Bjarteblogg

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking - WIRED

Apple hacking

https://www.wired.com/story/ios-attack-watering-hole-project-zero/

the biggest known iPhone hacking incident of all time.

The hackers still made some strangely amateurish mistakes

Employees connect nuclear plant to the internet so they can mine cryptocurrency - ZDNet

vitskap

https://www.zdnet.com/article/employees-connect-nuclear-plant-to-the-internet-so-they-can-mine-cryptocurrency/

Daring Fireball: Facebook’s ‘Clear History’ Tool Is, of Course, Bullshit

Facebook

https://daringfireball.net/linked/2019/08/26/facebook-clear-history

I Visited 47 Sites. Hundreds of Trackers Followed Me. - The New York Times

personvern

https://www.nytimes.com/interactive/2019/08/23/opinion/data-internet-privacy-tracking.html

This is happening every day, all the time, and the only reason we’re O.K. with it is that it’s happening behind the scenes […] If we all had pictures like this, we might revolt.

Hackers Could Steal a Tesla Model S by Cloning Its Key Fob—Again - WIRED

Tesla hacking

https://www.wired.com/story/hackers-steal-tesla-model-s-key-fob-encryption/

The same researchers who figured out how to clone a Tesla Model S key fob have done it again, cracking the replacement that was meant to fix the problem.

Deconstructing Google’s excuses on tracking protection

https://freedom-to-tinker.com/2019/08/23/deconstructing-googles-excuses-on-tracking-protection/

If an ad uses deeply personal information to appeal to emotional vulnerabilities or exploits psychological tendencies to generate a purchase, then that is a form of privacy violation—regardless of the technical details. 

Flaws in cellphone tracking data used in Denmark, which may have linked innocent people to crime scenes, prompt a review of 10K+ court cases dating back to 2012 - The New York Times

personvern

https://www.nytimes.com/2019/08/20/world/europe/denmark-cellphone-data-courts.html

some cellphone tracking data linked phones to the wrong cellphone towers

Facebook og Twitter straffer Kina etter påvirkningsoperasjon i Hongkong – NRKBeta

Facebook Kina Noreg

https://nrkbeta.no/2019/08/20/facebook-og-twitter-straffer-kina-etter-pavirkningsoperasjon-i-hongkong/

Facebook- og Twitterkontoer med opprinnelse i Kina [har] spredt og videreformidlet innhold som framstiller demonstrasjonene i Hongkong som ekstreme og voldelige.

Say Cheese: Ransomware-ing a DSLR Camera - Check Point Research

https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/

an attacker in close proximity (WiFi), or an attacker who already hijacked our PC (USB), can also propagate to and infect our beloved cameras with malware

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons - WIRED

hacking

https://www.wired.com/story/acoustic-cyberweapons-defcon/

US Navy to replace touchscreen throttle and helm controls on destroyers with mechanical ones, after finding that touchscreens contributed to a deadly collision - USNI News

https://news.usni.org/2019/08/09/navy-reverting-ddgs-back-to-physical-throttles-after-fleet-rejects-touchscreen-controls

How YouTube Radicalized Brazil - The New York Times

Google

https://www.nytimes.com/2019/08/11/world/americas/youtube-brazil.html

YouTube’s search and recommendation system appears to have systematically diverted users to far-right and conspiracy channels in Brazil.

These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer - VICE

Apple hacking

https://www.vice.com/en_us/article/evj4qw/these-iphone-lightning-cables-will-hack-your-computer

will give an attacker a way to remotely tap into your computer

Revealed: Microsoft Contractors Are Listening to Some Skype Calls - VICE

personvern

https://www.vice.com/en_us/article/xweqbq/microsoft-contractors-listen-to-skype-calls

calls made using the app’s translation function

North Korea took $2 billion in cyberattacks to fund weapons program: U.N. report - Reuters

hacking

https://www.reuters.com/article/us-northkorea-cyber-un/north-korea-took-2-billion-in-cyberattacks-to-fund-weapons-program-u-n-report-idUSKCN1UV1ZX

increasingly sophisticated attacks to steal funds from financial institutions and cryptocurrency exchanges to generate income. They also used cyberspace to launder the stolen money

Pentagon testing mass surveillance balloons across the US - The Guardian

overvaking

https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest

the high-altitude balloons promise a cheap monitoring platform that could follow multiple cars and boats for extended periods

How Jaywalking Could Jam Up the Era of Self-Driving Cars - NYTimes

https://www.nytimes.com/2019/08/01/business/self-driving-cars-jaywalking.html

if pedestrians know they’ll never be run over, jaywalking could explode, grinding traffic to a halt.

the technical stuff will get worked out. It’s the societal part that’s the most challenging

Apple suspends Siri response grading in response to privacy concerns - TechCrunch

Apple personvern

https://techcrunch.com/2019/08/01/apple-suspends-siri-response-grading-in-response-to-privacy-concerns/

While we conduct a thorough review, we are suspending Siri grading globally. Additionally, as part of a future software update, users will have the ability to choose to participate in grading.

Louisiana governor declares state emergency after local ransomware outbreak - ZDNet

løysepengevirus

https://www.zdnet.com/article/louisiana-governor-declares-state-emergency-after-local-ransomware-outbreak/

IT networks are down at all three school districts, and files have been encrypted and are inaccessible

Cisco to pay $8.6 million for selling video surveillance software it knew was vulnerable to hackers - WP

hacking overvaking

https://www.washingtonpost.com/politics/2019/07/31/cisco-pay-million-fine-selling-government-hackable-surveillance-technology/

The settlement marks the first time a company has been forced to pay out under a federal whistleblower law for failing to have adequate cybersecurity protections.