your router, Your TVand a host of other devices. Investigators soon pointed the finger at Joshua Schulte, a hacker with the CIA’s Operations Support Branch (OSB), which is responsible for finding exploits that could be used in missions. of the CIA. Schulte has now been found guilty about leaking Vault 7 files to Wikileaks and potentially spending decades in prison. Following an earlier blunder in 2018, Schulte was this week found guilty of all nine charges against him. A few weeks before the second trial, New Yorkers published this comprehensive feature explores Schulte’s dark history and how the CIA’s OSB works.
Hackers with links to China, Iran and North Korea have targeted journalists and media outlets, according to new research by the security firm. Proving Points. Along with efforts to compromise the official accounts of members of the press, Proofpoint said, many Iranian hacking groups pose as journalists and try to trick people into handing over account details online. their. The Iran-linked Charming Kitten group sent detailed interview requests to their potential attack targets, and they also attempted to impersonate numerous Western news outlets. “This social engineering tactic successfully exploits people’s desire for recognition and is being leveraged by APT members who want to target academics and foreign policy experts around the world, potentially to access sensitive information,” Proofpoint said.
In any company or organization, items will be missing from time to time. Usually these are lost phones, security cards and sometimes lost files by mistake left at the bus stop. Losing any of these can open up a security risk if the devices are insecure or if sensitive information is made public. The desktop is less lost – unless you’re the FBI. According to FBI records obtained by VICE’s MotherboardThe agency lost 200 desktops between July and December 2021. Also lost, or in some cases stolen, pieces of armor and a night scope.
Scams don’t get much more complicated than this. This week, the police in India break a fake cricket tournament “Indian Premier League”. A group of scammers are said to have set up a fake league in the western Indian state of Gujarat and hired young men to play cricket matches, posing as professional teams while they streamed. Continue matches for people to bet on. According to police, the group hired a fake commentator, created graphics on the screen showing the scores in real time, and played crowd noises downloaded from the internet. To hide the fact that the matches take place on a farm instead of inside a large stadium, the video feed only shows close-ups of the action. Police said they caught the gang while the quarter-final was underway. The police believe that the gang has capable of hosting many tournaments and is planning to expand to another volleyball tournament. The match footage is worth watching.