Catphishing remains in the news. Not only have Israeli soldiers been prospected by fictitious dating profiles apparently prepared by Hamas, but members of Germany's Bundestag have received the attentions of Chinese intelligence services. In the case of the Bundestag members, according to reports in the Süddeutsche Zeitung, the profiles, while bogus, seemed unusually open in their operation, making little or no attempt to conceal their Chinese nationality. German lawmakers were offered bribes for various kinds of inside information. They were also invited to visit China, where presumably they would be further compromised.
A Chinese ministerial delegation is scheduled to arrive in Berlin for bilateral talks Monday. The spying incident is expected to figure in the agenda.
Researchers at Northwestern University and the University of California Santa Barbara investigated more than 17 thousand Android apps from Google Play and three major third-party app stores. They concluded that, while apps tend to be permission hogs, the permissions they hog usually go unused. Only twenty-one of the apps inspected were extracting and reporting data in a questionable fashion.
Another team of researchers, these at the University of California Irvine, reports on the "Thermanator" proof-of-concept hack: someone with a decent mid-range thermal camera who got close enough to an unattended keyboard or keypad within thirty seconds of use could see what keys were pressed.
The US Army continues to integrate cyber operations into unit training at brigade-level and below.
Facebook's content screening uses human fact-checkers to screen for the AI, and not vice versa.