U.S. soldiers uncovered nuclear secrets on digital flash cards
[ad_1]
Like the surrounding nations the world continues to seek access to encrypted communications, a Facebook-owned messaging platform WhatsApp denounced the Indian government this week to address new rules that require apps to be able to trace the “first creator” of messages. Creating that ability would hurt WhatsApp end-to-end encryption protectionsBillions more in the world could affect the privacy and security of more than 400 million users in India.
In other new geopolitical conflicts, Microsoft said this week that SolarWinds is also actively working with the same Russian spy group behind the pirate pirate. USAID phishing campaign that has jeopardized a massive email account. The activity is important, but is more likely to be a sign of a return to business rather than digital climbing.
Google researchers found the findings on Tuesday new risks for current memory chips To perform a physical-digital hacking technique known as Rowhammer. A new piece of wiper malware, probably made by Iranian hackers, has been targeting Israeli targets. And how researchers are studying it blurred and outdated satellite imagery Support platforms from platforms like Google Earth can make it harder and more expensive for teams to work in Israel and Palestine.
If you want to do digital spring cleaning for a long weekend, we’ve got you tips for avoiding app store scams. And this week the researchers have determined hackers built a fake movie playground from scratch to better capture the victims, with instant composite classic movies Dog Woof and Women’s Day.
And there is more! We collect weekly news that WIRED did not cover in depth. Click on the titles to read the full story and stay safe.
U.S. soldiers who handle nuclear weapons need to learn a lot of security procedures. But according to research by Bellingcat, some employees located in Europe are using flashcard applications to store all protocols in memory. Not only that, the details they have put on digital cards inadvertently reveal sensitive details about nuclear weapons in the US in Europe. The information also includes places where weapons such as information are stored at bases, patrol schedules, security camera locations, Identity Card attributes, and safe words that should be used if the guard threatens to warn others. Researchers at Bellingcat publicly searched for “terms related to nuclear weapons” to find the cards.
The Citizen tracking app for crowdsourced crimes has suspended plans to build and expand a private police plan this week piloting the idea In Los Angeles last month. In that test a Citizen-branded police car was deployed; only company employees could participate in the experiment and called the unit, a private Los Angeles Professional Security company, through the app. More broadly, they are because the app has sparked anxiety and paranoia and prompted users to take the law into their own hands. After talking to employees of the company and other sources and examining internal documents, Motherboard recounts several furious hunts that targeted the company’s employees at the innocent. “FIND THIS FUCK,” CEO Andrew Frame told Citizen’s slack one night. “LET’S GET IT ALL OVER NIGHT MIDNIGHT DOWN DOWN.”
The U.S. government has purchased Chinese surveillance equipment linked to human rights abuses against Muslims in Xinjiang (Uyghur) in at least 100 U.S. counties, cities and towns under contracts seen by TechCrunch. In some cases, the places have spent tens of thousands of dollars or more with Hikvision and Dahua vendors. Both companies have been on the U.S. federal blacklist since 2019, and Congress banned federal agencies from shopping with companies that sell products like security cameras and thermal imaging scanners. But these federal-level bans do not prevent municipalities from doing business with companies as long as they do not use federal funds in transactions.
The breach of the Japanese technology company Fujitsu allowed the attackers to endanger many Japanese business and government agencies through the popular Fujitsu information sharing portal ProjectWEB. The Japanese Ministry of Land, Infrastructure, Transportation and Tourism and the Japanese National Cybersecurity Center said on Wednesday that the attackers had leaked data, including proprietary information, putting ProjectWEB at risk. We still don’t know if the breach was the result of a platform vulnerability.
More great KABEKO stories
[ad_2]
Source link