Hacker Stole $ 610 Million In Cryptocurrency And Returned Most Of It

It was a big week for smartphone privacy, or at least various ways in which external forces make your location data more or less secure. On the negative side of the ledger, most 5G connections in the United States today are not actually 5G full, which means they are sensitive to the kind of stingrays watch that the next-gen standard was supposed to prevent. On the positive side, the researchers found a way to prevent your operator from knowing where you are every time you reconnect to a cell tower. The tricky part is getting one of them to actually implement it.

Privacy advocates also released documents this week showing the NYPD had spent at least $ 159 million since 2007 to purchase surveillance tools, including stingrays, police software and biometric tools.

Our colleagues in the UK have looked at new research that shows how and where extremists have settled on platforms like Steam and Discord. It’s a long cooking problem, which makes it all the more frustrating that these well-endowed services have yet to cope with it.

Google did some changes on the Play Store, most of which matter more to developers than end users. But moving from an Android app package to a bundle of Android apps means it should be more difficult for crooks to pass malware-laden apps.

It has been quite a roller coaster for Poly Network, a decentralized financial system. A hacker stole more than $ 600 million earlier this week, to begin returning it on Wednesday. As of Thursday, they had returned $ 342 million of the funds, while an additional $ 33 million in Tether stablecoins had been frozen. The remaining crypto assets have been placed in a wallet that requires keys from Poly Network and the hacker; their ultimate fate still hangs in the balance.

Virtual private networks are nice in theory; they allow you to browse without your ISP knowing what you are doing, and their encrypted connections make it harder for anyone to spy on your activity. But a new Markup survey shows that many VPNs still allow third-party site trackers, even if they don’t log your activity themselves. It’s a practice that undermines the entire privacy aspect of a VPN – and also something we take into account in our best VPN recommendations.

In 2019, Apple sued a company called Corellium for its iOS virtualization software. Corellium’s products are popular among security researchers, who have limited preview on iOS itself; Apple claimed that the software violated the company’s copyright. The retirement comes at a time when Apple has faced criticism from privacy advocates for its introduction Controversial Steps to Find Child Sexual Abuse Material in iCloud this involves the iPhones themselves. He needs all the safe community friends he can have; an unpopular lawsuit against a critical research tool was not going to be the way to do them.

Over the past few months, Microsoft has addressed a plethora of security issues related to its Windows Print Spooler feature, including more than one unsuccessful attempt to patch a vulnerability called PrintNightmare. This week, the company finally came up with a way to end its printer-related issues, although that was a workaround. Now, anyone who wants to use Windows Point and Print to install drivers will need administrative privileges. This should prevent most PrintNighmare attacks, but it has already been demonstrated not to stop them all.

More great WIRED stories

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *