Cyber Attacks, Threats, and Vulnerabilities
Cyber wars between Greece and Turkey after Turkish hackers claim responsibility for attacks on Greek government sites (NEOS KOSMOS) Turkish hackers last week claimed responsibility for cyber attacks on Greek government sites, including those of the Greek National Intelligence Services (EYP), Greek Parliament, the Greek Ministry of Foreign Affairs …
Greek embassies and consulates face major headache after Turkish cyber-attack (Greek City Times) Following the cyber attack on Greek government websites last Friday, many key websites such as the Ministry of Foreign Affairs are still ‘down’ leading to major headaches for both citizens and the government.
Turk Telekom says internet access restored after cyber attack (Reuters) Turk Telekom has restored internet access after a cyber attack caused connectivi...
Acting DHS secretary says he expects Russia to attempt to interfere in 2020 elections (TheHill) Acting Homeland Security Secretary Chad Wolf said Friday that his agency “fully expects” Russia to attempt to interfere in U.S. elections in 2020.
Don't assume Iran will be behind the next big cyber attack (TheHill) America’s other enemies may use this latest flare up as an opportunity to launch false flag cyberattacks.
Top DHS cyber official says Iran would’ve hit back in cyberspace by now (Fifth Domain) The top cybersecurity official at the Department of Homeland Security said that if Iranian cyber actors were to attack the United States in retaliation for a drone strike that killed an Iranian general Jan. 2, it would have already happened.
FDIC Issues Cyberattack Warning to U.S. Banks (MSSP Alert) Federal Deposit Insurance Corporation (FDIC) issues cyberattack warning letter to all FDIC-supervised institutions -- spanning roughly 5,400 U.S. banks & financial services firms.
Why Iran won’t rush a cyber response against the US (Verdict) The spectre of an Iranian cyberattack has loomed large but failed to materialise. Here's why Iran won't rush a cyber response against the US.
US-Iran tension highlights local infrastructure weaknesses (East Greenwich Pendulum) Institutions throughout Rhode Island worked in tandem with the Department of Homeland Security following increased tensions between the United States and Iran which included a threat by a member of
Iranian Offensive Cyber Attack Capabilities – Analysis (Eurasia Review) By Catherine A. Theohary* Threat Evolution Iran’s use of cyberspace has evolved from an internal means of information control and repression to more aggressive attacks on foreign targets. The regim…
Threat Brief: Iranian Cyber Warfare (IntSights) Now is the time to assess whether your organization is a likely target of Iranian state-sponsored cyber operations, and determine if your team is ready and trained to respond.
JhoneRAT Is A New Malware Stealing Data From Arabic-Speaking Nations (TechDator) JhoneRAT, as described by the discoverer Cisco's Talos Intelligence Group, is just another data stealer through its infectious malware.
Thousands of Chinese Students’ Data Exposed on Internet (Wall Street Journal) A Chinese facial-recognition database with information on thousands of children was stored with no protection on the internet, a researcher discovered, raising questions about school surveillance and cybersecurity in China.
Hacker leaks passwords for more than 500,000 servers, routers, and IoT devices (ZDNet) The list was shared by the operator of a DDoS booter service.
Alert (AA20-020A) Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP (CISA) On January 19, 2020, Citrix released firmware updates for Citrix Application Delivery Controller (ADC) and Citrix Gateway versions 11.1 and 12.0 to address CVE-2019-19781. Citrix expects to release updates for other vulnerable versions of Citrix ADC, Gateway, and SD-WAN WANOP appliances through January 24, 2020. (See Mitigations for update schedule)
A hacker is patching Citrix servers to maintain exclusive access (ZDNet) FireEye believes this is a bad guy hoarding Citrix servers, rather than a good-guy vigilante looking out for organizations.
Hackers Are Securing Citrix Servers, Backdoor Them for Access (BleepingComputer) An unknown threat actor is currently scanning for and securing vulnerable Citrix ADC servers against CVE-2019-19781 exploitation attempts, while also backdooring them for future access.
Microsoft warns about Internet Explorer zero-day, but no patch yet (ZDNet) IE zero-day connected to last week's Firefox zero-day.
No fix until February for Internet Explorer zero-day being actively exploited in targeted attacks (Computing) Internet Explorer vulnerability found in the scripting engine that handles objects in memory
Hackers are exploiting a bug in Internet Explorer, but no immediate fix (TechCrunch) Microsoft is "aware of limited targeted attacks," but a patch is not yet available.
This giant botnet has just sprung back to life pushing a big phishing campaign (ZDNet) Researchers identify a new Emotet campaign that is distributing phishing emails - and malware - to targets across the globe.
FBI Says State Actors Hacked US Govt Network With Pulse VPN Flaw (BleepingComputer) FBI said in a flash security alert that nation-state actors have breached the networks of a US municipal government and a US financial entity by exploiting a critical vulnerability affecting Pulse Secure VPN servers.
Mitsubishi Electric data likely compromised in massive cyberattack blamed on Chinese group (The Japan Times) Highly sensitive information on defense, electricity or other infrastructure operations, however, was not breached, the company said.
Mitsubishi Electric reports cyber-attack (NHK WORLD) Mitsubishi Electric says it suffered a cyber-attack last year that may have compromised personal and corporate data. The company is engaged in businesses ranging from household appliances to communications, space and defense.
Facebook blocks start-up's 'brainwashing' tech (BBC News) Social network orders the Spinner to stop targeting its users with "disguised" ads.
Facebook and Instagram ban alleged ‘brainwashing’ service (Naked Security) The Spinner personalises “subconscious influencing” for a specific target.
EFS Ransomware (Safebreach Labs) Ransomware is a serious threat to individuals, SOHOs/SMBs and large enterprises. Consequently, many security solutions are now available, which attempt to address the ransomware threat. In this blog post we describe EFS-based ransomware (ransomware which abuses the Windows Encrypting File System), which is a new concept we developed in Safebreach Labs.
Android Beauty Camera Apps are Found to be Stealing Data from Their Users (TechDator) New research tells the beautification apps from both Playstore and Appstore are apparently growing with data-stealing codes.
New Nest Video Extortion Scam Plays Out Like a Spy Game (BleepingComputer) A new sextortion scam that breaks the typical mold has been detected at the beginning of the year. Fraudsters preying on the insecurity of connected devices used footage from Nest cameras, and led victims through a convoluted path of email accounts and web sites before making their ransom price known.
A popular new sextortion scam tricks victims into thinking they are being recorded on their Nest cameras (CNBC) Fears over the misuse of internet connected cameras like those made by Nest and Ring has combined with the powerful and simple email scam known as "sextortion."
Regus suffers staff data breach via third party (SC Magazine) Serviced offices and co-working space provider Regus has suffered a data breach that saw job performance data on more than 900 employees of Regus owner IWG published online.
Health Quest data breach revealed Social Security numbers, payment card information (The Poughkeepsie Journal) Patients with Health Quest may have received letters informing them of a data breach containing their information.
Morial Convention Center victim of latest ransomware attack (Fox 8) It is not believed that any sensitive employee data was compromised.
PAL warns against 'phishing site' luring public 'to win plane tickets' (ABS-CBN News) Philippine Airlines warned the public on Friday against a phishing site that it said is circulating a 'fake advertisement' supposedly offering a chance to win plane tickets.
Scam Alert: "Expiring License" Scam Tricks Microsoft Windows Users (Better Business Bureau) Scammers use Microsoft's announcement about the end of Windows 7 support to confuse Windows users into paying to update their “expiring license."
Colonie's computer system down after cyber attack (Times Union) The Town of Colonie’s computer system was down Friday due to a cyber...
Revealed: betting firms use schools data on 28m children (Sunday Times) Betting companies have been given access to an educational database containing names, ages and addresses of 28 million children and students in one of the biggest breaches of government data. They...
Gardaí warn of phone phishing scam targeting Cork people (Echo Live) GARDAÍ have issued a warning in Cork regarding an ongoing phishing scam.
City of Pensacola: Personal information possibly compromised during cyber attack (WEAR) The City of Pensacola says they cannot determine with certainty that personal information has not been compromised in the cyberattack they faced in December in a recent update. The city says the personal information that may have been obtained by the hackers includes individuals’ first and last names, social security number, driver license number or other identification number, bank account number credit card number, or debit card number. WEAR.
Pensacola residents receive 'nondescript' letters regarding data breach (WEAR) A Pensacola man recently received a letter he had been waiting for -- but when he first picked it up, he had no idea. "It looks like a piece of commercial junk," he said. "It said 'auto sort' and it's from an address in Atlanta. There's no identifying characteristic."
New Jersey Synagogue Suffers Sodinokibi Ransomware Attack (BleepingComputer) Temple Har Shalom in Warren, New Jersey had their network breached by the actors behind the Sodinokibi Ransomware who encrypted numerous computers on the network.
LastPass is in the midst of a major outage (ZDNet) LastPass issue appears to impact users with accounts dating back to 2014 and earlier.
Technical glitch prevents several LastPass users from accessing accounts (Computing) Nothing to see here, LastPass claims on Twitter
Travelex continues to insist that no customer data was compromised in new video update from CEO (Computing) Customer-facing systems are being restored, says Travelex CEO Tony D'Souza, 18 days after the ransomware attack broke out
December cyber attack costs New Orleans $7 million, so far (HOTforSecurity) A ransomware attack targeting the city of New Orleans has inflicted $7 million in losses so far, with more to be incurred in coming months, Mayor Latoya Cantrell said in a recent update. At 5 a.m. on December 13, New Orleans was becoming the latest victim... #louisiana #ransomware #ransomwareattack
Update on cyber-attack at Picanol (Innovation in Textiles) Following the large-scale ransomware attack of Monday 13 January 2020 textile machinery manufacturer Picanol issued the following statement this afternoon
Minister’s phone confession raises eyebrows (SWI swissinfo.ch) Defence Minister Viola Amherd has told SRF she usually uses her iPhone rather than the encrypted phone given to cabinet ministers.
Council Post: The Dangers Of Using A VPN On Home Computers For Work And What To Do Instead (Forbes) Some of the decisions by IT and security professionals are innovative, secure and even cutting-edge, while others are downright cringe-worthy and laden with potential risk.
Vulnerability Summary for the Week of January 13, 2020 (CISA) The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Security Patches, Mitigations, and Software Updates
Microsoft releases critical Windows 10 security update – which doesn’t work (TechRadar) Another fail – and this time it’s serious
Citrix Patches ADC Bug as Attacker Hoards Access (Infosecurity Magazine) NotRobin backdoor spotted compromising exposed deployments
Citrix speeds up patches for exploited Netscaler vulnerability (iTnews) First fixes released.
Cyber Trends
Confidence in SD-WAN Shaken by Digital Transformation, Finds Cato Networks IT Survey (Cato Networks) SD-WAN is set for strong growth in 2020 as buyers migrate from MPLS to a more agile and affordable alternative. Survey findings suggest focusing on SD-WAN for MPLS replacement and failing to fully consider digital transformation requirements undermines long-term SD-WAN satisfaction.
Nation-state hackers increasingly target organizations (TechRadar) Businesses in North America were most likely to report being targeted by nation-state hackers
Computer viruses causes $902 million in damage to Vietnamese users (Vie Nam News) Computer viruses caused estimated losses of VNĐ20.9 trillion (US$902 million) to Vietnamese users last year, much higher than the VNĐ14.9 trillion reported in 2018, reported Bkav Technology Group.
Is London the hacking capital of Europe? (SC Magazine) The UK is the European country most attacked by cyber-criminals and within the UK London is disproportionately the target, suffering as many breaches as several European countries combined.
Ireland ranked second in Europe for data breach notifications (The Irish Times) Over 160,000 notifications reported across European Economic Area since GDPR began
Marketplace
The status of ‘silent cyber’ in the insurance industry (Canadian Underwriter) Silent cyber has long been a thorn in the side of some insurers, and it doesn’t look like the issue will be resolved any time soon. Part of the issue is that the cyber market doesn’t exist to cater to…
Snyk Closes $150M to Deliver Developer-first Security that Enables Secure Digital Transformation (PR Newswire) Developer-first security company Snyk has secured a $150 million investment, led by Stripes, a leading New York-based growth equity firm. This...
Acquisition bolsters Kroll's cybersecurity capacity in Asia Pacific (Consultancy Asia) Risk advisory Kroll has bolstered its incident response capabilities in the Asia Pacific with the purchase of Singapore-based cyber-security firm RP Digital Security.
GCHQ to mentor 11 Manchester startups to improve cyber security in smart devices (Moose Gazette) GCHQ is sending its ‘spies’ to work with UK start-ups to help prevent gadgets becoming hackable.
Hospitals Give Tech Giants Access to Detailed Medical Records (Wall Street Journal) It isn’t only Google that can tap into patients’ digital health records: Microsoft and IBM also have signed agreements with major hospital systems giving them the ability to access patients’ identifiable data.
Huawei signs deal with TomTom for a Google Maps alternative (The Verge) Earlier reports said Huawei was building its own map platform
Huawei Moves To Dodge Google Ban Just As U.S. Fight Gets Personal (Forbes) As Huawei's battle with Washington intensifies, the Chinese giant takes aim at Google.
'We won't be uniting for myriad reasons' - Kaseya CEO on owner acquiring Veeam (CRN) Fred Voccola insists that private equity owner Insight’s recent purchase of Veeam will not affect Kaseya’s strategy
IBM Secures $1.1B Contract With Banco Sabadell (SDX Central) IBM this week scored a 10-year, $1.1 billion contract to help Banco Sabadell, Spain’s fourth-largest private bank, modernize its IT infrastructure, and migrate its applications to the cloud.
Arkose Labs is a Fraud Prevention Start-Up to Watch in 2020 After 400% Annual Growth (Yahoo) Arkose Labs, the platform that bankrupts the business model of fraud and abuse, begins the decade following a year of tremendous growth. Traffic on the Arkose Labs platform grew fivefold in 2019, with both new and existing customers increasing usage due to the solution’s success in protecting against
Akamai Will Have A Great Year (Seeking Alpha) Akamai will benefit from the summer Olympics and presidential election.
CEO Runs Her Cybersecurity Company From Sweet Home Chicago (Forbes) Ning Wang has traveled a long road to become CEO of Offensive Security, a company offering highly specialized training in cybersecurity for clients ranging from the U. S. Army to Amazon.
Booz Allen names new national security head (Washington Technology) Booz Allen Hamilton elevates a three-decade veteran of the firm to lead its national security business.
CYFIRMA Appoints Leadership Team to Prepare for Market Expansion (Economywatch) World, US, China, India Economy, Investment, Finance, Credit Cards
Zscaler elects David Schneider to its Board of Directors (Help Net Security) Zscaler, the leader in cloud security, announced that Zscaler stockholders elected David Schneider to its Board of Directors.
Controversial Israeli cyberattack firm NSO adds Lieberman ally to its arsenal (Haaretz) Sharon Shalom, a former chief of staff at the Defense Ministry under then Defense Minister Avigdor Lieberman, has joined Israeli cyber-surveillance and spyware company NSO, as an outside consultant dealing with global policy.
Products, Services, and Solutions
GlobalPlatform Brings IoT Security to Nuremberg with SE IoT Technical Workshop - GlobalPlatform (GlobalPlatform) The standard for secure digital services and devices
Don’t let imposters into your inbox (Sophos News) Email impersonation protection is now available in Sophos Email Advanced.
Keyfactor Announces DevOps Integrations to Address Identity and Access Management Security Risk (Yahoo!) New PKI-as-a-Service Orchestration Capabilities Support Threat Mitigation and DevSecOps Workflow Integration
Technologies, Techniques, and Standards
What happens when we unmask hackers? (NewsDio) Cyber threat activity has become an increasingly common topic of discussion in the media and in society in general. Why is this? Due to public disclosures, they have helped shed light on an obscure part of the malware and piracy underworld on the Internet. But so far, little has been considered about the potential impact …
Iowa Democrats revamped their caucuses to fend off disinformation. Now some fear the changes could sow new confusion in tight 2020 race. (Washington Post) When Democrats here went to bed on the night of their first-in-the-nation caucuses four years ago, the bitterly fought contest between Hillary Clinton and the insurgent Sen. Bernie Sanders was too close to call. So an abrupt predawn notice from the state party declaring Clinton the winner sent some into a fury.
Opinion | We’re Banning Facial Recognition. We’re Missing the Point. (New York Times) The whole point of modern surveillance is to treat people differently, and facial recognition technologies are only a small part of that.
CAA launches aviation cyber-security assurance scheme (SC Magazine) UK's Civil Aviation Authority and accreditation body CREST announced the first list of companies to be accredited under its cyber-security oversight scheme ASSURE
£150m cybersecurity framework to go live next month (CRN) Cyber Security Services 3 replaces current framework
Phishing Is Getting More Sophisticated. Here's What to Look Out For (Inc.com) Experts weigh in on the best practices for combating the next wave of data breaches.
5 tips to avoid spear-phishing attacks (Naked Security) Our tips will help you boost your resistance to phishing, even when the crooks make a determined effort to reel you in.
How to recognize AI snake oil (CITP) Much of what’s being sold as “AI” today is snake oil — it does not and cannot work. Why is this happening? How can we recognize flawed AI claims and push back?
Design and Innovation
An Open Source Effort to Encrypt the Internet of Things (Wired) IoT is a security hellscape. One cryptography company has a plan to make it a little bit less so.
The Secretive Company That Might End Privacy as We Know It (New York Times) A little-known start-up helps law enforcement match photos of unknown people to their online images — and “might lead to a dystopian future or something,” a backer says.
Researchers Can Make AI Forget You (IEEE Spectrum) New methods make removing records from trained models more efficient
IoT Pushes Blockchain Toward a Tipping Point (RTInsights) Blockchain could serve as an automatic registry for ownership and maintenance status for devices and systems connected via IoT, validating state of repair.
Research and Development
Teen entered ‘dark rabbit hole of suicidal content’ online (Naked Security) Molly Russell’s grieving father has backed a psychiatrists’ report, saying that tech companies must be forced to hand over anonymized data.
Academia
Citadel to help train nation's future cyber warriors (The Times and Democrat) The Citadel, dedicated to training America’s cyber warriors, will harness a new $2.8 million National Science Foundation grant to create the state’s first CyberCorps Scholarship for Service program. It is
Legislation, Policy, and Regulation
Analysis | The Cybersecurity 202: Here’s the inside story of Cyber Command's campaign to hack ISIS (Washington Post) Newly declassified documents reveal internal roadblocks to conducting the secretive 2016 effort.
How a Military Cyber Operation to Disrupt Islamic State Spurred a Debate (Wall Street Journal) The rollout of a secret operation launched during the Obama administration was delayed by interagency disagreements, according to newly released government documents and former U.S. officials.
Top Secret documents show Cyber Command's growing pains in its mission against ISIS - CyberScoop (CyberScoop) U.S. government documents made public Tuesday show that while a U.S. Cyber Command operation that disrupted ISIS computer networks was largely successful, there were significant shortcomings, including operators having trouble collecting data, interagency deconfliction issues, difficulty vetting targets, and, in at least one case, a close call with the operation being discovered by the adversary.
Uniting the Cyber Domain Stakeholders (Small Wars Journal) The United States faces an organizational dilemma when it comes to the cyber domain, as the Department of Defense, Department of Homeland Security, Intelligence Community, and the private sector all are stakeholders in the domain and the security. Uniting the stakeholders under one security domain, specifically quantum encryption, would strengthen the United States cyber defense against their adversaries.
Why Iran would avoid a major cyberwar (Fifth Domain) What's in it for Iran to launch a massive cyber engagement against the free world? What can they win and what would their regime lose?
Worried about a cyberattack from Iran? Here’s how feds prepare (Fifth Domain) Fifth Domain asked former top cybersecurity professionals from top civilian government departments how they prepared for heightened cybersecurity risk. Here's what they said.
Asia Times | Cyber diplomacy in Iran’s government | Opinion (Asia Times) While victimized by cyberwarfare, the Rouhani government also uses the Internet to build international relationships
A Public Relations Disaster Overtakes Iran (Foreign Policy) With protests raging in the streets, the Islamic Republic finds itself on the defensive at home and overseas over its misrepresentations.
The cyberwar with Iran is already a decade old: So where does it go now? (TheHill) One factor that may serve as a disincentive to Iran to launch major cyberattacks against the United States is the fact that Iran is aware that the United States has already infiltrated the infrastructure of Iran.
Russia To Focus On Preventing Weaponization Of Cyberspace In 2020 - Foreign Minister Sergey Lavrov (UrduPoint) Russias security agenda for 2020 includes work on preventing arms race in space and weaponization of cyberspace, acting Foreign Minister Sergey Lavrov said Friday
EU industry chief dismisses fears strict security rules could delay 5G (Reuters) European industrial policy chief Thierry Breton dismissed claims that relying on...
EU Won’t Recommend Banning Huawei in Upcoming 5G Risk Rules (Bloomberg) Bloc to unveil 5G risk measures for EU states end of January. EU states have ultimate say to ban Huawei from networks.
Huawei's cheap
5G comes at an incalculable cost (The Telegraph) It is high time that the UK woke up and recognised what we are facing
Johnson will defy US and allow use of Huawei, says top security adviser (the Guardian) Chinese firm poised to help build UK’s 5G phone network despite warnings about spying
UK's BT, Vodafone May Seek PM Johnson's Support for Huawei: Sources (New York Times) Britain's BT and Vodafone are considering urging Prime Minister Boris Johnson not to risk the rollout of next generation mobile networks by banning China's Huawei [HWT.UL], sources said, confirming a Sky News report on Friday.
BT and Vodafone set to moan to PM about Huawei (Telecoms.com) The CEOs of BT, Philip Jansen, and Vodafone, Nick Read, are working on a letter they will sent to the UK Prime Minister, begging him not to ban Huawei.
BT and Vodafone 'support Huawei involvement' in UK 5G network (CityAM) BT and Vodafone are reportedly set to support Chinese telecoms firm Huawei's involvement in the UK's 5G network in a letter lobbying the Prime Minister
()
()
Können wir chinesischen Smartphones vertrauen? (T-online.de) Huawei, Xiaomi, OnePlus: Die Smartphones aus China sind beliebt, denn sie sind hochwertig und günstig. Die US-Regierung wirft Huawei allerdings Spionage vor. Können Kunden die Smartphones bedenkenlos kaufen?
How Huawei Landed at the Center of Global Tech Tussle (Bloomberg via the Washington Post) China’s biggest tech firm, Huawei Technologies Co., has risen to global prominence as a leader in 5G, the much ballyhooed, next-generation wireless technology.
How just five companies came to dominate the world’s 5G networks (The Telegraph) How do you solve a problem like Huawei?
Fianna Fail to reprogram military for cyber-security (Times) Fianna Fail is to propose the creation of a cyber-command unit as part of a plan to modernise the Defence Forces, following similar moves by other EU states. The proposal, which is expected to be...
What Switzerland should consider when tracking cyber incidents (SWI swissinfo.ch) Swiss attorney Florian Roth offers perspective on what the Swiss legislator still needs to answer to track and respond to cyber incidents.
Google CEO Sunder Pichai calls for 'proportionate' regulation of artificial intelligence (Computing) There is no question in my mind that artificial intelligence needs to be regulated - Sundar Pichai
Why Google thinks we need to regulate AI (Silicon Valley Business Journal) Alphabet and Google CEO Sundar Pichai makes the case for the responsible development of artificial intelligence in an op-ed for the Financial Times.
New US Bill Wants to Assign State Cybersecurity Coordinators (BleepingComputer) Four U.S. Senators have introduced a bipartisan bill that will require the Department of Homeland Security (DHS) to appoint cybersecurity effort coordinators in every state to orchestrate cyberattack response and remediation efforts, and to improve coordination between federal, state, and local entities.
Litigation, Investigation, and Law Enforcement
European Regulators Target Big Tech Companies (Wall Street Journal) A new offensive that tackles both data and competition issues threatens some of Silicon Valley’s most successful business models.
GDPR: 160,000 data breaches reported already, so expect the big fines to follow (ZDNet) The number of breaches reported each day continues to rise - and the number of significant fines is soon to follow.
Europe's privacy overhaul has led to $126 million in fines — but regulators are just getting started (CNBC) The biggest penalty under GDPR to date was a fine of 50 million euros imposed on Google, according to law firm DLA Piper.
Extradition hearing of Meng Wanzhou, Huawei executive at the center of U.S.-Canada-China rift, to open in Vancouver (Washington Post) It’s been more than a year since Huawei “princess” Meng Wanzhou stepped off a Cathay Pacific flight in Vancouver and into the waiting arms of the Royal Canadian Mounted Police, detailed to arrest her on behalf of the United States.
Israeli surveillance software lawsuit goes behind closed doors (Gadget Now) A Tel Aviv District Court judge cited national security concerns when she banned the public and the media from court sessions, drawing quick condemnation from the campaign group.
Schiff says intelligence agency is withholding Ukraine documents from Congress (CNN via Erie News) By Devan Cole, CNN Lead impeachment manager Adam Schiff said Sunday that the National Security Agency is withholding from Congress documents pertaining to the
What Has Happened Since House Vote to Impeach (Wall Street Journal) As lawmakers wrangle over which documents and witnesses should appear in the Senate impeachment trial of President Trump, here’s what information has emerged in the last few weeks.
Sen. Morgan, cyber security expert, details Russian hacking of Burisma (Seacoastonline.com) State Sen. Jon Morgan has unique insight into the Ukrainian energy company at the center of the ongoing impeachment trial against
NH senator part of firm that uncovered Ukraine hack (UnionLeader.com) A New Hampshire state senator has a key role with the firm that last week revealed Russian military intelligence operatives hacked into the Ukrainian gas company at the heart of
Facebook is ordered to hand over data about thousands of apps that may have violated user privacy (Washington Post) A Massachusetts judge rejected the tech giant's earlier attempt to withhold the evidence from state officials investigating its privacy practices.
FBI unlocks iPhone 11 Pro Max using Graykey raising privacy concerns (HackRead) In the past, Apple has repeatedly refused to unlock the iPhone for the FBI pleasing its fan base with the notion that it indeed has no secret backdoor to your smartphone. Yet, this sadly did not mean that the iPhone was unhackable.
Does the F.B.I. Need Apple to Hack Into iPhones? (New York Times) There are tools to crack into the phones at the center of a new dispute over encryption. But the F.BI. says it still needs Apple’s aid.
Unlocking news: We decrypt those cryptic headlines about Scottish cops bypassing smartphone encryption (Register) New perspective on FBI, Interpol demands for backdoors
()
To catch a thief, go to Google with a geofence warrant – and it will give you all the details (Register) Investigators ask Chocolate Factory to help them connect the geographic dots
2G Allowed for Post-Paid Mobiles in Two Kashmir Districts but Only to Access 153 Websites (The Wire) The order allows people to have extremely limited access to the Internet over mobiles for the first time since August 5, 2019. Broadband internet remains banned.
Arrest of journalist and cyberspace laws (Daily Times) A jobless journalist and social media activist from Lahore has fallen prey to the Prevention of Electronic Crimes Act (PECA), 2016, which
Make-believe major in Swedish army echoes con trick of Friedrich Voigt (The Irish Times) Security breach of fraud’s rise through military reminds of 1906 Köpenick shoemaker
Reputable police video displays phone-unlocking Cellebrite pc in motion (Herald Cloud) Telephone encryption within the context of legislation enforcement has at all times been a testy topic, and simply weeks in the past, tensions rose additional as Apple it appears refused to liberate an suspect’s iPhones. It seems that, the FBI has sought different choices, akin to era advanced by means of Israeli company Cellebrite, which …