A Hacker Steals $ 610M of Cryptocurrency – and Returns Most of It

This is a great week for smartphone privacy, at least in the various ways that external forces have made your location data more or less secure. On the bad side of the ledger, most 5G connections in the US today aren’t really full 5G, which means they’re already dangerous in the form of stingray surveillance that the next generation pattern would have prevented. In addition, researchers have found a way to stop your carrier if it knows where you are every hour you are also connected to a cell tower. The tricky part is getting any of them to actually implement it.

Privacy advocates this week also released documents showing that the NYPD spent at least $ 159 million since 2007 to purchase surveillance equipment, including stingrays, policing software, and biometric tools.

Our UK colleagues are looking at new research that shows how and where the extremists put shop on platforms like Steam and Discord. This is a long -standing problem, which is especially frustrating for these services with so much equipment yet to be resolved.

Google does some changes in the Play Store, much of which matters for developers rather than end users. But moving from an Android application package to an Android app bundle means it will have to be even harder to push scammers through malware-laced sideloaded apps.

It’s already a roller coaster for Poly Network, a decentralized financial system. A hacker stole more than $ 600 million earlier in the week, only to start getting it back on Wednesday. On Thursday, they returned $ 342 million in funds, while $ 33 million worth of Tether stablecoins were frozen. The remaining crypto assets are placed in a wallet that requires keys from both the Poly Network and the hacker; their final destiny is still in the balance.

Virtual private networks good in theory; They allow you to browse without your ISP knowing what you want, and their encrypted connections make it even more difficult for anyone to snoop on your activity. But a new investigation from Markup shows that many VPNs still allow trackers from third-party sites, even if they don’t themselves log your activity. It’s a habit that can undermine the whole privacy aspect of a VPN – and that’s something we’re focusing on. best VPN recommendations.

In 2019, Apple sued a company called Corellium over its iOS virtualization software. Corellium products are popular with security researchers, who have limited view of iOS itself; Apple claims the software infringes the company’s copyright claims. The retreat comes at a time when Apple is starting to fire from privacy supporters about it. controversial new steps to find child sexual abuse material on iCloud involving the iPhones themselves. It requires all the community security friends that can be obtained; an unpopular lawsuit against a critical research tool may not be the way to do this.

Over the past few months, Microsoft has dealt with a number of security issues tied to the functionality of Windows Print Spooler, including more than one failed attempt to patch a vulnerability called PrintNightmare. This week, the company finally offers a way to end the misfortunes associated with the printer, even if it’s a small solution. Now, anyone who wants to use Windows Point and Print features to install drivers needs management privileges. That should avoid most PrintNighmare attacks — but it’s already been shown not to stop them all.

More WIRED Stories

Source link


Leave a Reply

Your email address will not be published. Required fields are marked *