Tech News

A hacker stole a $ 610 million cryptocurrency and returned most of it

[ad_1]

It was an A a great week for phone privacy, or at least in many ways external forces to make your location data more or less secure. On the downside of the book, most US 5G connections today are not full 5G, which means a kind of spy surveillance that he should be prevented by next-generation standards. On the plus side, researchers have come up with a way prevent your carrier from knowing when you are each time you reconnect to a cell tower. The hardest part is actually implementing any of them.

Proponents of her case have been working to make the actual transcript of this statement available online.

Our colleagues in the UK looked at how and where new research is showing extremists have created the store on platforms like Steam and Discord. Is one long stew problemThis makes it even more disappointing that these well-resourced services have not yet managed to cope.

Google has done it some changes to the Play Store, most are more important to developers than end users. But switching from a package of Android apps and a package of Android apps should make it harder for scammers to push from side-loaded apps related to malware.

Poly Network, a decentralized financial system, has been quite a roller coaster. A hacker stole more than $ 600 million earlier in the week, and began returning on Wednesday. By Thursday, they had returned $ 342 million in funds, and another $ 33 million Tether stablecoin was frozen. The remaining cryptographic assets have been placed in a wallet that requires the keys of Poly Network and the hacker; their final destiny is still in balance.

Virtual private networks they are nice in theory; your ISPs let you browse without knowing what you’re doing, and their encrypted connections make it harder for anyone to see your activity. A new Markup study shows that many VPNs still support followers from third-party sites, even if they don’t register your activity themselves. It’s a practice that undermines the entire privacy aspect of a VPN, as well as something we take for granted The best VPN recommendations.

In 2019, Apple sued a company called Corellium for its iOS virtualization software. Corellium’s products are well-known among security researchers Limited view of iOS itself; Apple claimed that the software violated the company’s copyright claims. The withdrawal comes at a time when Apple has caught fire over what privacy advocates have filed controversial steps to find child sexual abuse materials on iCloud iPhones are involved themselves. He needs all the friends in the security community he can get; an unusual lawsuit against a critical research tool would not be the way to do them.

In recent months, Microsoft has addressed a number of security issues related to the Windows Print Spooler feature, including more than one failed attempt to fix a vulnerability called PrintNightmare. This week, the company has finally offered a way to end printer-related problems, albeit with a little solution. Now, anyone who wants to use the Windows Point and Print function to install drivers will need administrative privileges. This should prevent most of PrintNighmare’s attacks, but it’s already proven not to stop them all.


More great KABEKO stories



[ad_2]

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button