The DoJ announced arrests, charges and guilty pleas as part of Operation Darkness Falls, which involved several government agencies.
Monthly Archives: August 2018
Facebook pulls its privacy-violating Onavo VPN from Apple’s App Store
Apple last week suggested that Facebook remove its Onavo security app from the App store due to privacy rule violations. On Wednesday, Facebook complied.
DNC ‘spearphishing attack’ was actually a test
A fake login page turned out to be a test phishing attack from the Michigan Democratic Party, which hadn’t told the DNC or the ISP about it.
Vulnerability in OpenSSH “for two decades” (no, the sky isn’t falling!)
An OpenSSH bug that was reclassified as a vulnerability after it was fixed has made scary headlines – but the sky isn’t falling
Patch time! Adobe issues unexpected ‘critical’ fix for Photoshop CC
Adobe’s issued an urgent fix for two critical vulnerabilities affecting Photoshop Creative Cloud (CC) for Windows and macOS.
Facebook’s rating you on how trustworthy you are
You, me, everyone is being rated on a scale between zero and one on signals such as whether we waste Facebook’s time by falsely flagging posts as being false.
Babysitting app suffers ‘temporary data breach’ of 93,000 users
Babysitting-booking app Sitter “temporarily” exposed the personal data of 93,000 account holders, according to a researcher who recently discovered the trove of data using the Shodan Internet of Things (IoT) search engine.
Using smart meter data constitutes a search, but court allows them anyway
US cities using smart meters narrowly escaped a legal problem this month when a court decided that the benefits of these IoT devices outweighed the privacy issues created by collecting detailed home energy data.
Deepfakes porn service: Don’t worry, we’ll only use “consenting adults”
“You,” or “footage that you swear is of a consenting adult,” though details on how that will be ascertained by Naughty America are sketchy.
How an uploaded image could take over your website, and how to stop it
Bugs in the widespread graphics system Ghostscript could be exploited remotely by crooks – so here’s how to keep attackers at bay.