<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2305932839256034522</id><updated>2022-01-17T17:02:47.976-08:00</updated><category term="Tech News"/><category term="Cyber Attacks"/><category term="Vulnerabilities"/><category term="Ransomware"/><category term="Malware"/><category term="Tutorial"/><category term="Videos"/><title type='text'>Hackers Review - Get The Latest CyberSecurity News Headline Today</title><subtitle type='html'>Hackers Review is the most popular independent, trusted and leading source for the latest news headline on Cybersecurity,   ethical hacker,  computer security, cybercrime news, pen testing, data breaches,  hacking, infosec and professional information on cyber technology.&#xa;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://www.hackers-review.net/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>794</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-3062850802478166887</id><published>2021-09-30T03:19:00.003-07:00</published><updated>2021-09-30T03:19:26.939-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><title type='text'>Vulnerability in Apple Pay allows payment with locked iPhone</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEh0DIFX4OtuiX3HyyDbKdmwKIHToUsLRCFMjn-bzpbdgGqvkfEgT9j7ZBvuhuDQSTsVWYC_ChMXtQKhNooJjBGqk2tEzYFl21N28ahPFpvwXe7j9xoTRIxPEn-520573hkd4GB60jrUS17bVpt-OyMqTMm-l_OT4xWutV-t1Z4JQGmKAnvJLwFMFJy4PA=s968&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Vulnerability in Apple Pay allows payment with locked iPhone&quot; border=&quot;0&quot; data-original-height=&quot;645&quot; data-original-width=&quot;968&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEh0DIFX4OtuiX3HyyDbKdmwKIHToUsLRCFMjn-bzpbdgGqvkfEgT9j7ZBvuhuDQSTsVWYC_ChMXtQKhNooJjBGqk2tEzYFl21N28ahPFpvwXe7j9xoTRIxPEn-520573hkd4GB60jrUS17bVpt-OyMqTMm-l_OT4xWutV-t1Z4JQGmKAnvJLwFMFJy4PA=w640-h426&quot; title=&quot;Vulnerability in Apple Pay allows payment with locked iPhone&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;A vulnerability in Apple Pay with a linked Visa credit card makes it possible to make payments with a locked iPhone. An attacker therefore only needs to have a stolen iPhone to carry out transactions. However, the transactions can also be carried out via an iPhone in someone&#39;s bag, according to researchers from the University of Birmingham and the University of Surrey.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The &lt;a href=&quot;https://practical_emv.gitlab.io/&quot; target=&quot;_blank&quot;&gt;vulnerability &lt;/a&gt;occurs when &quot; &lt;a href=&quot;https://support.apple.com/en-us/HT209495&quot; target=&quot;_blank&quot;&gt;Express Transit &lt;/a&gt;&quot; is set up for a Visa credit card in the Apple Wallet. Express Transit is an option that allows users to make contactless payments without unlocking their phone or opening an app. There is also no authentication required such as Face ID, fingerprint or a pass code, just placing the device near a contactless reader is sufficient. For example, the option is used in public transport to allow travelers to pay for their journey at the entrance gates.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Using simple radio equipment, the researchers were able to identify a code that is emitted through access gates. This code unlocks Apple Pay so that the traveler can pay via their phone. However, the code can also be used to influence the signals between the iPhone and a store&#39;s card reader.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;By broadcasting the code and modifying other fields in the protocol used, the researchers tricked the iPhone into thinking it was communicating with a gateway, when in reality it was communicating with a store&#39;s card reader. At the same time, the researchers convinced the card reader that the iPhone had completed user authorization, allowing any amount to be withdrawn without the user&#39;s knowledge, the researchers said. They add that an attacker does not need cooperation from the store.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to the research team, the problem lies with both Apple and Visa, but neither party wants to take responsibility and roll out a solution, leaving users still vulnerable. The problem does not occur with Mastercard on iPhones or Visa in combination with Samsung Pay. Apple Pay with Visa users can verify that Transit Express is enabled and disable it if desired.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&quot;There&#39;s no reason for Apple Pay users to be at risk, but until Apple and Visa resolve this, they will,&quot; said study researcher Tom Chothia. In the video below, the researchers demonstrate how to make a payment of a thousand pounds via a locked iPhone.&lt;/p&gt;&lt;p&gt;watch POC from &lt;a href=&quot;https://practical_emv.gitlab.io/assets/apple_pay_visa.mp4&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/3062850802478166887'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/3062850802478166887'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/vulnerability-in-apple-pay-allows.html' title='Vulnerability in Apple Pay allows payment with locked iPhone'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEh0DIFX4OtuiX3HyyDbKdmwKIHToUsLRCFMjn-bzpbdgGqvkfEgT9j7ZBvuhuDQSTsVWYC_ChMXtQKhNooJjBGqk2tEzYFl21N28ahPFpvwXe7j9xoTRIxPEn-520573hkd4GB60jrUS17bVpt-OyMqTMm-l_OT4xWutV-t1Z4JQGmKAnvJLwFMFJy4PA=s72-w640-h426-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1514221017881380369</id><published>2021-09-28T05:40:00.002-07:00</published><updated>2021-09-28T05:40:14.880-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>German government starts research into Chinese smartphones</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-XcbvLy51X6Q/YVMNFvNKMVI/AAAAAAAAFRE/64FtE1wyZ7syv7mPI0BgvceyuTZb0eQSwCLcBGAsYHQ/s1200/chinese-smartphone-industry.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;German government starts research into Chinese smartphones&quot; border=&quot;0&quot; data-original-height=&quot;675&quot; data-original-width=&quot;1200&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-XcbvLy51X6Q/YVMNFvNKMVI/AAAAAAAAFRE/64FtE1wyZ7syv7mPI0BgvceyuTZb0eQSwCLcBGAsYHQ/w640-h360/chinese-smartphone-industry.jpg&quot; title=&quot;German government starts research into Chinese smartphones&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Following the lead of the Lithuanian government, the German government has launched an investigation into Chinese smartphones. Recently, Lithuania&#39;s National Cyber ​​Security Center warned about censorship software in Xiaomi&#39;s phones and identified several security vulnerabilities.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;It appears that the Mi Browser on the phones collects 61 different parameters about the use of the device. The device also has a content filter. For example, the phone periodically receives a list of banned words in Chinese, including about Tibet and Taiwan. However, the content filter is disabled in the phones the researchers analyzed in Lithuania.&lt;/p&gt;&lt;p&gt;Following the Lithuanian investigation, the Bundesamt für Sicherheit in der Informationstechnik (BSI), part of the German Ministry of the Interior, has launched its own investigation. Earlier, several German politicians had already called for such an investigation. A BSI spokesperson told the German &lt;a href=&quot;https://www.tagesschau.de/wirtschaft/verbraucher/xiaomi-huawei-sicherheitsluecken-china-smartphones-litauen-tibet-101.html&quot; target=&quot;_blank&quot;&gt;Tagesschau &lt;/a&gt;that phones from Xiaomi or other Chinese manufacturers are not used by the federal authorities.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Security.NL previously reported that the VVD has asked outgoing Minister Grapperhaus of Justice and Security to have the Telecom Agency or the National Cyber ​​Security Center conduct an investigation in the short term into the possible presence of censorship software on Xiaomi phones. The minister has not yet responded to the request.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1514221017881380369'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1514221017881380369'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/german-government-starts-research-into.html' title='German government starts research into Chinese smartphones'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-XcbvLy51X6Q/YVMNFvNKMVI/AAAAAAAAFRE/64FtE1wyZ7syv7mPI0BgvceyuTZb0eQSwCLcBGAsYHQ/s72-w640-h360-c/chinese-smartphone-industry.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-5569730226212541380</id><published>2021-09-24T06:47:00.003-07:00</published><updated>2021-09-24T06:49:49.160-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Chinese Central Bank Declares All Crypto Transactions Illegal</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-NO7ocJet_Rk/YU3W-FpeElI/AAAAAAAAFQk/7Jl0lop4ZY0WaOyeTUYRT2jWdsyftCqSwCLcBGAsYHQ/s976/_120680469_069119230.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Chinese Central Bank Declares All Crypto Transactions Illegal&quot; border=&quot;0&quot; data-original-height=&quot;549&quot; data-original-width=&quot;976&quot; src=&quot;https://1.bp.blogspot.com/-NO7ocJet_Rk/YU3W-FpeElI/AAAAAAAAFQk/7Jl0lop4ZY0WaOyeTUYRT2jWdsyftCqSwCLcBGAsYHQ/s16000/_120680469_069119230.jpg&quot; title=&quot;Chinese Central Bank Declares All Crypto Transactions Illegal&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The Chinese government today declared all financial transactions involving cryptocurrencies illegal and declared a national ban on crypto mining. Foreign crypto exchanges that offer services in China are also no longer allowed and are considered an illegal financial activity. In addition, investigations will be launched into employees of foreign crypto companies. Domestic crypto exchanges have been banned in China for years.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Furthermore, the Bank of China reiterated that financial institutions and non-banking institutions are not allowed to offer services and activities related to cryptocurrencies. The bank also claims that it has improved systems to monitor crypto-related transactions and prevent speculative investments.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The &lt;a href=&quot;http://www.pbc.gov.cn/goutongjiaoliu/113456/113469/4348521/index.html&quot; target=&quot;_blank&quot;&gt;announcement &lt;/a&gt;of the Chinese central bank caused a drop in bitcoin price. The bank also mentions bitcoin and ethereum by name and states that they are issued by &quot;non-monetary authorities&quot; and cannot be used as currencies in the market. The Chinese central bank previously tested its own digital currency, but it is not mentioned.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Furthermore, several &lt;a href=&quot;https://www.ndrc.gov.cn/xxgk/zcfb/tz/202109/t20210924_1297474.html?code=&amp;amp;state=123&quot; target=&quot;_blank&quot;&gt;Chinese government agencies&lt;/a&gt; have announced that they will tackle crypto mining in the country to meet climate goals, among other things. In addition, crypto mining would hardly contribute to China&#39;s economic growth and consume large amounts of energy. As part of the approach, the Chinese regime wants to cut off financial support and energy supplies for crypto mining.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/5569730226212541380'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/5569730226212541380'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/chinese-central-bank-declares-all.html' title='Chinese Central Bank Declares All Crypto Transactions Illegal'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-NO7ocJet_Rk/YU3W-FpeElI/AAAAAAAAFQk/7Jl0lop4ZY0WaOyeTUYRT2jWdsyftCqSwCLcBGAsYHQ/s72-c/_120680469_069119230.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-4886969975246908154</id><published>2021-09-22T09:10:00.003-07:00</published><updated>2021-09-22T09:10:00.186-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Nijmegen citizen who sold crypto telephones sentenced to 54 months in prison</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-iW9I63518Do/YUrzYmejgYI/AAAAAAAAFQM/DSK5GnqyREYlFqvGZm9PMYG3HN_TNNxlQCLcBGAsYHQ/s1024/Nijmegen-Beautiful-and-misty.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Nijmegen citizen who sold crypto telephones sentenced to 54 months in prison&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; src=&quot;https://1.bp.blogspot.com/-iW9I63518Do/YUrzYmejgYI/AAAAAAAAFQM/DSK5GnqyREYlFqvGZm9PMYG3HN_TNNxlQCLcBGAsYHQ/s16000/Nijmegen-Beautiful-and-misty.jpg&quot; title=&quot;Nijmegen citizen who sold crypto telephones sentenced to 54 months in prison&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;A 41-year-old man from Nijmegen who offered and traded crypto telephones for criminal use through his company Ennetcom has been sentenced today to 54 months in prison. According to the court, it is established that the man was targeting criminals with his company and that they actually used the crypto telephones supplied. There were about 40,000 smartphones supplied by Ennetcom in circulation worldwide.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;For example, users could request to have their phone wiped remotely if they were stopped by the police. Messages were also automatically deleted after 24 or 48 hours. It also appeared that the company was trying to find out the method of the Netherlands Forensic Institute (NFI) to &#39;crack&#39; telephones.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&quot;Apparently, the product development of the company was therefore aimed at staying ahead of the investigative authorities. Together, these factors mean that the company has developed a product that was attractive to criminals and also specifically intended for them,&quot; said the judge . A sample of the content of messages sent over the phones found that an average of about 75 percent was criminally related.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In addition, it was found that almost all of the users of the 800 email addresses identified at the time of the analysis were known in the police systems on the basis of long-term involvement in various forms of serious and organized crime. Furthermore, data of buyers was not recorded. Something that, according to the judge, was necessary when offering such a product.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In addition to the Nijmegen resident, a 36-year-old woman who, as an office manager, was responsible for accounting for the company was sentenced to a three-month suspended prison sentence and 180 hours of community service. The court finds it proven that she has issued false invoices for the company.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Operation&lt;/p&gt;&lt;p&gt;The operation against the company took place in April 2016 . During the investigation, the High Tech Crime Team of the police gained insight into the servers on which all data traffic was managed. These servers were taken down and copied. About 19,000 users of the cryptophones were automatically notified that the system had been copied by the police and under investigation.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The report further explained that the investigation focused on individuals suspected of serious crimes. For example, users who could invoke the right of nondisclosure could make this known. There was no response to this call, police said.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In the investigation into the 3.6 million encrypted messages found on the servers, the police collaborated with the NFI. The large amount of information could be searched using the forensic search engine Hansken. It involved a total of seven terabytes of data that was secured on Ennetcom&#39;s central server in Canada.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/4886969975246908154'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/4886969975246908154'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/nijmegen-citizen-who-sold-crypto.html' title='Nijmegen citizen who sold crypto telephones sentenced to 54 months in prison'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-iW9I63518Do/YUrzYmejgYI/AAAAAAAAFQM/DSK5GnqyREYlFqvGZm9PMYG3HN_TNNxlQCLcBGAsYHQ/s72-c/Nijmegen-Beautiful-and-misty.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1881239905638290257</id><published>2021-09-22T06:08:00.000-07:00</published><updated>2021-09-22T06:08:00.195-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ransomware"/><title type='text'>Ransomware attack on Marketron hits thousands of media companies</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-hq7FUjicMZY/YUryvOoLYcI/AAAAAAAAFQE/WZnXCG2_RH81kX96mv4UXyckCtUb-tVzQCLcBGAsYHQ/s605/17627.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Ransomware attack on Marketron hits thousands of media companies&quot; border=&quot;0&quot; data-original-height=&quot;300&quot; data-original-width=&quot;605&quot; src=&quot;https://1.bp.blogspot.com/-hq7FUjicMZY/YUryvOoLYcI/AAAAAAAAFQE/WZnXCG2_RH81kX96mv4UXyckCtUb-tVzQCLcBGAsYHQ/s16000/17627.png&quot; title=&quot;Ransomware attack on Marketron hits thousands of media companies&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;A ransomware attack on business software provider Marketron has hit thousands of media and broadcasters. Marketron provides advertising solutions that allow businesses to monetize their website visitors and traffic. Marketron claims to have 6,000 media and broadcasting companies worldwide as customers that use the company&#39;s services on a daily basis.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In the US market alone, these solutions would handle $5 billion in ad revenue from more than one million advertisers. In an email to customers, Marketron says that the victim is the BlackMatter ransomware group. These criminals are also behind the attack on the American agricultural cooperative New Cooperative .&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;All Marketron customers have been affected by the attack, CEO Jim Howard said in the email. At the time of writing, several Marketron products and services are offline, including the advertiser and traffic portal. The services for all customers who have their traffic managed by Marketron have also been affected, &lt;a href=&quot;https://www.marketron.com/status/&quot; target=&quot;_blank&quot;&gt;the status page shows&lt;/a&gt;. It is unknown when the services will be back online. Marketron says it is in the process of restoring the affected systems. How the attackers managed to gain access to the systems is unknown.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1881239905638290257'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1881239905638290257'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/ransomware-attack-on-marketron-hits.html' title='Ransomware attack on Marketron hits thousands of media companies'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-hq7FUjicMZY/YUryvOoLYcI/AAAAAAAAFQE/WZnXCG2_RH81kX96mv4UXyckCtUb-tVzQCLcBGAsYHQ/s72-c/17627.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-183079692403906660</id><published>2021-09-22T02:07:00.006-07:00</published><updated>2021-09-22T02:07:57.272-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>US takes sanctions against crypto exchange for facilitating ransomware groups</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-inrq2b4j4pQ/YUryQUIuuaI/AAAAAAAAFP8/6T3DmljkBqAXS8LY1lJ4-LEQQn5vlaRPQCLcBGAsYHQ/s1000/1000x563_s8iytw.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;US takes sanctions against crypto exchange for facilitating ransomware groups&quot; border=&quot;0&quot; data-original-height=&quot;563&quot; data-original-width=&quot;1000&quot; src=&quot;https://1.bp.blogspot.com/-inrq2b4j4pQ/YUryQUIuuaI/AAAAAAAAFP8/6T3DmljkBqAXS8LY1lJ4-LEQQn5vlaRPQCLcBGAsYHQ/s16000/1000x563_s8iytw.jpg&quot; title=&quot;US takes sanctions against crypto exchange for facilitating ransomware groups&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The US Treasury Department has sanctioned a crypto exchange for the first time for facilitating the transactions of ransomware groups. &lt;a href=&quot;https://home.treasury.gov/news/press-releases/jy0364&quot; target=&quot;_blank&quot;&gt;According to the ministry, &lt;/a&gt;an analysis of the transactions of crypto exchange Suex shows that at least eight ransomware groups have facilitated and that more than 40 percent of the transactions are associated with criminal parties.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;“Crypto-exchanges such as Suex play a vital role in the profitability of ransomware attacks, which finance other cybercriminal activities. The ministry will hold and disrupt these parties to remove the incentive for cybercriminals to carry out these attacks,” it said. ministry. The sanctions imposed will ban Americans from doing business with Suex and freeze all of the company&#39;s assets under US jurisdiction.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to &lt;a href=&quot;https://blog.chainalysis.com/reports/ofac-sanction-suex-september-2021&quot; target=&quot;_blank&quot;&gt;Chainanalysis&lt;/a&gt;, which was involved in the crypto exchange investigation, Suex has received more than $160 million from ransomware groups and other cybercriminals. The company is registered in the Czech Republic, but would not have a physical office there. Instead, it operates out of Russia and the Middle East, where it converts cryptocurrencies into physical money, according to Chainanalysis.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The US Treasury Department states that some crypto exchanges are an indispensable part of the ransomware ecosystem. As part of a government-wide approach to ransomware, these crypto exchanges are now also being looked at. The US authorities have indicated that they do not rule out sanctions against other crypto exchanges.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/183079692403906660'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/183079692403906660'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/us-takes-sanctions-against-crypto.html' title='US takes sanctions against crypto exchange for facilitating ransomware groups'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-inrq2b4j4pQ/YUryQUIuuaI/AAAAAAAAFP8/6T3DmljkBqAXS8LY1lJ4-LEQQn5vlaRPQCLcBGAsYHQ/s72-c/1000x563_s8iytw.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1590158420098630855</id><published>2021-09-21T08:35:00.000-07:00</published><updated>2021-09-21T08:35:00.207-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Firefox starts test among users with Bing as default search engine</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-leyyXBMFXoQ/YUnEBWQq71I/AAAAAAAAFPw/k7kaJCwt03IzJebIZQtuU0pdnAx28oDoQCLcBGAsYHQ/s1920/how-to-enable-picture-in-picture-in-firefox.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Firefox starts test among users with Bing as default search engine&quot; border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; src=&quot;https://1.bp.blogspot.com/-leyyXBMFXoQ/YUnEBWQq71I/AAAAAAAAFPw/k7kaJCwt03IzJebIZQtuU0pdnAx28oDoQCLcBGAsYHQ/s16000/how-to-enable-picture-in-picture-in-firefox.jpg&quot; title=&quot;Firefox starts test among users with Bing as default search engine&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Mozilla has launched a new test among Firefox users where it sets Bing as the default search engine. At the moment, Google is still the default search engine for most Firefox users. Mozilla has entered into an agreement with Google for this. This agreement was extended last year by the Firefox developer. Google would pay Mozilla an estimated amount of between 400 million and 450 million dollars per year for this.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;As part of the &lt;a href=&quot;https://support.mozilla.org/en-US/kb/forum-response-search-study&quot; target=&quot;_blank&quot;&gt;current experiment &lt;/a&gt;, one percent of Firefox users will set Microsoft Bing as their default search engine on their desktop. The experiment started at the beginning of this month and will probably be completed by the end of January next year, &lt;a href=&quot;https://blog.mozilla.org/sumo/2021/09/15/whats-up-with-sumo-september-2021/&quot; target=&quot;_blank&quot;&gt;Mozilla says&lt;/a&gt; on its website. The test was also announced on &lt;a href=&quot;https://twitter.com/firefox/status/1436346837162680333&quot; target=&quot;_blank&quot;&gt;Twitter &lt;/a&gt;, making it clear that &lt;a href=&quot;https://support.mozilla.org/en-US/kb/change-your-default-search-settings-firefox&quot; target=&quot;_blank&quot;&gt;users can also chang&lt;/a&gt;e the search engine setting themselves . Why Mozilla runs the test with Bing as the search engine is unknown.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1590158420098630855'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1590158420098630855'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/firefox-starts-test-among-users-with.html' title='Firefox starts test among users with Bing as default search engine'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-leyyXBMFXoQ/YUnEBWQq71I/AAAAAAAAFPw/k7kaJCwt03IzJebIZQtuU0pdnAx28oDoQCLcBGAsYHQ/s72-c/how-to-enable-picture-in-picture-in-firefox.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-6392391913660859219</id><published>2021-09-21T04:35:00.000-07:00</published><updated>2021-09-21T04:35:02.820-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Apple closes critical vulnerabilities in Bluetooth and Face ID in iOS</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-itqFqJRSXKM/YUnDSNpXYzI/AAAAAAAAFPo/g3mYOmpCga8X1QtREMFLmB7hux0lQUa1QCLcBGAsYHQ/s2048/IMG_1979-scaled.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Apple closes critical vulnerabilities in Bluetooth and Face ID in iOS&quot; border=&quot;0&quot; data-original-height=&quot;1366&quot; data-original-width=&quot;2048&quot; src=&quot;https://1.bp.blogspot.com/-itqFqJRSXKM/YUnDSNpXYzI/AAAAAAAAFPo/g3mYOmpCga8X1QtREMFLmB7hux0lQUa1QCLcBGAsYHQ/s16000/IMG_1979-scaled.jpeg&quot; title=&quot;Apple closes critical vulnerabilities in Bluetooth and Face ID in iOS&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Apple has released security updates for iOS and iPadOS that fix multiple critical vulnerabilities that could allow attackers to gain access to iPhones and iPads. The vulnerabilities are present in Bluetooth and Face ID, among other things.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Recently, Apple released &lt;a href=&quot;https://support.apple.com/en-us/HT212807&quot; target=&quot;_blank&quot;&gt;iOS 14.8 and iPadOS 14.8&lt;/a&gt; that fixed two actively attacked zero-day vulnerabilities in the operating systems. Now Apple says that these updates fix many more vulnerabilities than initially indicated. Something Apple does often. In addition to the two zero-day vulnerabilities mentioned above, eleven other vulnerabilities have been fixed.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;This includes a vulnerability in bluetooth referred to as CVE-2021-30820. This Bluetooth vulnerability allows an attacker to remotely execute arbitrary code on iPhones and iPads. However, further details are not provided by Apple. To the best of our knowledge, the vulnerability has not been exploited.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Furthermore, several vulnerabilities in the FontParser of iOS and iPadOS have been fixed. Processing a malicious font makes it possible for an attacker to execute arbitrary code. Furthermore, several vulnerabilities in WebKit, the Apple-developed browser engine that Safari and all other browsers on iOS use, have been fixed.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Due to the vulnerabilities, just visiting a malicious website is enough for an attacker to run arbitrary code on the system. No further user interaction is required. This is also known as a drive-by download attack.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;IOS on iPadOS 15&lt;/h3&gt;&lt;p&gt;In addition to the additional information about iOS and iPadOS 14.8, Apple has also rolled out iOS and iPadOS 15 . These releases fix several vulnerabilities not listed in iOS and iPadOS 14.8. This includes a vulnerability in Face ID that allows an attacker with a 3D model to bypass the facial scan of iPhones and iPads to gain access to the device. No further details about the leak are provided by Apple, other than Face ID&#39;s anti-spoofing models have been improved.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Furthermore, it was possible for a local attacker with access to a locked device to view contact details via Siri. A vulnerability in the Wi-Fi functionality of iPhones and iPads made it possible for an attacker close to a user to connect them to a malicious Wi-Fi network during device setup. The updates for iOS and iPadOS are available through iTunes and the Software Update feature.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/6392391913660859219'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/6392391913660859219'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/apple-closes-critical-vulnerabilities.html' title='Apple closes critical vulnerabilities in Bluetooth and Face ID in iOS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-itqFqJRSXKM/YUnDSNpXYzI/AAAAAAAAFPo/g3mYOmpCga8X1QtREMFLmB7hux0lQUa1QCLcBGAsYHQ/s72-c/IMG_1979-scaled.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1617816296557153514</id><published>2021-09-19T01:27:00.002-07:00</published><updated>2021-09-19T01:27:08.690-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>EFF: WhatsApp must make end-to-end encrypted backups by default</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-2fyeYKoA320/YTxkO2JyuUI/AAAAAAAAFMw/GMN30OUGIicAGdiRV41N3uXZsSNkU5rIQCPcBGAYYCw/s640/whatsapp.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;320&quot; data-original-width=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-2fyeYKoA320/YTxkO2JyuUI/AAAAAAAAFMw/GMN30OUGIicAGdiRV41N3uXZsSNkU5rIQCPcBGAYYCw/s16000/whatsapp.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;WhatsApp recently announced the arrival of end-to-end encrypted backups, but if it is up to the American civil rights movement &lt;a href=&quot;https://www.eff.org/deeplinks/2021/09/whats-whatsapp-encrypted-backups&quot; target=&quot;_blank&quot;&gt;EFF&lt;/a&gt;, this will become standard for all users. Currently, users can store backups of their chat history in Google Drive and Apple iCloud, but this data is not end-to-end encrypted, allowing the cloud provider to access it.&lt;p&gt;&lt;/p&gt;&lt;p&gt;The EFF, therefore, advises WhatsApp users not to store backups in the cloud and to discourage this from friends. However, this changes with end-to-end encrypted backups, as Apple and Google will no longer be able to access the contents of WhatsApp backups. However, this is optional and the EFF thinks WhatsApp should make it the default for all users.&lt;/p&gt;&lt;p&gt;In addition, the civil rights movement is using the announcement to sneer at Apple. &quot;This privacy win by WhatsApp, owned by Facebook, is in stark contract with Apple, which is under fire for plans to scan photos minors send via iMessage, as well as any photo Apple users upload to iCloud,&quot; the EFF said. The organization adds that iCloud backups are also not end-to-end encrypted. &quot;WhatsApp raises the bar and Apple and others should follow suit.&quot;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1617816296557153514'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1617816296557153514'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/eff-whatsapp-must-make-end-to-end.html' title='EFF: WhatsApp must make end-to-end encrypted backups by default'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-2fyeYKoA320/YTxkO2JyuUI/AAAAAAAAFMw/GMN30OUGIicAGdiRV41N3uXZsSNkU5rIQCPcBGAYYCw/s72-c/whatsapp.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1069746928458375431</id><published>2021-09-17T04:22:00.002-07:00</published><updated>2021-09-17T04:22:00.187-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>A tool for testing the hardware security of Apple mobile processors has been developed</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-B8AvKegCIsU/YURejnNeFUI/AAAAAAAAFPI/8i9LEPonNOAbD_WjVZs7f7BkfVYIK8rAwCLcBGAsYHQ/s600/appl.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;401&quot; data-original-width=&quot;600&quot; src=&quot;https://1.bp.blogspot.com/-B8AvKegCIsU/YURejnNeFUI/AAAAAAAAFPI/8i9LEPonNOAbD_WjVZs7f7BkfVYIK8rAwCLcBGAsYHQ/s16000/appl.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;A team of researchers from North Carolina State University created a tool to study vulnerabilities in Apple mobile processors and used the results to test a CPU cache fetch attack.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Using an exploit known as checkm8 as a starting point, the researchers implemented a BootROM tool to test the Apple A10 Fusion-on-a-chip (SoC) system, and then developed a new CPU cache pull attack based on the Prime + Probe method.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The checkm8 exploit works on most iPhone models (from iPhone 5 to iPhone X), but researchers focused on the iPhone 7, which was Apple&#39;s most ubiquitous mobile device on the market in 2019 when the study began.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The new tool, dubbed openc8, has new extensions to ensure its reliability for extensive hardware safety research. The open source tool includes downloading a handler shell to a device that supports installing and executing the payloads.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Openc8 includes build and boot support on pongoOS (the open source version of the checkra1n toolkit), which introduces updated drivers for iPhone hardware. Scientists also used the Sandcastle project for their research, as it supports pongoOS modules and a patched Linux kernel that can be loaded on the iPhone 7.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The developed attack, dubbed iTimed, involves the synchronous launch of AES encryption using known plaintexts. It is also assumed that the attacker and the victim are in the same core, and the virtual address of the t-tables is known. According to the researchers, the new attack method could easily outperform classical methods when it comes to recovering key material, as only half of the typical amount of side-channel traces is required.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Scientists told Apple about their findings in July last year. The iTimed toolkit is available on GitHub.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1069746928458375431'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1069746928458375431'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/a-tool-for-testing-hardware-security-of.html' title='A tool for testing the hardware security of Apple mobile processors has been developed'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-B8AvKegCIsU/YURejnNeFUI/AAAAAAAAFPI/8i9LEPonNOAbD_WjVZs7f7BkfVYIK8rAwCLcBGAsYHQ/s72-c/appl.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-4925179413020505450</id><published>2021-09-17T02:17:00.004-07:00</published><updated>2021-09-17T02:24:32.489-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>12 years in prison for man who bribed AT&amp;T employees to install malware</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-d42OpvR_jVo/YURdD4PtadI/AAAAAAAAFPA/1Bj4kEw1YXcEDFR0SpUT4-uq4DuHgJsRACLcBGAsYHQ/s600/Pakistani-sentenced-to-12-years-in-prison-for-bribing-ATT.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;12 years in prison for man who bribed AT&amp;amp;T employees to install malware&quot; border=&quot;0&quot; data-original-height=&quot;337&quot; data-original-width=&quot;600&quot; src=&quot;https://1.bp.blogspot.com/-d42OpvR_jVo/YURdD4PtadI/AAAAAAAAFPA/1Bj4kEw1YXcEDFR0SpUT4-uq4DuHgJsRACLcBGAsYHQ/s16000/Pakistani-sentenced-to-12-years-in-prison-for-bribing-ATT.jpg&quot; title=&quot;12 years in prison for man who bribed AT&amp;amp;T employees to install malware&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;A Pakistani man who managed to remove the SIM locks from nearly two million telephones for seven years, including through malware on systems of telecom provider AT&amp;amp;T, has been sentenced in the United States to twelve years in prison.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The man started his practice in 2012 by recruiting AT&amp;amp;T employees at a call center in Washington. He had them remove the SIM locks from a large number of telephones. The phones could thus be resold and used by other telecom providers, which the Pakistani man earned.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In 2013, AT&amp;amp;T implemented a new system that made it more difficult for bribed employees to remove the SIM locks. The Pakistani man then had a software developer develop malware that could be installed on AT&amp;amp;T systems and that would allow him to remotely remove the SIM locks from phones more effectively and in greater numbers.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;To develop this malware, the man had bribed AT&amp;amp;T employees install other malware on the telecom provider&#39;s systems, collecting information that the software developer used to develop its malware. An AT&amp;amp;T investigation found that the Pakistani man and his accomplices unlocked more than 1.9 million phones over seven years. As a result, the telecom provider would have lost more than $ 201 million in revenue because customers no longer paid the remaining amount for their phone.&lt;/p&gt;&lt;p&gt;AT&amp;amp;T offers customers plans that include telephone. By removing the SIM lock, the phone can also be used on other telecom networks and the owner no longer has to pay AT&amp;amp;T for the purchase of the phone, according to the US Department of Justice. The judge also ordered the man to pay AT&amp;amp;T $200 million in damages.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/4925179413020505450'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/4925179413020505450'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/12-years-in-prison-for-man-who-bribed.html' title='12 years in prison for man who bribed AT&amp;T employees to install malware'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-d42OpvR_jVo/YURdD4PtadI/AAAAAAAAFPA/1Bj4kEw1YXcEDFR0SpUT4-uq4DuHgJsRACLcBGAsYHQ/s72-c/Pakistani-sentenced-to-12-years-in-prison-for-bribing-ATT.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-41965891253162482</id><published>2021-09-15T12:52:00.001-07:00</published><updated>2021-09-15T12:52:00.223-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Facebook has secretly created a system that exempts VIP users of the social network from its key rules </title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/--aTni2bxkEc/YUGmi9YC5OI/AAAAAAAAFOo/I8RYJvX77SIJsOQhZp8hRPJo8joCTzJegCLcBGAsYHQ/s700/fb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Facebook has secretly created a system that exempts VIP users of the social network from its key rules&quot; border=&quot;0&quot; data-original-height=&quot;394&quot; data-original-width=&quot;700&quot; height=&quot;417&quot; src=&quot;https://1.bp.blogspot.com/--aTni2bxkEc/YUGmi9YC5OI/AAAAAAAAFOo/I8RYJvX77SIJsOQhZp8hRPJo8joCTzJegCLcBGAsYHQ/w741-h417/fb.jpg&quot; title=&quot;Facebook has secretly created a system that exempts VIP users of the social network from its key rules&quot; width=&quot;741&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Although the founder of the social network, Mark Zuckerberg, has publicly stated that Facebook does not distinguish political, cultural and journalistic elites among its three billion users and that its standards are the same for everyone, this is simply not the case, writes WSJ.&lt;p&gt;&lt;/p&gt;&lt;p&gt;As the publication specifies, the control of the records of such users is carried out by a special program known as &quot;cross-checking&quot; or XCheck. Some users are directly whitelisted and completely exempt from Facebook sanctions (for example, from being banned), while others are allowed to immediately publish content that violates the rules, subject to further approval by Facebook employees.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Users monitored by this program, without any sanctions, published posts with statements about the lethality of the coronavirus vaccine, about Hillary Clinton&#39;s connection with a secret organization of pedophiles and quoted Donald Trump, who called &quot;animals&quot; seeking asylum in the United States.&lt;/p&gt;&lt;p&gt;The documents show that there were at least 5.8 million accounts in XCheck in 2020. The internal guidelines on the acceptability of cross-validation set out criteria for whitelisting, including &quot;decent press coverage&quot; and &quot;influence or popularity&quot;. The program reaches out to virtually everyone who appears regularly in the media or has a significant online following, including movie stars, talk show hosts, academics, and high-follower bloggers.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The WSJ explains how Internet scandals involving famous personalities have occurred with the help of Facebook &quot;exceptions&quot;. So, in 2019, footballer Neymar posted nude photos of a woman who accused him of rape. The post was viewed by tens of millions of users before it was deleted by Facebook. Other whitelisted accounts have repeatedly posted inflammatory claims that Facebook&#39;s verification services have already been deemed fake, including the deadly harm of Covid-19 vaccines and a &quot;pedophile conspiracy&quot; involving Hillary Clinton.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Facebook contacted some of the VIPs who violated the platform&#39;s policy and gave them a 24-hour “self-fix” window to remove content that violates the rules on their own, the newspaper writes.&lt;/p&gt;&lt;p&gt;The WSJ found out that this type of verification was introduced in order to improve the reputation, since there had been a number of incidents with illegal blocking of accounts of famous personalities in the past.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/41965891253162482'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/41965891253162482'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/facebook-has-secretly-created-system.html' title='Facebook has secretly created a system that exempts VIP users of the social network from its key rules '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/--aTni2bxkEc/YUGmi9YC5OI/AAAAAAAAFOo/I8RYJvX77SIJsOQhZp8hRPJo8joCTzJegCLcBGAsYHQ/s72-w741-h417-c/fb.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-3888487107907487441</id><published>2021-09-15T08:48:00.001-07:00</published><updated>2021-09-15T08:48:00.209-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Xiaomi has removed restrictions on the operation of all smartphones that have been blocked in a number of countries and regions</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-BqmHh5MiKyk/YUGlwkFN8bI/AAAAAAAAFOg/UxJsWZuPdbM3ZaZf2vCe2zYwYdfmUu2XgCLcBGAsYHQ/s1024/mi.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Xiaomi has removed restrictions on the operation of all smartphones that have been blocked in a number of countries and regions&quot; border=&quot;0&quot; data-original-height=&quot;576&quot; data-original-width=&quot;1024&quot; src=&quot;https://1.bp.blogspot.com/-BqmHh5MiKyk/YUGlwkFN8bI/AAAAAAAAFOg/UxJsWZuPdbM3ZaZf2vCe2zYwYdfmUu2XgCLcBGAsYHQ/s16000/mi.jpg&quot; title=&quot;Xiaomi has removed restrictions on the operation of all smartphones that have been blocked in a number of countries and regions&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Xiaomi said that blocking phones in countries and territories that are under sanctions was a “temporary measure” to combat device smuggling. A company spokesman &lt;a href=&quot;https://www.globaltimes.cn/page/202109/1234058.shtml&quot; target=&quot;_blank&quot;&gt;told the Global Times&lt;/a&gt;.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Some devices activated in regions where the Chinese manufacturer does not officially supply them, for example, in Cuba or Crimea, were previously blocked.&lt;/p&gt;&lt;p&gt;Xiaomi explained that they blocked some smartphones as part of the investigation of smuggling operations, but now all these devices can be used again without hindrance. The company does not officially supply gadgets to a number of regions such as Crimea, Cuba, North Korea or Sudan.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The countries and regions included in the list are subject to US export sanctions. After being blocked, the user was informed that it was Xiaomi&#39;s policy not to authorize the sale of the product or its provision in the territory in which it was attempted to be activated.&lt;/p&gt;&lt;p&gt;Earlier we reported that Xiaomi users are faced with more frequent cases of blocking their devices in Cuba, Iran, Syria, North Korea, Sudan, as well as Crimea. Cuban media have confirmed these reports. At the same time, the Russian representative office of Xiaomi, as well as Rospotrebnadzor, informed that they had not received complaints in connection with such cases.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/3888487107907487441'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/3888487107907487441'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/xiaomi-has-removed-restrictions-on.html' title='Xiaomi has removed restrictions on the operation of all smartphones that have been blocked in a number of countries and regions'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-BqmHh5MiKyk/YUGlwkFN8bI/AAAAAAAAFOg/UxJsWZuPdbM3ZaZf2vCe2zYwYdfmUu2XgCLcBGAsYHQ/s72-c/mi.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-6939501057564162538</id><published>2021-09-15T06:46:00.006-07:00</published><updated>2021-09-15T06:46:00.226-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><title type='text'>46% of connected databases contain dangerous vulnerabilities</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-NnQY3l0ET8o/YUGlMEM2TyI/AAAAAAAAFOY/Xvj9phqD3j8GGtv884FvqxUpV5yr0hkMACLcBGAsYHQ/s600/vul.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;46% of connected databases contain dangerous vulnerabilities&quot; border=&quot;0&quot; data-original-height=&quot;409&quot; data-original-width=&quot;600&quot; height=&quot;459&quot; src=&quot;https://1.bp.blogspot.com/-NnQY3l0ET8o/YUGlMEM2TyI/AAAAAAAAFOY/Xvj9phqD3j8GGtv884FvqxUpV5yr0hkMACLcBGAsYHQ/w673-h459/vul.jpg&quot; title=&quot;46% of connected databases contain dangerous vulnerabilities&quot; width=&quot;673&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Researchers in the field of cybersecurity from Imperva &lt;a href=&quot;https://www.imperva.com/blog/data-security-is-broken-whats-next/&quot; target=&quot;_blank&quot;&gt;analyzed &lt;/a&gt;27 thousand databases and reported that about 12 thousand of them (46%) contain dangerous and critical vulnerabilities.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;“Too often, organizations overlook database security because they rely on their own security practices or on local databases to store sensitive information,” the experts explained.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to the study, 61% of scanned databases in the UK contained at least one vulnerability, while on average there were 37 vulnerabilities per database. According to experts, many organizations do not prioritize the security of their data and neglect &quot;routine&quot; patching. Some CVEs go unnoticed for three or more years.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Brazil showed the best results in the study - only 19 percent of databases contain one or more vulnerabilities, and an average of 14 problems for each scanned database. In the United States, 37% of databases contain vulnerabilities, with an average of 25 problems per database.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Regional analysis revealed significant differences between countries, with some countries having a much larger number of vulnerable databases, such as France (84%), Australia (65%) and Singapore (64%). In Germany and Mexico, a relatively small number of vulnerable databases were found (19% in each country), but the average number of vulnerabilities was much higher (64 and 70, respectively).&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/6939501057564162538'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/6939501057564162538'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/46-of-connected-databases-contain.html' title='46% of connected databases contain dangerous vulnerabilities'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-NnQY3l0ET8o/YUGlMEM2TyI/AAAAAAAAFOY/Xvj9phqD3j8GGtv884FvqxUpV5yr0hkMACLcBGAsYHQ/s72-w673-h459-c/vul.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-221401654334605510</id><published>2021-09-15T02:46:00.000-07:00</published><updated>2021-09-15T02:46:00.164-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Fake Press Release Leads to 35% Increase in Litecoin Value </title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-NUfKIsYA6bU/YUGksQsgNqI/AAAAAAAAFOQ/QXSpzW2RNhIKnOcSSuH5gJ2d34FeLzWBgCLcBGAsYHQ/s1000/ltc.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Fake Press Release Leads to 35% Increase in Litecoin Value&quot; border=&quot;0&quot; data-original-height=&quot;667&quot; data-original-width=&quot;1000&quot; src=&quot;https://1.bp.blogspot.com/-NUfKIsYA6bU/YUGksQsgNqI/AAAAAAAAFOQ/QXSpzW2RNhIKnOcSSuH5gJ2d34FeLzWBgCLcBGAsYHQ/s16000/ltc.jpg&quot; title=&quot;Fake Press Release Leads to 35% Increase in Litecoin Value&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Walmart said a false press release was issued on its behalf on GlobeNewswire, which immediately spread to news outlets. After that, the cost of Litecoin skyrocketed by 35%. This spike occurred in less than 15 minutes. Soon after, it dropped again to $ 175 in a matter of minutes.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;“We had no idea about the press release published by GlobeNewswire. It contains absolutely false information, ”a company spokesman told Reuters.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;GlobeNewswire representatives clarified that a fraudulent account was used to publish the release. “We haven&#39;t had anything like this before. We have taken measures to strengthen the verification of sources so that this does not happen again, ”they said.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The Litecoin Foundation tweeted that it has no information on where the controversial press release came from.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The foundation is a non-profit organization that promotes the aforementioned token and is run by litecoin creator Charlie Lee, who told Reuters that he is conducting its own investigation, but so far without much success.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/221401654334605510'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/221401654334605510'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/fake-press-release-leads-to-35-increase.html' title='Fake Press Release Leads to 35% Increase in Litecoin Value '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-NUfKIsYA6bU/YUGksQsgNqI/AAAAAAAAFOQ/QXSpzW2RNhIKnOcSSuH5gJ2d34FeLzWBgCLcBGAsYHQ/s72-c/ltc.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-5926021979647034878</id><published>2021-09-15T00:41:00.005-07:00</published><updated>2021-09-15T00:42:25.195-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><title type='text'>Google actively fixes attacked zero-day leaks in Chrome</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-owrQHE6lwn4/YUGjpa_ABpI/AAAAAAAAFOI/-x9y-g7g7WgM3FNiu0krOQ0MaecRwTMOACLcBGAsYHQ/s1600/Google-fixes-exploited-zero-day-Chrome-dropped-on-Twitter-last-week.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Google actively fixes attacked zero-day leaks in Chrome&quot; border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;1600&quot; src=&quot;https://1.bp.blogspot.com/-owrQHE6lwn4/YUGjpa_ABpI/AAAAAAAAFOI/-x9y-g7g7WgM3FNiu0krOQ0MaecRwTMOACLcBGAsYHQ/s16000/Google-fixes-exploited-zero-day-Chrome-dropped-on-Twitter-last-week.jpg&quot; title=&quot;Google actively fixes attacked zero-day leaks in Chrome&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Google Chrome users have been warned about two zero-day browser vulnerabilities that have been actively used in attacks. Google has since released security updates to fix the vulnerabilities. This brings the total number of zero-day leaks resolved this year to ten.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The vulnerabilities, designated CVE-2021-30632 and CVE-2021-30633, are present in V8 and the Indexed DB API. V8 is the JavaScript engine that Chrome and other browsers use to run JavaScript. Indexed DB is a programming interface for storing data within the browser. The impact of both vulnerabilities has been rated &quot;high&quot;.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;This concerns vulnerabilities that allow an attacker to execute code within the context of the browser. It is then possible, for example, to read or adjust data from other websites. Vulnerabilities to escape from the Chrome sandbox are also included. The vulnerability in itself is not sufficient to take over a system. This would require a second vulnerability, for example in the underlying operating system.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Details about the observed attacks, such as the number of victims, when the attacks took place and how, were not provided by Google. The tech company was briefed on the vulnerabilities on September 8 by an anonymous security researcher.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Users are advised to update to &lt;a href=&quot;https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html&quot; target=&quot;_blank&quot;&gt;Google Chrome 93.0.4577.82&lt;/a&gt; , which is available for Linux, macOS, and Windows. This will happen automatically on most systems. Microsoft Edge Chromium, like Chrome, is based on the Chromium browser. It is expected that Microsoft will soon come up with an update for its own browser.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Below is an overview of the ten zero-day leaks in Google Chrome and when they were fixed. It was recently revealed that Google has registered a record number of zero days this year .&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;CVE-2021-21148 - 4 february&lt;/li&gt;&lt;li&gt;CVE-2021-21166 - March 2&lt;/li&gt;&lt;li&gt;CVE-2021-21193 - March 12&lt;/li&gt;&lt;li&gt;CVE-2021-21220 - 13 april&lt;/li&gt;&lt;li&gt;CVE-2021-21224 - 20 april&lt;/li&gt;&lt;li&gt;CVE-2021-30551 - 9 juny&lt;/li&gt;&lt;li&gt;CVE-2021-30554 - 17 juny&lt;/li&gt;&lt;li&gt;CVE-2021-30632 - 13 sept&lt;/li&gt;&lt;li&gt;CVE-2021-30633 - 13 sept&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/5926021979647034878'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/5926021979647034878'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/google-actively-fixes-attacked-zero-day.html' title='Google actively fixes attacked zero-day leaks in Chrome'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-owrQHE6lwn4/YUGjpa_ABpI/AAAAAAAAFOI/-x9y-g7g7WgM3FNiu0krOQ0MaecRwTMOACLcBGAsYHQ/s72-c/Google-fixes-exploited-zero-day-Chrome-dropped-on-Twitter-last-week.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-9071760260366378564</id><published>2021-09-13T07:56:00.001-07:00</published><updated>2021-09-13T07:56:00.184-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Scientists have learned to look through walls with a laser</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-DWpeAuVVDmM/YT8SmJy9vJI/AAAAAAAAFNk/UcwXnDqkLxoEQW2x1UIPKdmuBcsECwE4wCLcBGAsYHQ/s640/door.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Scientists have learned to look through walls with a laser&quot; border=&quot;0&quot; data-original-height=&quot;353&quot; data-original-width=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-DWpeAuVVDmM/YT8SmJy9vJI/AAAAAAAAFNk/UcwXnDqkLxoEQW2x1UIPKdmuBcsECwE4wCLcBGAsYHQ/s16000/door.jpg&quot; title=&quot;Scientists have learned to look through walls with a laser&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;It is impossible to see with the naked eye what is happening around the corner of the house, but with the help of modern technology, almost nothing is impossible. Technologies that ensure the visibility of objects that are out of sight (the so-called non-line-of-sight or NLOS) are of great interest to manufacturers of unmanned vehicles, because with their help the car will be able to &quot;see&quot; what is happening around the corner, before how will turn.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;A team of researchers at Stanford University&#39;s Computational Imaging Lab has taken a big step forward in NLOS technology - finding a way to see through walls using a laser and a keyhole.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Currently, NLOS systems are not widely used, but in the future they can be used by rescue services to identify people after disasters, as well as in medicine to obtain improved images of internal organs of patients. The NLOS concept has proven its worth more than once, but current technologies are too slow to be effective enough.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In the past, experiments with NLOS have only been done on flat, reflective surfaces. The researchers exposed these surfaces to pulsed light beams (usually laser), captured the reflected beams, and analyzed what was behind the flat surface.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The Stanford University study does not solve the problem of speed, but it works under more varied conditions. The researchers simply shone a laser beam through the keyhole at a point on the wall. The photons from this beam scattered, &quot;jumping&quot; around the room and all the objects in it. After a while, a small number of photons returned through the keyhole, but they were not enough to determine what was in the room.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The experiment found that moving objects changed the pulsation of laser beams so that researchers could obtain enough data that, after being processed using artificial intelligence algorithms, gave a satisfactory idea of ​​the objects in the room.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-3Xl8qK4EWaQ/YT8SsW7bfcI/AAAAAAAAFNo/uKfJA8Y4-68wdRY7lHcHkjA6MJbMMAOnACLcBGAsYHQ/s640/word.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;262&quot; data-original-width=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-3Xl8qK4EWaQ/YT8SsW7bfcI/AAAAAAAAFNo/uKfJA8Y4-68wdRY7lHcHkjA6MJbMMAOnACLcBGAsYHQ/s16000/word.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/9071760260366378564'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/9071760260366378564'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/scientists-have-learned-to-look-through.html' title='Scientists have learned to look through walls with a laser'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-DWpeAuVVDmM/YT8SmJy9vJI/AAAAAAAAFNk/UcwXnDqkLxoEQW2x1UIPKdmuBcsECwE4wCLcBGAsYHQ/s72-c/door.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-4951495184979033624</id><published>2021-09-13T03:54:00.004-07:00</published><updated>2021-09-13T03:54:00.213-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ransomware"/><title type='text'>The REvil group has returned</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-RN0kf52yuko/YT8SDoX46vI/AAAAAAAAFNc/kQUx5DC-JV06MMeSdTlvZb_d58uvr8P5ACLcBGAsYHQ/s640/revil.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The REvil group has returned&quot; border=&quot;0&quot; data-original-height=&quot;451&quot; data-original-width=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-RN0kf52yuko/YT8SDoX46vI/AAAAAAAAFNc/kQUx5DC-JV06MMeSdTlvZb_d58uvr8P5ACLcBGAsYHQ/s16000/revil.png&quot; title=&quot;The REvil group has returned&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The ransomware group REvil, which disappeared from sight a few months ago, has returned to activity and is attacking companies again. The first signs of activity groups appeared on last week, when the portal REvil in darknet again earned .&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;REvil entered the ransomware scene in 2019 and became widely known for attacks on a number of large companies, including JBS and Kaseya, from which they demanded multimillion-dollar ransoms to recover encrypted data.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The group turned off its web infrastructure after a massive attack on the American company Kaseya, which affected thousands of enterprises in several countries around the world. The ransomware demanded $ 50 million from the company for a universal decryptor. In late July, Kaseya announced that it had received the decryption key from a &quot;third party&quot;.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;For almost two months, nothing was heard about the group, but on September 7, the payment site and the site of leaks REvil returned online with the same list of victims, and on September 9, a new version of the REvil ransomware was uploaded to VirusTotal, compiled on September 4.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to a message on one of the hacker forums, the group has a new public representative instead of the administrator of REvil, who uses the pseudonym Unknown (or UNKN). According to a new spokesman known as REvil, the group has temporarily ceased operations due to suspicions that Unknown has been arrested and the servers have been compromised. He also said that the universal decryptor obtained by Kaseya simply &quot;leaked&quot; due to an error during key generation, and not after a law enforcement operation, as previously thought.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/4951495184979033624'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/4951495184979033624'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/the-revil-group-has-returned.html' title='The REvil group has returned'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-RN0kf52yuko/YT8SDoX46vI/AAAAAAAAFNc/kQUx5DC-JV06MMeSdTlvZb_d58uvr8P5ACLcBGAsYHQ/s72-c/revil.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-2107466690141600674</id><published>2021-09-13T01:54:00.001-07:00</published><updated>2021-09-13T01:56:08.184-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Epic Games vs. Apple Sentenced </title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-4SYYu8irDaI/YT8Rm09DnQI/AAAAAAAAFNU/8onuo-NWetQMw65kmFWuNO5QvPNc6sjdwCLcBGAsYHQ/s1160/iron.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Epic Games vs. Apple Sentenced&quot; border=&quot;0&quot; data-original-height=&quot;773&quot; data-original-width=&quot;1160&quot; src=&quot;https://1.bp.blogspot.com/-4SYYu8irDaI/YT8Rm09DnQI/AAAAAAAAFNU/8onuo-NWetQMw65kmFWuNO5QvPNc6sjdwCLcBGAsYHQ/s16000/iron.jpg&quot; title=&quot;Epic Games vs. Apple Sentenced&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;On Friday, September 10, a California court ruled that the company can no longer prevent developers from posting &quot;buttons, external links&quot; to third-party payment services in the App Store. The court issued a permanent injunction. It will come into effect in December.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The decision was made by US Federal Judge Yvonne Gonzalez Rogers during a lawsuit between Apple and the developer of the popular game Fortnite - Epic Games. At the same time, Apple won 9 out of 10 points in the claim that Epic Games brought against it. The latter wanted through the courts to get permission to bypass Apple&#39;s payment system with its 30% commission for users of the game Fortnite. Epic Games also demanded that Apple be recognized as a monopoly, which could have dire consequences for the company.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The court refused to recognize Apple as a monopoly and dismissed all other Epic claims.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The New York Times calls the decision a serious blow and loss for Apple: the lost commission will affect the profits of the Californian company and can turn the online market worth $ 100 billion. come to an end.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/2107466690141600674'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/2107466690141600674'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/epic-games-vs-apple-sentenced.html' title='Epic Games vs. Apple Sentenced '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-4SYYu8irDaI/YT8Rm09DnQI/AAAAAAAAFNU/8onuo-NWetQMw65kmFWuNO5QvPNc6sjdwCLcBGAsYHQ/s72-c/iron.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1608334150425329967</id><published>2021-09-12T16:13:00.005-07:00</published><updated>2021-09-12T16:13:00.172-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attacks"/><title type='text'>Hacker returned more than $ 17 million to Cream Finance</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9GoSGn9160M/YTxlZp1sq1I/AAAAAAAAFM8/gRa68CpvsPozKGjXgTlFTXVwv5lX_HlfQCLcBGAsYHQ/s805/cream.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Hacker returned more than $ 17 million to Cream Finance&quot; border=&quot;0&quot; data-original-height=&quot;452&quot; data-original-width=&quot;805&quot; src=&quot;https://1.bp.blogspot.com/-9GoSGn9160M/YTxlZp1sq1I/AAAAAAAAFM8/gRa68CpvsPozKGjXgTlFTXVwv5lX_HlfQCLcBGAsYHQ/s16000/cream.jpg&quot; title=&quot;Hacker returned more than $ 17 million to Cream Finance&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The attacker who hacked the Cream Finance DeFi protocol returned 5.15 thousand Ethereum to the creators of the project (approximately $ 17.5 million at the current exchange rate). This was &lt;a href=&quot;https://twitter.com/peckshield/status/1435495419652583425&quot; target=&quot;_blank&quot;&gt;announced &lt;/a&gt;on Twitter by the analytical company PeckShield.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The Cream Finance project was compromised on August 30 this year. As a result of the attack, the project lost more than $ 18 million.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In early September, the developers of the protocol announced that they would compensate for the damage suffered by the users. The developers of Cream Finance claimed that they will allocate 20% of the collected transaction fees for damages, and are also willing to pay 10% of the stolen amount to the hacker if he returns the stolen funds.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In August, a cryptocurrency transfer company, Poly Network, was attacked by a hacker , from which more than $ 611 million were stolen. The hacker later returned all the stolen funds.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1608334150425329967'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1608334150425329967'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/hacker-returned-more-than-17-million-to.html' title='Hacker returned more than $ 17 million to Cream Finance'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-9GoSGn9160M/YTxlZp1sq1I/AAAAAAAAFM8/gRa68CpvsPozKGjXgTlFTXVwv5lX_HlfQCLcBGAsYHQ/s72-c/cream.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1413563361876500314</id><published>2021-09-12T01:11:00.004-07:00</published><updated>2021-09-12T01:11:00.182-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attacks"/><title type='text'>Apple pays a lot of money for vulnerabilities found, but does not always fix them</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-TwfdE_0KXnM/YTxk7CEertI/AAAAAAAAFM0/96N7zpw-JoAn56zijAElG1h8ocvBy_unACLcBGAsYHQ/s1280/apple.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Apple pays a lot of money for vulnerabilities found, but does not always fix them&quot; border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; src=&quot;https://1.bp.blogspot.com/-TwfdE_0KXnM/YTxk7CEertI/AAAAAAAAFM0/96N7zpw-JoAn56zijAElG1h8ocvBy_unACLcBGAsYHQ/s16000/apple.jpg&quot; title=&quot;Apple pays a lot of money for vulnerabilities found, but does not always fix them&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Apple has supported the Vulnerability Bounty Program for five years now, offering up to $ 1 million for the most dangerous issues. However, many cybersecurity experts complain that the company fixes vulnerabilities with delay and does not always pay adequate remuneration. In general, the researchers believe that Apple&#39;s closed approach only harms the program and jeopardizes security, writes The Washington Post.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Apple launched the bug bounty program in 2016 and was closed until 2019. According to Ivan Krstic, head of security development at Apple, this year the company has paid twice the amount of awards last year and leads in the average amount of compensation for vulnerabilities.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;However, researchers interviewed by TWP disagree with this statement. Similar programs like Facebook, Microsoft and Google are more open and provide more resources to reach a wider audience of experts, they said. Plus, many of them pay more than Apple.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;For example, in 2020, within the framework of the compensation program, Microsoft paid researchers a total of $ 13.6 million, Google - $ 6.7 million, and Apple spent $ 3.7 million for these purposes.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In addition, Apple does not go into details as to why it decided to pay or not pay for a particular vulnerability, sources say. At the same time, the company accumulates vulnerabilities that remain unpatched. Because of this approach, many researchers do not report the problems they find to Apple, preferring to sell them to government departments or companies that develop hacking tools.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to Krstic, Apple intends to improve its approach to the reward program, respond more quickly to reports from researchers, and add new incentives.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1413563361876500314'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1413563361876500314'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/apple-pays-lot-of-money-for.html' title='Apple pays a lot of money for vulnerabilities found, but does not always fix them'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-TwfdE_0KXnM/YTxk7CEertI/AAAAAAAAFM0/96N7zpw-JoAn56zijAElG1h8ocvBy_unACLcBGAsYHQ/s72-c/apple.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-1054901750364700898</id><published>2021-09-11T14:10:00.001-07:00</published><updated>2021-09-11T14:10:00.174-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><title type='text'>WhatsApp moderators can view users&#39; private messages</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-2fyeYKoA320/YTxkO2JyuUI/AAAAAAAAFMs/YQMpasN430YcBxw-WbGbOCqE0Q36I9c8ACLcBGAsYHQ/s640/whatsapp.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;WhatsApp moderators can view users&#39; private messages&quot; border=&quot;0&quot; data-original-height=&quot;320&quot; data-original-width=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-2fyeYKoA320/YTxkO2JyuUI/AAAAAAAAFMs/YQMpasN430YcBxw-WbGbOCqE0Q36I9c8ACLcBGAsYHQ/s16000/whatsapp.jpg&quot; title=&quot;WhatsApp moderators can view users&#39; private messages&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;When Facebook CEO Mark Zuckerberg introduced the company&#39;s new approach to privacy in March 2019, he cited WhatsApp messenger and its core feature - end-to-end encryption, which turns messages into an unreadable format that only those who intended to see them can see as an example. As Zuckerberg assured, no one else, not even the company itself, can read them. However, all of these assurances are untrue, according to new material from the non-profit investigative journalism organization ProPublica.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to the article, WhatsApp employs more than 1,000 contractors in Austin, Texas, Dublin and Singapore who study user-generated content using artificial intelligence systems, as well as special software from Facebook. The tool allows you to analyze the streams of private messages, images and videos that the company has received complaints about, for example, fraudulent content, spam, child pornography or materials related to potential terrorism. Typically, the entire content assessment process takes no more than 1 minute.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Basically, the specifics of working as a moderator in WhatsApp is similar to Facebook or Instagram, writes ProPublica. That said, the recruiting announcement mentions “content research,” but does not mention Facebook or WhatsApp. For their work, moderators receive from $ 16.5 per hour. Anyone who asks should respond that they work for Accenture (Accenture itself declined to comment). They also sign a non-disclosure agreement.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Since the content on WhatsApp is encrypted, AI systems cannot automatically scan all chats, images or videos like they do on Facebook and Instagram.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to former WhatsApp engineers, moderators gain access to private content when a user complains about a message that allegedly violates the service&#39;s policy. Further, this message, together with the four previous ones in the dialogue, is redirected to the moderator in unencrypted form and put into the queue.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Unencrypted data includes user profile names and pictures, phone number, status, battery level, language and time zone, phone ID, IP address and OS, wireless signal strength, linked Facebook and Instagram accounts, date of last use of the app, and history violations.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In a commentary on the article, a Facebook spokesperson stated that:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&quot;We are building WhatsApp in such a way that limits the collection of data, but provides tools to combat spam, investigate threats and ban violators, including based on user complaints.&quot;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The company also noted that new tools have been added to WhatsApp to protect privacy, in particular disappearing messages.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;“Based on the feedback we receive from users, we are confident that people understand that when they send a WhatsApp message, we receive the content they sent,” said a Facebook spokesman.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1054901750364700898'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/1054901750364700898'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/whatsapp-moderators-can-view-users.html' title='WhatsApp moderators can view users&#39; private messages'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-2fyeYKoA320/YTxkO2JyuUI/AAAAAAAAFMs/YQMpasN430YcBxw-WbGbOCqE0Q36I9c8ACLcBGAsYHQ/s72-c/whatsapp.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-2135770643806930739</id><published>2021-09-11T10:06:00.001-07:00</published><updated>2021-09-11T10:06:00.191-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attacks"/><title type='text'>0Day in Zoho servers is actively exploited in hacker attacks</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-gaeiFCdjIBA/YTxj0mSp-KI/AAAAAAAAFMk/JZfLB3RfVtYGUKz-F-TM-S21pey_fGTXwCLcBGAsYHQ/s600/polop.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;0Day in Zoho servers is actively exploited in hacker attacks&quot; border=&quot;0&quot; data-original-height=&quot;474&quot; data-original-width=&quot;600&quot; src=&quot;https://1.bp.blogspot.com/-gaeiFCdjIBA/YTxj0mSp-KI/AAAAAAAAFMk/JZfLB3RfVtYGUKz-F-TM-S21pey_fGTXwCLcBGAsYHQ/s16000/polop.png&quot; title=&quot;0Day in Zoho servers is actively exploited in hacker attacks&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The US Cybersecurity and Infrastructure Protection Agency (CISA) has issued a warning regarding a zero-day vulnerability in Zoho ManageEngine servers, which has been actively used in hacker attacks for more than a week.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Issue ( CVE-2021-40539 ) affects password management and SSO (single sign-on) solution Zoho ManageEngine ADSelfService Plus from India&#39;s Zoho Corporation. The vulnerability could be exploited to bypass authentication through the ADSelfService Plus REST API URL and execute malicious code on a vulnerable server. The issue is fixed in ADSelfService Plus build 6114.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to the words of the analyst&#39;s information security company CrowdStrike Dal Matt (Matt Dahl), some evidence indicates that the attack could be the work of a group of hands. There is no information yet on the presence of a PoC code or technical details of the vulnerability.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to the Zoho warning, the presence of the following logs in the \ ManageEngine \ ADSelfService Plus \ logs folder indicates that the server has been compromised:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;/RestAPI/LogonCustomization&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;/RestAPI/Connection&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Currently, more than 11 thousand Zoho ManageEngine servers are available on the Web.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/2135770643806930739'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/2135770643806930739'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/0day-in-zoho-servers-is-actively.html' title='0Day in Zoho servers is actively exploited in hacker attacks'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-gaeiFCdjIBA/YTxj0mSp-KI/AAAAAAAAFMk/JZfLB3RfVtYGUKz-F-TM-S21pey_fGTXwCLcBGAsYHQ/s72-c/polop.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-8786035943862058971</id><published>2021-09-11T07:02:00.000-07:00</published><updated>2021-09-11T07:02:00.188-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><title type='text'>Critical Android Vulnerability Could Make Smartphones Unusable</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ok9PE_hXO90/YTxjGNbiUZI/AAAAAAAAFMc/LPpokhY1RgY9EOlr-kwKyXZ_64Npj6hZgCLcBGAsYHQ/s1280/androidvuln.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; src=&quot;https://1.bp.blogspot.com/-ok9PE_hXO90/YTxjGNbiUZI/AAAAAAAAFMc/LPpokhY1RgY9EOlr-kwKyXZ_64Npj6hZgCLcBGAsYHQ/s16000/androidvuln.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Google has patched many vulnerabilities in Android during its September patch cycle, including a critical vulnerability that could render smartphones useless. This vulnerability allows a &quot;permanent denial of service&quot; according to Google.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In total, forty vulnerabilities in the operating system have been fixed with the September updates. Through the leaks, among other things, a malicious app can gain additional permissions without user interaction and access protected data from other applications.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The most dangerous vulnerability in the Android code is according to Google CVE-2021-0687. This vulnerability exists in the Android Framework and allows a remote attacker to cause a permanent denial of service by using a specially crafted file. Further details have not been given by Google.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In addition to vulnerabilities in its own Android code, Google also resolves vulnerabilities in parts of chipset manufacturers that Android uses with the monthly patch round. This month it concerns parts of MediaTek, Unisoc and Qualcomm.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Six of Qualcomm&#39;s software vulnerabilities have been identified as critical. Four of them are only local by exploiting a rogue app on the device, but two can be exploited remotely. These are CVE-2021-1933 and CVE-2021-1946 that are present in the software for the data modem and, in the worst case scenario, allow an attacker to execute arbitrary code. The impact of these leaks has been rated on a scale of 1 to 10 with a 9.8.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Patch level&lt;/p&gt;&lt;p&gt;Google works with so-called patch levels, where a date indicates the patch level. Devices that receive the September updates will have &#39;2021-09-01&#39; or &#39;2021-09-05&#39; as their patch level. Manufacturers who want their devices to get this patch level must in this case add all updates from the September Android bulletin to their own updates, and then roll them out to their users. The updates have been made available for Android 8.1, 9, 10 and 11.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;According to Google, manufacturers of Android devices were informed about the vulnerabilities that have now been fixed at least a month ago and have been able to develop updates in that time. However, that does not mean that all Android devices will receive these updates. Some devices are no longer supported with updates from the manufacturer or the manufacturer releases the updates at a later time.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/8786035943862058971'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/8786035943862058971'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/critical-android-vulnerability-could.html' title='Critical Android Vulnerability Could Make Smartphones Unusable'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-ok9PE_hXO90/YTxjGNbiUZI/AAAAAAAAFMc/LPpokhY1RgY9EOlr-kwKyXZ_64Npj6hZgCLcBGAsYHQ/s72-c/androidvuln.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2305932839256034522.post-6111405020179418515</id><published>2021-09-11T04:01:00.000-07:00</published><updated>2021-09-11T04:01:00.157-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>ProtonMail changes text about IP logs after providing IP address activist to police</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-m3N4V_0POgw/YTxiWzel-gI/AAAAAAAAFMU/sYbUUSCXcbkSm8MatuJ7o9_kLIvSLSUBQCLcBGAsYHQ/s700/17593.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ProtonMail changes text about IP logs after providing IP address activist to police&quot; border=&quot;0&quot; data-original-height=&quot;225&quot; data-original-width=&quot;700&quot; src=&quot;https://1.bp.blogspot.com/-m3N4V_0POgw/YTxiWzel-gI/AAAAAAAAFMU/sYbUUSCXcbkSm8MatuJ7o9_kLIvSLSUBQCLcBGAsYHQ/s16000/17593.png&quot; title=&quot;ProtonMail changes text about IP logs after providing IP address activist to police&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;E-mail service ProtonMail has changed the text on its website about not saving IP logs by default after it provided an IP address of a French activist to the Swiss police. On the ProtonMail website, under the heading &quot; Anonymous Email &quot; it read: &quot;By default, we do not store any IP logs that can be linked to your anonymous email account. Your privacy comes first.&quot;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;ProtonMail is located in Switzerland and thus falls under Swiss jurisdiction. Earlier this year, on orders from the Swiss authorities, it had to log the IP address and browser fingerprint of a specific ProtonMail account and provide that data to the Swiss police.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Andy Yen, founder and CEO of ProtonMail, said after the fuss that the company must comply with Swiss law. &quot;Once a crime has been committed, privacy protections can be suspended and we are obliged under Swiss law to respond to requests from the Swiss authorities.&quot; The e-mail service was also unable to object to the order.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;ProtonMail further stated that it would state more clearly on its website what the obligations are for the e-mail service. The &quot;Anonymous Email&quot; heading is now gone and replaced with &quot; Your data, your rules &quot;, which states that ProtonMail is email that respects privacy and puts people (not advertisers) first. In addition, it references an anonymous email gateway through the Tor network. This prevents ProtonMail from seeing the real IP address of users.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/6111405020179418515'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2305932839256034522/posts/default/6111405020179418515'/><link rel='alternate' type='text/html' href='https://www.hackers-review.net/2021/09/protonmail-changes-text-about-ip-logs.html' title='ProtonMail changes text about IP logs after providing IP address activist to police'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-m3N4V_0POgw/YTxiWzel-gI/AAAAAAAAFMU/sYbUUSCXcbkSm8MatuJ7o9_kLIvSLSUBQCLcBGAsYHQ/s72-c/17593.png" height="72" width="72"/></entry></feed>