A profile of Alex Spiro, a celebrity lawyer and central figure in Elon Musk's bid to overhaul Twitter, who has done much of the legal heavy lifting so far
Washington Post :
Russia has been rerouting internet traffic in occupied Ukrainian territories through domestic networks since June, blocking uncensored information and services
New York Times :
A look at nine Android spyware apps, installed on ~400K phones, which connect to servers controlled by Vietnam-based 1Byte and share a critical security flaw
A fleet of spyware apps share the same security flaw — Much of the spyware you hear of today are the powerful nation-state backed exploits …
Vodafone Portugal is working to recover from a “deliberate and malicious cyberattack” that also affected businesses, ambulances, fire departments, and hospitals
Ambulance and emergency services are among those suffering from “deliberate” hack.
Researcher details how hacker-for-hire group RocketHack infiltrated the email and Telegram accounts of ~3,500 individuals, including politicians and journalists
An unprecedented peek inside an underground hacker-for-hire operation reveals 3,500 targets, including Belarusian presidential candidates … Tweets: @rondeibert , @iblametom , and @...
Creators of PunkSpider say they're relaunching their search engine for hackable sites at Defcon next week to spur web admins to fix thousands of unpatched bugs
in the hope of shaming site owners into fixing them. https://www.wired.com/... Thomas Brewster / @iblametom : PunkSpider was super interesting when it first launched but was plague...
Many Latin American Facebook users are self-compromising their accounts to fuel fake engagement through “autoliker” websites and unwittingly joining bot farms
FireEye and networking company Pulse Secure say two China-linked hacking groups used a flaw in its VPN devices to target customers in the US defense industry
Exploitation of Pulse Connect Secure Vulnerabilities — Summary Department of Homeland Security : Emergency Directive 21-03 — Mitigate Pulse Secure Product Vulnerabilities CNN :...
Signal says it has added support for privacy-focused cryptocurrency MobileCoin to let users send and receive money, starting in the UK on iOS and Android
Testing your first payment — Sending your first payment Bruce Schneier / Schneier on Security : Signal Adds Cryptocurrency Support Stephen Diehl : Et tu, Signal? Liam Tung / ZDNe...
Apple has removed a controversial feature in macOS 11.2 beta 2 that allowed its own apps to bypass third-party firewalls, security tools, and VPNs
The ContentFilterExclusionList has been removed in macOS 11.2 beta 2. — Apple has removed a controversial feature from the macOS operating system …
The Senate's Section 230 hearing, with Dorsey, Zuckerberg, and Pichai, only briefly discussed the law, instead letting Republicans berate Dorsey for soundbites
Republican senators unloaded on Twitter's Jack Dorsey, but had little to say about reforming the foundational internet law.
Five Eyes governments as well as India and Japan make a new call for backdoors into products that are end-to-end encrypted
A number of experts have pointed to the information … Manik Berry / Fossbytes : Five Eyes, India, And Japan Want ‘Backdoor’ To End-To-End Encryption Phil Muncaster / infosecurity-m...
Google updates Play Store rules banning stalkerware apps unless they include an “adequate notice or consent” and show a “persistent notification”
Catalin Cimpanu / ZDNet :
Jon Callas, formerly of Apple, Blackphone, PGP Corp, and co-founder of Silent Circle, joins EFF as Technology Projects Director
Some of the most important work we do at EFF is build technologies to protect users' privacy and security, and give developers tools to make the entire Internet ecosystem more safe...
A look at WireGuard, a lightweight and simple open source VPN tool and protocol that will soon be part of the Linux kernel
compared with tens of thousands of lines in other VPNs. That doesn't make it more secure, but it does make it easier to find and fix problems. https://www.wired.com/... @z3rotrust ...
Researchers find an Android malware strain Cerberus that can extract and steal one-time passwords generated by Google's Authenticator mobile app
Catalin Cimpanu / ZDNet :
Avast will shut down its marketing subsidiary Jumpshot following controversy over selling user data to third parties
Avast's CEO said the move is “absolutely the right thing to do.” — Avast is winding down its subsidiary Jumpshot following an explosive investigation into the sale …
Avast will shut down its marketing subsidiary Jumpshot following controversy over selling user data to third parties
Avast's CEO said the move is “absolutely the right thing to do.” — Avast is winding down its subsidiary Jumpshot following an explosive investigation into the sale …
Checkm8 creator says his iPhone exploit requires physical device access and lacks persistence after reboot, but will make jailbreaking more accessible and safer
@dangoodin001 interviews @axi0mX and gets all the details on the new iOS bootrom exploit. https://arstechnica.com/... Dan Goodin / @dangoodin001 : The jailbreaking exploit released...
Checkm8 creator says his iPhone exploit requires physical device access and lacks persistence after reboot, but will make jailbreaking more accessible and safer
Unpatchable vulnerability is a game-changer that even Apple will be unable to stop. — Often, when new iOS jailbreaks become public, the event is bitter-sweet.