Tag: cybersecurity

The US Congress Was Targeted With Predator Spyware
Technology

The US Congress Was Targeted With Predator Spyware

The media consortium, along with security researchers from Amnesty International and Google’s Threat Analysis Group, were able to show Vietnam’s connection to the Predator hacking campaign through documents they obtained that detail the Vietnamese government’s contract with Intellexa in 2020, and later an extension of the deal to allow the use of the Predator software. The internal documents went so far as to capture the response of Intellexa’s founder, Israeli former military hacker turned entrepreneur Tal Dilian, when the deal was announced: “Wooow!!!!” Vietnam’s government would later target French officials with Predator before this year’s campaign targeting US congressmen.Despite efforts by Israel and other nations to cut off funding to Hamas in recent years, the group raised million...
The EPA won’t force water utilities to inspect their cyber defenses
Technology

The EPA won’t force water utilities to inspect their cyber defenses

The EPA is its plan to require states to assess the cybersecurity and integrity of public water system programs. While the agency says it continues to believe cybersecurity protective measures are essential for the public water industry, the decision was made after GOP-led states sued the agency for proposing the rule.In a that accompanied the new rules in March, the EPA said that cybersecurity attacks on water and wastewater systems “have the potential to disable or contaminate the delivery of drinking water to consumers and other essential facilities like hospitals.” Despite the EPA’s willingness to provide training and technical support to help states and public water system organizations implement cybersecurity surveys, the move garnered opposition from both GOP state attorneys and ...
The NSA has a new security center specifically for guarding against AI
Technology

The NSA has a new security center specifically for guarding against AI

The National Security Agency (NSA) is starting a dedicated artificial intelligence security center, This move comes after the government has begun to increasingly rely on AI, integrating multiple algorithms into defense and intelligence systems. The security center will work to protect these systems from theft and sabotage, in addition to safeguarding the country from external AI-based threats.The NSA’s recent move toward AI security was announced Thursday by outgoing director General Paul Nakasone. He says that the division will operate underneath the umbrella of the pre-existing Cybersecurity Collaboration Center. This entity works with private industry and international partners to protect the US from cyberattacks stemming from China, Russia and other countries with active malware and...
Chinese Hackers Are Hiding in Routers in the US and Japan
Technology

Chinese Hackers Are Hiding in Routers in the US and Japan

WIRED broke the news on Wednesday that SoundThinking, the company behind the gunshot-detection system ShotSpotter, is acquiring some assets—including patents, customers, and employees—from the firm Geolitica, which developed the notorious predictive policing software PredPol. WIRED also exclusively reported this week that the nonprofit Electronic Privacy Information Center is calling on the US Justice Department to investigate potentially biased deployment of ShotSpotter in predominantly Black neighborhoods.As the US federal government inches closer to a possible shutdown, we took a look at the sprawling conservative media apparatus and deep bench of right-wing hardliners in Congress that are exploiting their leverage to block a compromise in the House of Representatives.Satellite imaging...
The Shocking Data on Kia and Hyundai Thefts in the US
Technology

The Shocking Data on Kia and Hyundai Thefts in the US

Mandiant researchers published findings this week about a newly revealed Chinese espionage operation that used Sogu malware to spy on the African operations of both European and US organizations. The campaign is significant for the scope of its victims, but also because attackers used a classic malware distribution method: thumb drives. The attacks are the latest example of China's aggressive global espionage—but read on for statements from the Chinese government about alleged US cyberattacks and digital espionage.After Elon Musk claimed recently that primates used in Neuralink implant research were close to death anyway, a WIRED investigation this week revealed grisly details about the truth of their deaths that appear to dispute the characterization that the animals were all terminally ...
7 Signs of Credit Card Fraud | Credit Cards
Money

7 Signs of Credit Card Fraud | Credit Cards

Cybercrime is a growing problem in the U.S., and there seem to be new scams you need to know about every day. But one problem everyone must be on guard for is credit card fraud.Credit card fraud can be difficult to spot and even harder to resolve. The best things you can do are to watch out for the warning signs, monitor your finances and act quickly to address the theft once it occurs.What Is Credit Card Fraud?Credit card fraud happens when your card information is stolen to make fraudulent purchases. According to the Federal Trade Commission, credit card fraud is the most common type of identity theft.Credit card fraud can be hard to detect because it can take many different forms. Here are the main types of credit card fraud you should know about: Account takeover. Account takeover ha...
You Need to Update Google Chrome or Whatever Browser You Use
Technology

You Need to Update Google Chrome or Whatever Browser You Use

China-linked hackers are increasingly moving beyond espionage and into the disturbing world of power grid attacks. Threat researchers at security software firm Symantec this week released new evidence that the Chinese hacking group known as APT41 infiltrated the power grid of an Asian nation. Some details of the latest intrusion echo a 2021 attack on India’s power grid, suggesting the same hackers are responsible.In Argentina, a scandal is playing out over the use of facial recognition software in Buenos Aires. Despite laws that require authorities to limit searches to known fugitives, an investigation by a judge found that the system was used to look up people not wanted for any crimes. In other cases, errors led police to arrest or question the wrong people. While Buenos Aires is attemp...
Use Your Phone at the ATM Instead of a Card
Money

Use Your Phone at the ATM Instead of a Card

Consumers have been able to withdraw cash from ATMs without using their debit cards for several years, a convenient option, especially if they don't have a card with them.If you have your smartphone with you, then leaving your card or wallet behind is no longer an issue. At some ATMs, you just need your phone to get cash for purchases or tips. Dan Rosenbaum has been using his Apple Watch to receive cash for more than a year at Chase ATMs because it is more convenient."I don't have to fumble in my wallet for the card or take out my wallet on the street at all to work the door buzzer," says the New York-based freelance writer. Even though Wells Fargo requires consumers to tap the withdrawal amount on the ATM, Tim Maliyil, CEO of Las Vegas-based cybersecurity services firm AlertBoot, prefers...
Mozilla: Your New Car Is a Data Privacy Nightmare
Technology

Mozilla: Your New Car Is a Data Privacy Nightmare

Eighty-four percent of the brands that researchers studied share or sell this kind of personal data, and only two of them allow drivers to have their data deleted. While it is unclear exactly who these companies share or sell data to, the report points out that there is a huge market for driver data. An automotive data broker called High Mobility cited in the report has a partnership with nine of the car brands Mozilla studied. On its website, it advertises a wide range of data products—including precise location data.This isn’t just a privacy nightmare but a security one. Volkswagen, Toyota, and Mercedes-Benz have all recently suffered data leaks or breaches that affected millions of customers. According to Mozilla, cars are the worst category of products for privacy that they have ever ...
US and UK Mount Aggressive Crackdown on Trickbot and Conti Ransomware Gangs
Technology

US and UK Mount Aggressive Crackdown on Trickbot and Conti Ransomware Gangs

The United States Department of Treasury and United Kingdom Foreign Office announced today that they have sanctioned 11 people for their alleged involvement in the Trickbot cybercriminal gang. The US Department of Justice also unsealed indictments against nine people whom it says are connected to Trickbot and its sibling organization Conti. Seven of those nine also appear on today's sanctions list.US and UK law enforcement working with officials around the world have made a concerted effort in recent years to deter cybercrime—particularly ransomware attacks and those launched by Russia-based actors. And Trickbot, a notorious and prolific gang, has repeatedly been a specific target of these actions. In February, the US and UK announced sanctions against seven alleged Trickbot actors and an...