“Keyword orders” threaten to involve innocent Internet users in serious crimes.
The US government required Google to provide data on all users performing certain searches. Such “keyword warrants” can raise suspicions on Internet users of involvement in crimes.
In 2019, federal investigators in Wisconsin were looking for men who were involved in illegal activities. Trying to find the criminals, investigators turned to Google with a request to provide information about everyone who searched for the victim’s name, two spelling options for her mother’s name and her address. Information about this investigation was to remain secret. The warrant became known because the US Department of Justice accidentally disclosed it in September this year. This was reported by Forbes, which had a copy of the document.
In another case, law enforcement officials requested information about those who were looking for the address of an arson victim who was a witness in a racketeering case against singer R. Kelly.
Google continues to comply with such conflicting requests, despite concerns about their legitimacy and the potential to prosecute innocent people who accidentally searched for related terms. Privacy experts are concerned about the precedent set by such orders and the possibility that any such order would violate the Fourth Amendment protection against unwarranted searches. Such a situation could potentially lead to problems related to the violation of the First Amendment to the US Constitution, which guarantees, among other things, freedom of speech, and lead to the concern of Google users that their identity could be revealed to the government simply based on search queries.
Hackers hacked Trump’s social network prior to launch
A few hours after the launch was announced, the attackers created an account on behalf of Trump and posted obscene notes to the address of the founder of another social network.
The social network of ex-US President Donald Trump Truth Social, the creation of which he announced the day before, was subjected to a hacker attack. Writes about this The New York Times (NYT).
The cybercriminals claim that a few hours after the announcement of the creation of TRUTH Social, they were able to gain access to the beta version of the platform. Cybercriminals created fake accounts on behalf of Trump and his former aide Steve Bannon. On the fake page of the ex-President of the United States, they posted a photo of a defecating pig and obscene remarks about the founder of Twitter Jack Dorsey.
The developers had to delete these accounts and close access to the site. Its official release was scheduled for 2022.
The hackers chose to hide their identities, but claim to be associated with the Anonymous group. According to them, the hacking of the social network was part of their “war against hate.” They also wanted to have fun.
Olympus was attacked by ransomware for the second time in two months
The company was attacked by Macaw ransomware developed by Evil Corp.
Japanese tech giant Olympus fell victim to ransomware for the second time in two months. This time, the attack was carried out by the cybercriminal group Evil Corp, against which the US government has imposed sanctions.
The attack on Olympus using a new variant of malware called Macaw began on October 10, 2021. The malware encrypted company systems in the United States, Canada and South America.
Macaw is a variant of WastedLocker ransomware, and both are developed by the cybercriminal group Evil Corp.
This is the second ransomware attack on Olympus in the past two months. The first incident took place in September, when the company’s networks in Europe, the Middle East and Africa were encrypted with BlackMatter ransomware (BlackMatter and Evil Corp. are not related).
“Olympus was attacked by BlackMatter last month and a week or so by the Macaw,” Allan Liska, an analyst at information security firm Recorded Future, told TechCrunch.
According to Liska, the ransomware Macaw left a ransom note on the compromised computers with a data theft statement.
According to the official press release Olympus, the company is investigating “possible data breaches” – a known technique of the so-called “double extortion” in which ransomware steals data from their victims and threatens to publish it if the ransom is not paid.
The company does not provide details about the incident, citing an ongoing investigation.
Scientists have learned to track gadgets using BLE signals
Devices can be tracked by prints of their physical characteristics.
In the past few years, mobile devices have become more likely to use the Bluetooth Low Energy (BLE) protocol to transfer messages, which can pose a significant privacy risk, experts at UC San Diego warn.
Within the framework of research they examined the implementation of BLE in a number of popular models of smartphones, laptops and gadgets and found that devices can be traced back to their physical characteristics. The bottom line is that devices can have a unique fingerprint that can be used to determine where they were and when.
BLE messaging has become more common in phones, laptops, smartwatches and other gadgets due to the support of operating devices for functions such as Apple Continuity or Find My, which imply the use of the BLE standard.
Typically, applications using this protocol try to hide identifiable data by encrypting the device’s MAC address, but this does not help to hide the built-in hardware characteristics of the device, based on which it can be identified.
Experts have tested their theory on several devices, including the iPhone 10, Thinkpad X1 Carbon (Windows), MacBook Pro 2016 (macOS), Apple Watch 4 (watchOS), Google Pixel 5 (Android), and Bose QuietComfort 35. In most cases, they were able to get a fingerprint of the physical BLE chip and distinguish one device from another.
In the course of the study, the scientists faced some difficulties, for example, it turned out to be more difficult to distinguish devices operating on the same chipset model than to distinguish gadgets based on different chips. The device’s ability to identify was also influenced by its temperature and signal transmission power.
Using special equipment, the researchers intercepted BLE signals from 162 devices in public places and were able to identify 40% of them. In addition, the group recorded BLE signals from bystanders’ devices with COVID-19 tracking apps from Apple and Google for two days for 10 hours. Scientists managed to “uniquely identify” 47.1% of 647 MAC addresses.
In theory, the method can be used to track the Apple AirTag and Samsung SmartTag Plus Bluetooth trackers, the researchers noted.
Four iQOO smartphones will receive Android 12 in December
The iQOO brand has revealed Android 12 release dates for a number of its models. True, we are not yet...
Another foldable smartphone comes out in November – with 120Hz OLED screen, Snapdragon 888 and 50MP camera
Details about the Oppo smartphone with a flexible screen appeared on the web. According to the source, the device will...
Not a trace remained of $ 66,000. Bitcoin fell, followed by Ethereum
The week began for the main cryptocurrencies of the world with a rise in price and the establishment of new...
New MacBook Air due next year with Mini-LED display like new MacBook Pro, M2 processor and MagSafe
Several sources have shared details about the next generation MacBook Air. The well-known resource DigiTimes claims that the laptop will...
Security7 days ago
FreakOut Botnet Turns DVRs Into Monero Cryptominers
Phones7 days ago
For the first time in the arena: Samsung Galaxy S22 and Galaxy S22 + screen protectors show very thin bezels
Components6 days ago
Intel Alder Lake (Core 12) processors have potential problems with many games
News7 days ago
Bitcoin mining will provide heat to the whole city. MintGreen to start heating North Vancouver next winter