Indian nuclear power plant’s network was hacked, officials confirm - Ars Technica

https://arstechnica.com/information-technology/2019/10/indian-nuclear-power-company-confirms-north-korean-malware-attack/

After initial denial, company says report of “malware in system” is correct

China Sharpens Hacking to Hound Its Minorities, Far and Wide - The New York Times

https://www.nytimes.com/2019/10/22/technology/china-hackers-ethnic-minorities.html

showing a new determination by Beijing to push its surveillance state beyond its borders.

Japanese hotel chain sorry that hackers may have watched guests through bedside robots • The Register

https://www.theregister.co.uk/2019/10/22/japanese_hotel_chain_sorry_that_bedside_robots_may_have_watched_guests

Japanese hotel chain HIS Group has apologised for ignoring warnings that its in-room robots were hackable to allow pervs to remotely view video footage from the devices.

Australia concluded China was behind hack on parliament, political parties – Reuters

https://www.reuters.com/article/us-australia-china-cyber-exclusive/exclusive-australia-concluded-china-was-behind-hack-on-parliament-political-parties-sources-idUSKBN1W00VF

The report, which also included input from the Department of Foreign Affairs, recommended keeping the findings secret in order to avoid disrupting trade relations with Beijing

Don’t Speak — Pixel Envy

https://pxlnv.com/blog/dont-speak/

The more I’ve thought about Apple’s statement regarding the iOS exploit chains discovered last week, the more bizarre it seems

Sources say China used iPhone hacks to target Uyghur Muslims - TechCrunch

https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking - WIRED

https://www.wired.com/story/ios-attack-watering-hole-project-zero/

the biggest known iPhone hacking incident of all time.

The hackers still made some strangely amateurish mistakes

Hackers Could Steal a Tesla Model S by Cloning Its Key Fob—Again - WIRED

https://www.wired.com/story/hackers-steal-tesla-model-s-key-fob-encryption/

The same researchers who figured out how to clone a Tesla Model S key fob have done it again, cracking the replacement that was meant to fix the problem.

Deconstructing Google’s excuses on tracking protection

https://freedom-to-tinker.com/2019/08/23/deconstructing-googles-excuses-on-tracking-protection/

If an ad uses deeply personal information to appeal to emotional vulnerabilities or exploits psychological tendencies to generate a purchase, then that is a form of privacy violation—regardless of the technical details. 

Say Cheese: Ransomware-ing a DSLR Camera - Check Point Research

https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/

an attacker in close proximity (WiFi), or an attacker who already hijacked our PC (USB), can also propagate to and infect our beloved cameras with malware