How an Amazon Engineer Exposed Credentials UpGuard can now disclose that a repository hosted on GitHub with data from an Amazon Web Services engineer containing personal identity documents and system credentials including passwords, AWS key pairs, and private keys has been secured from public access. The data was committed to a public repository on the morning of 13 January, 2020. It… Read More
Rogue NYPD cops are using facial recognition app Clearview Rogue NYPD officers are using a sketchy facial-recognition software that it’s own facial recognition unit doesn’t want to touch because of concerns about security and potential for abuse, The Post has learned. Clearview AI, which has scraped millions of photos from social media and other public sources for its facial recognition program — earning a… Read More
WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation We reveal details on the most sophisticated browser locker campaign we’ve seen yet. Learn how this tech support scam fools users by hiding in plain sight. In the early days, practically all tech support scammers would get their own leads by doing some amateur SEO poisoning and keyword stuffing on YouTube and other social media… Read More
Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’s Phone Motherboard has obtained the report made by FTI Consulting into how Crown Prince Mohammad Bin Salman allegedly hacked Amazon CEO Jeff Bezos’s phone. A report investigating the potential hack of Jeff Bezos’ iPhone indicates that forensic investigators found a suspicious file but no evidence of any malware on the phone. It also says that investigators… Read More
Who Made the Spyware Used to Hack Jeff Bezos’ Phone? The United Nations is at odds with the world’s most notorious spyware company over an age-old question: Who built the tech that hacked Amazon CEO Jeff Bezos’s cell phone, allegedly by sending him a poisoned WhatsApp message from the Crown Prince of Saudi Arabia? Bezos has a conflicted relationship with the Saudi royal family. As… Read More
A timeline of events surrounding the Bezos phone hack Bezos hack connected to Khashoggi murder and the Washington Post’s subsequent media coverage. A timeline of events surrounding the Bezos phone hack Bezos hack connected to Khashoggi murder and the Washington Post’s subsequent media coverage. Source: zdnet… Read More
The Secretive Company That Might End Privacy as We Know It Until recently, Hoan Ton-That’s greatest hits included an obscure iPhone game and an app that let people put Donald Trump’s distinctive yellow hair on their own photos. Then Mr. Ton-That — an Australian techie and onetime model — did something momentous: He invented a tool that could end your ability to walk down the street… Read More
Google will now accept your iPhone as an authentication key Smart Lock for iOS uses the iPhone’s Secure Enclave Processor (SEP), which is built into every iOS device with Touch ID or Face ID. That’s the processor that handles data encryption on the device – a processor that oh, so many law enforcement and hacker types spend so much time complaining about… or, as the… Read More
Chinese police arrested the operator of unauthorized VPN service that made $1.6 million from his activity Chinese authorities continue operations against unauthorized VPN services that are very popular in the country. China continues to intensify the monitoring ofthe cyberspace applying and persecution of VPN services that could be used to bypass its censorship system known as theGreat Firewall. TheGreat Firewall projectalready blocked access to more hundreds of the world’s 1,000 top… Read More
Iran vs U.S., The Cyber Front Explained On January 3, the U.S. announced the successful assassination of Qasem Soleimani, Iran’s top general. Dire warnings about retaliation immediately appeared in the news, and it wasn’t long before we began to see headlines claiming that Iran had launched cyberattacks on the U.S. But were these really state actors or sophisticated actors, or or were… Read More