Texas Man Tried to Blow Up the Internet
Federal Investigators allege that a Texas man wanted to use C-4 to blow up around 70% of the internet. Continue reading Texas Man Tried to Blow Up the Internet
Collaborate Disseminate
Federal Investigators allege that a Texas man wanted to use C-4 to blow up around 70% of the internet. Continue reading Texas Man Tried to Blow Up the Internet
Google’s Project Zero discovered, and caused to be patched, eleven zero-day exploits against Chrome, Safari, Microsoft Windows, and iOS. This seems to have been exploited by “Western government operatives actively conducting a counterterrorism operation”:
The exploits, which went back to early 2020 and used never-before-seen techniques, were “watering hole” attacks that used infected websites to deliver malware to visitors. They caught the attention of cybersecurity experts thanks to their scale, sophistication, and speed.
[…]
It’s true that Project Zero does not formally attribute hacking to specific groups. But the Threat Analysis Group, which also worked on the project, does perform attribution. Google omitted many more details than just the name of the government behind the hacks, and through that information, the teams knew internally who the hacker and targets were. It is not clear whether Google gave advance notice to government officials that they would be publicizing and shutting down the method of attack…
Continue reading Google’s Project Zero Finds a Nation-State Zero-Day Operation
A law enforcement crackdown on domestic terrorists following the Capitol Hill riot will likely lead some violent extremists to turn to communications platforms they perceive to be more secure to discuss their activities, according to a U.S. intelligence bulletin obtained by CyberScoop. The arrests of Jan. 6 rioters could deter some domestic violent extremists (DVEs), but “lead others to adjust their tactics and to lessen law enforcement scrutiny,” says the Jan. 13 memo from the Department of Homeland Security, FBI and the National Counterterrorism Center. The document is marked “For Official Use Only” and was distributed to state and local law enforcement agencies. The bulletin shows how law enforcement officials are looking to track any efforts by far-right extremists to cloak their communications on encrypted platforms following the insurrection. Some of the would-be usurpers have reportedly turned to encrypted messaging platforms Telegram and Signal after crackdowns on other media. Twitter […]
The post Capitol Hill riot crackdown leaves extremists searching for more secure messaging platforms, US intel memo says appeared first on CyberScoop.
The leader of the neo-Nazi group the Base described his group’s “self-defense” mission in a Holocaust museum during the news segment. Continue reading Neo-Nazi Terror Leader on Russian TV: ‘I’m a Family Man’
Senator Ron Wyden asked, and the NSA didn’t answer:
The NSA has long sought agreements with technology companies under which they would build special access for the spy agency into their products, according to disclosures by former NSA contractor Edwa… Continue reading The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products
By Sudais Asif
A total of 300 cryptocurrency accounts, 4 websites, and 4 Facebook pages with…
This is a post from HackRead.com Read the original post: US claims disrupting 3 cryptocurrency campaigns run by terror groups
Continue reading US claims disrupting 3 cryptocurrency campaigns run by terror groups
The FBI’s Apple problem. Continue reading FBI finally unlock shooter’s iPhones, Apple berated for not helping
Federal law enforcement officials said Monday they had unlocked the iPhones of the perpetrator of a December terrorist attack at a U.S. Naval base — and sharply criticizing Apple for not granting them access to those encrypted communications. FBI technicians cracked the phones of a Saudi aviation student who killed three U.S. sailors at the Naval Air Station Pensacola, uncovering evidence linking him to an Al Qaeda affiliate, Attorney General William Barr said. Barr and FBI Director Christopher Wray urged Silicon Valley companies to write software that allows investigators to access encrypted communications with a warrant, a move that technology firms and security experts have criticized for years. Authorities took their usual claims a step further, though, by criticizing Apple for what they described as effectively standing in the way of their investigation. “We effectively received no help from Apple,” Wray asserted at the press conference. He did not detail the […]
The post U.S. officials say they’ve cracked Pensacola shooter’s iPhones, blast Apple appeared first on CyberScoop.
Continue reading U.S. officials say they’ve cracked Pensacola shooter’s iPhones, blast Apple
Concerns over cybersecurity risk and possible spying by China have already brought about bans from DHS, DoD, TSA, and the State Department. Continue reading Senate bill would ban TikTok from government phones
It’s not a “state actor”, so isn’t subject to 1st Amendment scrutiny and can censor PragerU’s videos on abortion, gun rights and terrorism. Continue reading Google has right to censor conservative nonprofit on YouTube