Search Results for “NBC News”


April 8, 2020
Ryan Browne / CNBC

Ryan Browne / CNBC  
Zoom Hit With Class-Action Lawsuit by Shareholder Who Claims Company Failed to Disclose Security Problems, Despite News of the Suit Zoom’s Stock Rises More Than 4%

Zoom has been hit with a class-action lawsuit by one of its shareholders, Michael Drieu, in the U.S. District Court for the Northern District of California. Drieu alleges the company failed to disclose issues with its video conferencing platform’s privacy and security, a failure that has caused the company’s stock price to tumble.  Despite news of the lawsuit, Zoom stock was up more than 4% on Wednesday morning.

Related: Fast Company, Android Authority, ARN, The Next Web, TechNadu, CNBC Technology, Neowin, Business Insider, PhoneArena, BloombergTech Insider, Fin24, ZDNet, WCCFtech, TechNadu, NDTV Gadgets360.com, Reuters: Top News


May 18, 2020
David Shortell, Evan Perez / CNN

David Shortell, Evan Perez / CNN  
FBI Claims to Have Broken the Encryption on Pensacola Shooter’s iPhones Substantially Weakening the Government’s Push for Encryption Backdoors

Mohammed Alshamrani, a member of the Royal Saudi Air Force in training at Naval Air Station Pensacola who killed three U.S. sailors and wounded others at the base, was in touch with a suspected al Qaeda operative, according to the FBI broke which broke through the encryption protecting the Saudi attacker’s iPhones, sources say. If the Bureau did achieve this encryption breakthrough, the case made by the FBI and Attorney General William Barr for demanding backdoors into encrypted communications services and devices appears to be substantially weakened. Law enforcement said they had initially been unable to retrieve data stored on two iPhones belonging to the shooter, and they cited that hurdle in trying to complete their investigation of the attacker’s ideology and his radicalization.

Related: New York Times, Wall Street Journal, Forbes, Justice Department, MacRumors, Associated Press, Task & Purpose, Capital Gazette, The Sun, Business Insider, AOL, GANNETT Syndication Service, Newsweek, Yahoo! News, Bloomberg, RT USA, The Crime Report, Axios, Cult of Mac, USATODAY, AppleInsider, NBC News, Wired, The Register – Security, Cyberscoop, CNET, News : NPR, iDownloadBlog.com, Fortune, WCCFtech, ZDNet Security, AppleInsider, iMore, Cult of Mac, Patently Apple, Business Insider, The Sun, BuzzFeed News, Newsweek, iDownloadBlog.com, Appleosophy, MacRumors, Homeland Security Today, Zero Hedge, CBSNews.com,TechSpot, iPhone Hacks, The Mac Observer,Cult of Mac, The Guardian, UPI.com, TIME, Ars Technica, USATODAY, New York Post, AppleInsider, The Huffington Post , Capital Gazette, TIME, Heavy.com, Engadget, Slashdot, Daily Dot, Cyberscoop, Multichannel, Vox, WCCFtech, POLITICO, The Sun, USNI News, Business Insider, Fortune, Input, TribLIVE, emptywheel, PhoneArena, Channel News Asia, RT USA, Algemeiner.com, MacDailyNews, Reuters: U.S., France 24, The New Daily, The Verge, Slashdot, Washington Post, New York Times

Tweets:@dnvolz @adamgoldmanNYT @kevincollier @nakashimae @zackwhittaker @zackwhittaker @zackwhittaker @iblametom @karaswisher @macrumors @zackwhittaker @iblametom @dotmudge @DevlinBarrett @ahmed

New York Times: F.B.I. Is Said to Find Links Between Pensacola Gunman and Al Qaeda
Wall Street Journal: FBI Discovers al Qaeda Link in Pensacola Attack
Forbes: Feds Hack iPhones In Pensacola Terrorist Shooting Case, But Still Slam Apple For Not Helping
Justice Department: Attorney General William P. Barr and FBI Director Christopher Wray Announce Significant Developments in the Investigation of the Naval Air Station Pensacola Shooting
MacRumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help
Associated Press: Pensacola gunman’s cellphones reveal meticulous planning for attack, FBI says
Task & Purpose: The FBI has evidence linking Al Qaeda to the NAS Pensacola shooting
Capital Gazette: Gunman accused of killing 3 sailors at Pensacola military base linked to al-Qaida, US official says
The Sun: Saudi student who shot dead 3 US sailors on Florida Naval Base ‘had been in contact with Al Qaeda’ in days before attack
Business Insider: The FBI found links to Al Qaeda after cracking the phones of the Saudi gunman who attacked a Florida naval base
AOL: Official: FBI finds link between Pensacola gunman, al-Qaida
GANNETT Syndication Service: Official: FBI finds link between NAS Pensacola gunman, al-Qaida
Newsweek: FBI Finds Florida Gunman Who Killed U.S. Sailors Was Linked to Al Qaeda After Breaking iPhone Encryption
Yahoo! News: FBI finds Al Qaeda link to Pensacola naval base shooting suspect: US official
Bloomberg: FBI Gets Into Pensacola Shooter’s iPhone, Finds an Al-Qaeda Tie
RT USA: Saudi pilot who went on gun rampage at Florida naval base linked to ‘Al-Qaeda operative’
The Crime Report: FBI Finds Link Between Pensacola Shooter, Al-Qaeda
Axios: FBI finds links between Pensacola gunman and Al Qaeda
Cult of Mac: FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help
USATODAY: Feds connect al Qaeda contacts to deadly Pensacola Naval Air Station shooting
AppleInsider: FBI breaks iPhone security to uncover Pensacola shooter & Al Qaeda link
NBCNews: FBI: Pensacola gunman prodded by al Qaeda to attack
Wired: The FBI Backs Down Against Apple—Again
The Register – Security: Attorney General: We didn’t need Apple to crack terrorist’s iPhones – tho we still want iGiant to do it in future
Cyberscoop: U.S. officials say they’ve cracked Pensacola shooter’s iPhones, blast Apple
CNET: FBI slams ‘Apple problem’ as it unlocks Pensacola shooter’s iPhones – CNET
News : NPR: FBI: New iPhone Evidence Shows Pensacola Shooter Had Ties To Al-Qaida
iDownloadBlog.com: The FBI has reportedly bypassed the security on the Pensacola mass shooter’s iPhone
Fortune: FBI: “We received effectively no help from Apple” in accessing Pensacola Shooter’s iPhones
WCCFtech: FBI Hacks Florida Shooter’s iPhones without Apple’s Help & Finds al Qaeda Link
ZDNet Security: FBI criticizes Apple for not helping crack Pensacola shooter’s iPhones
AppleInsider: Apple rejects ‘false claims’ by Justice Department regarding Pensacola investigation
iMore: Apple denies “false claims” by Justice Department over Pensacola attack
Cult of Mac: FBI attacks Apple for ‘no help’ unlocking Florida attacker’s iPhone; Apple rejects ‘false’ claims
Patently Apple: DOJ and FBI described crucial data found on the Pensacola Terrorist’s iPhones today in a news Conference, without Apple’s Assistance
Business Insider: The FBI found links to Al Qaeda after cracking the phones of the Saudi gunman who attacked a Florida naval base
The Sun: Saudi student who shot dead 3 US sailors on Florida Naval Base ‘had been in contact with Al Qaeda’ in days before attack
BuzzFeed News: The Pensacola Naval Base Shooter Had Longtime “Significant Ties” To Al-Qaeda
Newsweek: FBI Finds Florida Gunman Who Killed U.S. Sailors Was Linked to Al Qaeda After Breaking iPhone Encryption
iDownloadBlog.com: The FBI has reportedly bypassed the security on the Pensacola mass shooter’s iPhone
Appleosophy: Apple Fires Back at FBI and Attorney General William Barr Regarding Florida Shooter’s iPhone
MacRumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help
Task & Purpose: The FBI has evidence linking Al Qaeda to the NAS Pensacola shooting
MacRumors: Apple Calls FBI Comments on Lack of Help Unlocking Florida Shooter’s iPhone an ‘Excuse to Weaken Encryption’
SlashGear » security: Apple blasts Barr over iPhone lock “false claims” in Pensacola shooter case
Homeland Security Today: FBI: Pensacola Shooter Tied to AQAP Before Coming to the U.S., Discussed Attack
Zero Hedge: FBI Cracks Into Pensacola Shooter’s iPhone, Find “Significant Ties” To Al Qaeda
CBSNews.com: Saudi shooter in Florida air base attack had ties to al Qaeda
TechSpot: Officials still want backdoor into cellphones after cracking two iPhones without help
Yahoo! News: U.S. Supreme Court heaps more damages on Sudan in embassy bombing cases
iPhone Hacks: FBI Has Reportedly Unlocked One of the iPhones Used by Mass Shooter in Florida Last Year
The Mac Observer: FBI Bypasses Encryption on Pensacola Attacker’s iPhones
Cult of Mac: FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help
The Guardian: Pensacola gunman’s cellphones reveal meticulous planning for attack, FBI says
UPI.com: FBI: Agents unlocked phones to tie Pensacola gunman Mohammed Saeed Alshamrani to al-Qaida
TIME: Gunman in Deadly Pensacola Military Base Attack Linked to al-Qaida, FBI Says
Ars Technica: iPhone crypto hid al-Qaida link to naval base shooting, AG fumes
USATODAY: Feds connect al Qaeda contacts to deadly Pensacola Naval Air Station shooting
New York Post: FBI found al Qaeda’s link to Pensacola shooter through iPhones
AppleInsider: FBI breaks iPhone security to uncover Pensacola shooter & Al Qaeda link [u]
The Huffington Post : FBI Says It Found Links Between Pensacola Gunman And Al-Qaeda
Capital Gazette: Gunman accused of killing 3 sailors at Pensacola military base linked to al-Qaida, US official says
Stars and Stripes: FBI: Shooter at Naval Air Station Pensacola had link to al-Qaida
TIME: Gunman in Deadly Pensacola Military Base Attack Linked to al-Qaida, FBI Says
Ars Technica: iPhone crypto hid al-Qaida link to naval base shooting, AG fumes
Heavy.com: Pensacola, Florida Gunman Mohammed Alshamrani Link to Al-Qaida Found
Engadget: AG Barr seeks ‘legislative solution’ to make companies unlock phones
Daily Dot: FBI unlocks Pensacola shooter’s iPhone despite Apple’s opposition
Multichannel: AG Barr Hammers Apple in Terrorism Case Announcement
Vox: Why Attorney General Bill Barr is mad at Apple
Heavy.com: Pensacola, Florida Gunman Mohammed Alshamrani Link to Al-Qaida Found
POLITICO: Pensacola gunman was working with al Qaeda, FBI finds
USNI News: FBI Says Unlocked iPhone Messages Link NAS Pensacola Shooter to Al Qaeda; AG Barr Says Incident was ‘Act of Terrorism’
Input: FBI breaks into Pensacola shooter’s iPhone after six months, revealing al Qaeda links
TribLIVE: FBI: Shooter at Pensacola military base linked to al-Qaida
emptywheel: Bill Barr and Chris Wray Schedule a Press Conference to Admit Trump Let an Al Qaeda Terrorist onto Our Military Base
PhoneArena: Who is lying, Apple or Attorney General William Barr?
Channel News Asia: FBI phone probe links al Qaeda to Saudi who killed 3 at Florida base
RT USA: Saudi pilot who went on gun rampage at Florida naval base linked to ‘Al-Qaeda operative’
Algemeiner.com: FBI Phone Probe Links Al Qaeda to Saudi Shooter Who Killed Three at Florida Navy Base
MacDailyNews: Apple rejects ‘false claims’ by Justice Department regarding Islamic terrorist attack in Pensacola
Reuters: U.S.: FBI phone probe links al Qaeda to Saudi who killed three at Florida base, Barr says
France 24: FBI says al Qaeda linked to Saudi shooter at Florida naval base
The New Daily: FBI links al-Qaeda to US base shooting
MacDailyNews: FBI cracks iPhone encryption, links al Qaeda to Islamic terrorist who killed three at Florida naval base
MacDailyNews: Apple rejects ‘false claims’ by Justice Department regarding Islamic terrorist attack in Pensacola
CNN.com: FBI delivers to America a chilling reminder about al Qaeda
Input: FBI breaks into Pensacola shooter’s iPhone after six months, revealing al Qaeda links
The Verge: The FBI successfully broke into a gunman’s iPhone, but it’s still very angry at Apple
Washington Post: Attorney general and FBI director blast Apple after tracing Pensacola gunman’s phone to al-Qaeda
New York Times: F.B.I. Finds Links Between Pensacola Gunman and Al Qaeda

@dnvolz: Sound familiar? FBI gets into iPhone belonging to dead terrorist that they said months ago they could not unlock.
@adamgoldmanNYT: The F.B.I. found the gunman, a Saudi Air Force cadet training with the American military, had communicated with a Qaeda operative who had encouraged the attacks
@kevincollier: "Breaking encryption" on an iPhone has a specific meaning and enormous consequences. I really hope those making that claim today wouldn't do so without backing it up.
@nakashimae: FBI Director Chris Wray: "We received effectively no help from Apple" in accessing the Pensacola shooter's iPhones.
@zackwhittaker: Apple in January: "The FBI only notified us on January 6 that they needed additional assistance—a month after the attack occurred. Only then did we learn about the existence of a second iPhone associated with the investigation and the FBI's inability to access either iPhone."
@zackwhittaker: Apple also said at the time it responded to six more legal requests for information between Dec. 7 and Dec. 14, and that it provided iCloud backups, account information and transactional data for multiple accounts.
@zackwhittaker: It's not that Apple provided "effectively no help" to the FBI. It's that Apple didn't acquiesce to the wants and wishes of the government and backdoor its own devices. We almost had an entire court case about this — but the FBI bottled it.
@iblametom: New - The FBI hacks into the iPhones of Pensacola shooter, finds links to Al Qaeda. But director Chris Wray still says Apple should've helped and its delays caused real problems.
@karaswisher: Looks like the government can do what it said it could not do
@macrumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help https://macrumors.com/2020/05/18/fbi-reportedly-accessed-alshamrani-iphone/ by @rsgnl
@zackwhittaker: ACLU statement is extremely Nail polish "The boy who cried wolf has nothing on the agency that cried encryption."
@iblametom: Source at FBI told me they chose the wrong battle with Pensacola too... they’ve been able to get into iPhone 5 and 7 for some time.
@dotmudge: Two things: 1 - AQAP (Al Qaeda Arabian Peninsula) linked terrorist attack on US soil, and it barely makes the news cycle 2 - investigations show accessing iPhones on one-off’s continues to negate necessity to drop user crypto protections at large
@DevlinBarrett: Attorney general and FBI director crank up their encryption fight with Apple, blasting the company after agents traced data on a Pensacola gunman’s phone to al-Qaeda
@ahmed: FBI says Saudi shooter at Pensacola base was in touch with al-Qaeda leaders, accuses Apple of wasting “valuable time” by refusing to unlock his phone to investigators


May 7, 2020
Ari Levy / CNBC

Ari Levy / CNBC  
Zoom Buys Keybase to Add End-to-End Encryption to Service as Part of 90-Day Security Plan

Meteoric conferencing app Zoom has acquired encryption security start-up Keybase, the first purchase in the company’s nine-year history, to add an end-to-end encryption option as the company seeks to tamp down concerns over the security of its service. Terms of the deal were not disclosed. The acquisition is the latest move in a 90-day plan that Zoom announced on April 1 to fix its security flaws. It will take a while to integrate Keybase’s technology into Zoom’s Software because it must be simplified from its current version which is used largely by security and cryptography experts.

Related: SecurityWeek, ZDNet Security, The Verge, TechCrunch, Verdict, Keybase, Zoom, ZDNet Security, San Jose Business News, CNET News, Techradar, Daily Dot, Reddit – cybersecurity, 9to5Mac, SecurityWeek, The Register, Slashdot, Silicon Republic, WRAL Tech Wire, Security Brief, Reuters, ARN, Tom’s Guide News, BusinessLine – Home, TechNadu, Asia One Digital, grugq’s domain, grugq’s domain, Tech Insider, BGR, NDTV Gadgets360.com, Help Net Security

Tweets:@alexstamos @alexstamos @TechCrunch @mountain_ghosts @evacide @thegrugq

SecurityWeek: Zoom Acquires Keybase to Bring End-to-End Encryption to Video Platform
ZDNet Security: Zoom acquires encryption startup Keybase
The Verge: Zoom buys the identity service Keybase as part of 90-day security push
TechCrunch: Zoom acquires Keybase to get end-to-end encryption expertise
Verdict: Zoom acquires Keybase to add end-to-end encryption to videoconferencing
Keybase: Keybase joins Zoom
Zoom: Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering
ZDNet Security: Zoom acquires encryption startup Keybase
San Jose Business News: Zoom’s first M&A deal aims at shoring up security
CNET News: Zoom eyes security boost, acquiring secure messaging platform Keybase – CNET
Techradar: Zoom makes first ever acquisition in quest to boost security
Daily Dot: Zoom acquires encryption service in wake of security woes
Reddit – cybersecurity: Zoom acquires Keybase
9to5Mac: Zoom bought Keybase to bring end-to-end encryption to its videoconferences
SecurityWeek: Zoom Acquires Keybase to Bring End-to-End Encryption to Video Platform
The Register: Zoom bomb: Vid conf biz to snap up Keybase as not-a-PR-move move gets out of hand
Slashdot: Zoom Acquires Keybase To Get End-to-End Encryption Expertise
Silicon Republic: Zoom acquires Keybase to improve video conferencing security
WRAL Tech Wire: Zoom says deal to buy security firm will ‘significantly’ enhance security
Security Brief: Zoom buys encryption startup in its first-ever acquisition
Reuters: Zoom pushes ahead on security, buying Keybase and reaching pact with New York
ARN: Zoom acquires secure messaging startup Keybase in security push
Tom’s Guide News: Zoom is getting its biggest missing feature
BusinessLine – Home: Zoom to build end-to-end encryption for the app with Keybase
TechNadu: Zoom Acquires Keybase and Will Soon Introduce End-to-End Encryption
Asia One Digital: Free basic Zoom accounts to get three more security features from May 9
grugq’s domain: Zoom + Keybase
Tech Insider: Zoom security advisor Alex Stamos explains how the acquisition of Keybase will help the red-hot videoconferencing app address its ‘unique’ challenges in adding end-to-end encryption (ZM)
BGR: You’ll have to pay for Zoom’s new end-to-end encryption feature
NDTV Gadgets360.com: Zoom Pushes Ahead on Security, Buying Keybase, and Reaching Pact With New York
Help Net Security: Zoom acquires Keybase, a secure messaging and file-sharing service

@alexstamos: I am very happy that @zoom_us has bought @KeybaseIO and announced a plan to offer an end-to-end encrypted mode that works with Zoom's video quality and scale. Details from @ericsyuan
@alexstamos: @maxtaco, @malgorithms and the rest of the Keybase team built something special and now have a chance to change the baseline of security and privacy in enterprise communications forever. Coverage by CNBC:
@TechCrunch: Zoom acquires Keybase to get end-to-end encryption expertise https://tcrn.ch/3bgPLjj | by @ron_miller
@mountain_ghosts: keybase, the service we've been trusting to verify public keys, has been bought by zoom, a company that spent the last 2 months tanking its security reputation. is this good https://keybase.io/blog/keybase-j
@evacide: Zoom buys Keybase in order to integrate end-to-end encryption which, until recently, they were claiming they had all along.
@thegrugq: Zoom buying Keybase is a really interesting move. They could actually deny every nation control over the video conferencing terrain. It could also open up interesting features with zoom, like in band file sharing.


March 30, 2020
Olivia Solon / NBC News

Olivia Solon / NBC News  
Microsoft Will Divest Investment in Controversial Israeli Facial Recognition Company AnyVision

Microsoft has announced plans to divest its shareholding in the Israeli facial recognition company AnyVision following an investigation of the company by former United States Attorney General Eric Holder. Microsoft invested $74 million in AnyVision in June 2019 through its venture capital arm, M12. Holder and his firm Covington and Burling found that, contrary to reports that AnyVision is conducting mass surveillance of Palestinians. Despite that, Microsoft decided to divest its investment in AnyVision due to the burden of the audit process when it comes to companies that sell such sensitive technology.

Related: Reuters, The Verge, Windows Central , MSPoweruser, M12, MobileSyrup.com, TechCrunch, Tech Wire Asia, Globes

Tweets:@cfarivar


May 15, 2020
David Shepardson, Karen Freifeld, Alexandra Alper / Reuters

David Shepardson, Karen Freifeld, Alexandra Alper / Reuters  
Trump Administration Blocks Chip Supplies to Huawei Raising Fears That China Will Retaliate, Commerce Department Separately Extended Ability of Rural Telcos to Use Huawei Gear

The Trump administration moved to block global chip supplies to blacklisted telecoms equipment giant Huawei Technologies spurring fears of Chinese retaliation and hammering shares of U.S. producers of chipmaking equipment. Under a new rule developed by the Commerce Department, U.S. authority to require licenses for sales to Huawei of semiconductors made abroad with U.S. technology has been dramatically expanded to halt exports to China’s leading smartphone maker. Reports indicate that China is getting ready to put U.S. companies on an “unreliable entity list,” as part of the retaliation against the U.S. move against Huawei. Among the measures contemplated are launching investigations and imposing restrictions on U.S. companies such as Apple, Cisco, and Qualcomm as well as suspending purchase of Boeing airplanes.  The move also hits Taiwan Semiconductor Manufacturing, the biggest contract chipmaker, and key Huawei supplier, which just announced plans to build a U.S.-based plant. Separately, the Commerce Department extended a temporary license that was set to expire on Friday to allow U.S. companies, mostly rural telcos, to continue doing business with Huawei through August 13.

Related: Global Times, Global Times, iMore, Law360, Computer Weekly, SiliconANGLE, Wired, New York Times – Business, South China Morning Post, Cyberscoop, WCCFtech, MacDailyNews, Android CentralZero Hedge, xda-developers, Digit, Multichannel, Law360, MarketWatch.com – Software Industry News, CNBC Technology, Reuters: Business News, The Hill: Cybersecurity

Tweets:@SariArhoHavren

Global Times : Shares of key US firms dive as Chinese govt source leaks retaliation plan on Huawei ban
Global Times : Insider reveals details on China’s plan to target US tech giants to retaliate against Huawei ban
iMore : China threatens companies like Apple with investigations and restrictions
Law360: US Aims To Muscle Huawei Out Of Global Chip Supply Chain – Law360
Computer Weekly: US maintains ban on Chinese tech firms as Huawei, ZTE make 5G leaps
SiliconANGLE: U.S. implements new rules to restrict Huawei’s access to chip technology
Wired: The US Will Help a Taiwan Firm Build a Chip Plant in Arizona
New York Times – Business: U.S. Delivers Another Blow to Huawei With New Tech Restrictions
South China Morning Post: US plans to further restrict Huawei’s development of semiconductors using American technology
Cyberscoop: US Commerce Department tightens screws on Huawei export controls
WCCFtech: Huawei Crippled by the Latest Round of U.S. Sanctions as the Broader Chipmaker Sphere Plunges Into the Red
MacDailyNews: China ready to target Apple, other U.S. firms in retaliation against U.S.’ Huawei ban
Android Central : Trump administration will soon begin blocking Huawei’s global chip supply
Zero Hedge: Futures Tumble After US Restarts Trade War With China, Locks Out Huawei; China Vows Retaliation Against Apple, Boeing
xda-developers: Win a Huawei P40 Pro+ [Open to all Countries]
Digit: Jios new Rs 999 prepaid plan gives users 3GB daily data with a validity of 84 days
Multichannel: Commerce Targets Huawei with New Restrictions
Law360: US Aims To Muscle Huawei Out Of Global Chip Supply Chain – Law360
MarketWatch.com – Software Industry News: Capitol Report: Trump administration moves to cut Huawei off from semiconductor suppliers
CNBC Technology: U.S.-China tensions rise as Trump administration moves to cut Huawei off from global chip suppliers
Reuters: Business News: U.S. moves to cut Huawei off from global chip suppliers
The Hill: Cybersecurity: Commerce Department cracks down on Huawei’s access to chips

@SariArhoHavren: On Friday, “the Trump administration moved to block shipments of semiconductors to Huawei from global chipmakers. The US Commerce Department said it was amending an export rule to strategically target Huawei's acquisition of semiconductors.."


May 7, 2020
Lindsey O'Donnell / Threatpost

Lindsey O'Donnell / Threatpost  
China’s Naikon APT Group is Waging an Espionage Campaign Against Several Governments in the Asia-Pacific Region

Although seemingly silent since Kaspersky Lab discovered them in 20015, China’s state-backed hacking group, the Naikon APT group, is behind a five-year campaign against several governments in the Asia-Pacific region, researchers at Check Point said. The campaign, which accelerated in 20019 and during the first quarter of 2020, is targeting countries in the APAC region, including Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar, and Brunei, in a quest to gather geopolitical intelligence. The attackers are using phishing emails with attachments that contain an invisible cyberattack tool called Aria-body, which had never been detected before and had alarming new capabilities. Naikon will continue to pose as a significant threat, Check Point said, as it uses new server infrastructure, ever-changing loader variants, in-memory fileless loading, and a new backdoor.

Related: CyberSecurity Help s.r.o., TechRepublic, Check Point Research, Engadget, The Hacker News, Reddit – cybersecurity, BleepingComputer.com, CNBC, New York Times, The Times of Israel, Mother Jones, BetaNews, 9News , News.com.au, PerthNow, Braidwood Times, The New Daily, News.com, The West

Tweets:@ronenbergman

CyberSecurity Help s.r.o.: Naikon APT silently spied on government entities in the APAC region for at least five years
TechRepublic: Report: Chinese-linked hacking group has been infiltrating APAC governments for years
Check Point Research: Naikon APT: Cyber Espionage Reloaded
Engadget: A Chinese hacking group is reportedly targeting governments across Asia
The Hacker News: This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 Years
Reddit – cybersecurity: Naikon APT Hid Five-Year Espionage Attack Under Radar
BleepingComputer.com: New ‘Aria-body’ backdoor gets advanced hackers ?back in the spy game
CNBC: New cybersecurity report says China-based group is hacking Asia-Pacific governments
New York Times: Naikon, Group Tied to China’s Military, Deploys Debilitating New Cyberattack Tool
The Times of Israel: Israeli firm says Chinese cyber-espionage tool used to spy on governments
Mother Jones: Amid Coronavirus Cyber Attacks, a New Report Sheds Light on a Major Chinese Hacking Group
BetaNews: Hacker group has targeted Asia Pacific governments in five-year campaign
9News : Top WA department in ‘China cyber attack’ – 9News
News.com.au: Premier hit by hackers with China link
PerthNow: WA Government ‘targeted’ by Chinese hackers with advanced cyberattack tool: report
Braidwood Times : McGowan office in ‘China cyber attack’ – Braidwood Times
The New Daily: WA Premier Mark McGowan’s office targeted in ‘China cyber attack’
News.com.au: Premier hit by hackers with China link
The West : Chinese hackers targeted Premier Mark McGowans office with advanced cyberattack tool, report claims

@ronenbergman: NEW- cyber group affiliated with Chinese intelligence,is using a new never-seen-before powerful hacking weapon, in a series of attacks on embassies,government offices and state owned technology and science companies in Asia and Australia W\ @stevenleemyers


April 20, 2020
Ian Barker / BetaNews

Ian Barker / BetaNews  
COVID-19 Cyberattacks Soar to 14,000 Per Day, Hundreds of Malicious or Suspicious New Domains Registered Related to Stimulus Checks

COVID-19 related cyberattacks rise to an average of 14,000 a day this month, which is six times the average number of daily attacks compared to March, researchers at Check Point Security report. Between April 7 and 14, the average number of daily attacks increased sharply to 20,000, 94 percent of which were phishing. The researchers further found that in March, a total of 2,081 new domains were registered related to stimulus relief packages, with 38 being malicious and 583 suspicious. In the first week of April, 473 were registered, 18 malicious, 73 suspicious.

May 19, 2020
Jasper Jolly / The Guardian

Jasper Jolly / The Guardian  
EasyJet Says Personal Data on Nine Million Customers Were Accessed in ‘Highly Sophisticated’ Cyberattack, Over Two Thousand Customers’ Credit Card Details Stolen

European budget airlines EasyJet has revealed that the personal information of 9 million customers was accessed in a “highly sophisticated” cyberattack on the airline. The company said that email addresses and travel details were accessed, and it would contact the customers affected. Of the 9 million people affected, 2,208 had credit card details stolen, but no passport details were uncovered. Those customers whose credit card details were taken have been contacted, while everyone else affected will be contacted by 26 May. EasyJet offered no details of the hack but said it had “closed off this unauthorized access” and reported the incident to the National Cyber Security Centre and the Information Commissioner’s Office (ICO), the data regulator.

Related: BBC News, TechCrunch, Associated Press Technology, Financial Times Technology, Bloomberg, CNBC Technology, Information Age, Evening Standard, Graham Cluley, Channel News Asia, France 24, IT Pro, PerthNow, Thomas Brewster – Forbes, RT News, MediaNama: Digital Media in India, POLITICO EU, Computer Business Review, The Sun, BetaNews, Voice of America, The State of Security, The Loadstar, RTE, Sky News, Independent

Tweets:@lukOlejnik @dcuthbert @joetidy @racheltobac @zsk @jc_stubbs

BBC News : EasyJet admits nine million customers hacked
TechCrunch: Europe to Facebook: Pay taxes and respect our values — or we’ll regulate
Associated Press Technology: EasyJet reveals ‘sophisticated’ hack of customer details
Financial Times Technology: EasyJet says hackers accessed travel details of 9m customers
Bloomberg: EasyJet Says Hackers Accessed Data of 9 Million Customers
CNBC Technology: EasyJet hack leaves 9 million customers’ details exposed
Information Age: EasyJet data breached, over 9 million customers affected
Evening Standard: Millions of easyJet customers at risk after hackers access personal details
Graham Cluley: EasyJet hack impacts nine million passengers
Channel News Asia: EasyJet hit by cyber attack, hackers access 9 million customers’ details
France 24: Hackers access details of millions of easyJet passengers in cyber attack
IT Pro: Easyjet hack exposes details of nine million customers | IT PRO
PerthNow: Cyber attackers target easyJet
Thomas Brewster – Forbes: EasyJet Hacked: 9 Million Customers And 2,000 Credit Cards Hit
RT News: Hackers steal personal data of 9 million EasyJet costumers in ‘highly sophisticated’ cyber attack
MediaNama: Digital Media in India: Hackers accessed details of 9 million EasyJet customers, credit card details of 2K+ people
POLITICO EU: Easyjet cyberattack hits 9 million customers
Computer Business Review: EasyJet Hacked: 9 Million Customers Affected
The Sun: EasyJet hit by cyber attack with 9million customers details stolen
BetaNews: easyJet hit by ‘highly sophisticated’ cyberattack: 9 million customers’ details exposed
Voice of America: EasyJet Hit by Cyber Attack, Hackers Access 9 mln Customers’ Details 
The State of Security: Around 9 Million easyJet Customers’ Details Stolen in Hacking Incident
The Loadstar: SN: EasyJet: Nine million customers’ details ‘accessed’ by hackers
RTE: EasyJet hit by ‘highly sophisticated’ cyber attack
Sky News: EasyJet: Nine million customers’ details ‘accessed’ by hackers
Independent: EasyJet hacked: 9M customers’ details stolen

@lukOlejnik: Hacked EasyJet. Stolen data of 9M customers, for >2000 of them this includes credit card numbers. Users to be contacted gradually. Certainly not a good time to be an airline :)
@dcuthbert: My personal details are 99% included in this. So, let's play a game shall we? #easyjet
@joetidy: EasyJet’s stock exchange notice about the cyber attack here. Looks like they’ve taken all the correct steps (notifying ICO/ NCSC) etc but if the hack happened in Jan - why are we only learning of it now? http://otp.investis.com/clients/uk/easyjet1/rns/regulatory-story.aspx?cid=2&newsid=1391756
@racheltobac: Prepare to receive phishing emails, texts or calls pretexting as your bank looking to investigate fraud on your account, airlines attempting to cancel, rebook, or alert you to changes on your account, and much more. Contact back using 2nd form of comms ImpRobot face
@zsk: And now my inbox overfloweth with "comments" from PR people's cybersecurity clients, all of whom are scrambling trying to connect the EasyJet data breach with the Covid19 pandemic.
@jc_stubbs: Scoop >> The cyberattack disclosed by #easyJet earlier today is thought to be the work of a suspected Chinese hacking group that has targeted multiple airlines in recent months, two sources tell @Reuters


May 4, 2020
Andy Greenberg / Wired

Andy Greenberg / Wired  
Apple and Google Release Details on Their Coronavirus Contact Tracing App, Only Governments Will Have Access to API, Location Tracking Banned

Apple and Google have released new details on their Bluetooth-based system that will let health care authorities track potential encounters with Covid-19, making clear that only government agencies, preferably at the national level, will be given access to the application programming interface. However, the two tech giants are willing to work with regional and state-level authorities. If government-run apps want access to Apple and Google’s Bluetooth-based system, they won’t be allowed to collect location data. They must ask for consent before collecting information on a user’s proximity to others. They will also need permission to upload any information from the phones of Covid-19 positive people as well. The two companies also published sample user interfaces for the first time. However, they say the images for how the contact tracing system will work are merely for reference because health agencies will build the final apps.

Related: Data Protection Report, ET news, CPO Magazine, The Register – Security, DataBreachToday.com, TechTarget, MSSP Alert, Computer Business Review, Voice of America, Panda Security Mediacenter, MacDailyNews, MacDailyNews, The Sun, TechTarget, Vox, Reuters, Ars Technica, RT USAAndroid Authority, xda-developers, CNBC, Slashdot, MacDailyNews, Engadget, The Verge

Tweets:@a_greenberg @Wired @josephmenn @ncweaver @lukOlejni

Data Protection Report: StopCovid: the French contact-tracing app
ET news: France’s StopCovid app to begin testing before wider rollout
CPO Magazine: MIT Researchers Develop a COVID-19 Contact Tracing App That Preserves Privacy Using Random IDs
The Register – Security: India makes contact-tracing app compulsory in viral hot zones despite most local phones not being smart
DataBreachToday.com: Digital Contact-Tracing Apps: Hype or Helpful?
TechTarget: Research institutes warn of necessity for UK contact-tracing app to…
MSSP Alert: COVID-19, Contact Tracing and U.S. Government Surveillance Concerns: Research
Computer Business Review: ICO Releases Data Protection Guide for Contact Tracing Apps
Voice of America: European Virus Tracing Apps Highlight Battle for Privacy
Panda Security Mediacenter: What to expect from the upcoming Apple and Google contact tracing apps
MacDailyNews: France continues to insist on centralized COVID-19 contact tracing while Apple refuses to budge
The Sun: What is the contact tracing app and how do I download it?
TechTarget: NHSX contact-tracing app needs legislative oversight
Vox: Contact tracing, explained
Reuters: Apple, Google ban use of location tracking in contact tracing apps
Ars Technica: Here’s how Apple, Google will warn you if you’ve been exposed to COVID-19
RT USA: Google & Apple set some lucky programmers up for lucrative monopoly with new rules for contact-tracing app
Android Authority: Google, Apple lay out strict rules for Exposure Notification API, no GPS data
xda-developers: [Update 5: Screenshots, No Location Tracking] Google and Apple announce the Contact Tracing API and Bluetooth spec to warn users of COVID-19
CNBC : Apple and Google reveal what their coronavirus contact tracing system might look like (CNBC: Top News)
Slashdot: Apple, Google Ban Use of Location Tracking in Contact Tracing Apps
MacDailyNews: Apple, Google ban use of location tracking in contact tracing apps
Engadget: Apple and Google tell health departments their privacy requirements for coronavirus tracking
The Verge: Apple and Google show what their exposure notification system could look like

@a_greenberg: Google and Apple have clarified a few more privacy restrictions for the apps that will use their Bluetooth-based Covid-19 exposure alert system. They've also shown some examples of what it could look like: http://wired.com/story/apple-go… This will not be a fun push notification to get.
@Wired: Apple and Google have released new details on their contact tracing plans. Only government agencies will be able to access the application programming interface, and the apps will not be allowed to collect location data. Here's how the apps might look:
@josephmenn: Apple, Google ban use of location tracking in contact tracing apps
@ncweaver: OK, I'm starting to agree with @stewartbaker that Apple & Google are taking the privacy thing too far: https://reuters.com/article/us-health-coronavirus-usa-apps-idUSKBN22G28W Keeping location data on the phone for contact tracing for 14 days, along with the bluetooth contact data, is privacy sensitive and reasonable.
@lukOlejni: Google and Apple will ban the use of geolocation to contact tracing #COVID?19, including for government apps. Technological policing? ;) https://reuters.com/article/us-health-coronavirus-usa-apps-idUSKBN22G28W?taid=5eb053bc3b463d000141f938


April 22, 2020
Ben Makuch / Vice News

Ben Makuch / Vice News  
Far-Right Groups Circulate Allegedly Hacked Email Addresses, Passwords for Gates Foundation, WHO, CDC Members, Data Likely Stems From Previous Data Breaches

A data dump of what appears to be outdated email addresses and passwords of members of the Gates Foundation, World Health Organization (WHO), Center for Disease Control and Prevention (CDC), and a virology center based in Wuhan, China, is circulating within a network of neo-Nazi extremists who claim the data was hacked. The goal of the data dump, which first appeared on conspiracy site 9chan, seems to be intimidation of governmental and non-governmental health organizations fighting against the COVID-19 pandemic. Although it is unclear, the leaked data appears to be an aggregation of previously-hacked usernames and passwords that was compiled from a previous data breach. Far-right extremists, particularly “accelerationists” who are seeking to hasten the collapse of society, are keenly interested in the spread of disinformation surrounding coronavirus. The dump migrated from 9chan to a Telegram channel with over 5,000 followers and links to neo-Nazi terrorist organizations Atomwaffen Division and The Base. The Bill and Melinda Gates Foundation said they had found no evidence of a data breach.

Related: Fast Company, Tech Insider, Heavy.com, NBC News, Washington Post, protothemanews.com, Gizmodo Australia, Security News | Tech Times, Security Affairs, Zero Hedge, MSN, BGR, CNET, Gadgets Now, Daily Dot, DataBreachToday.com, The Independent

Tweets:@JaneLytv @JaneLytv

Fast Company: Gates Foundation, WHO hacks are part of a growing wave of attacks on science and health officials
Tech Insider: Neo-Nazis have got hold of 20,000 leaked email addresses and passwords allegedly belonging to WHO and the Gates Foundation, researchers say
Heavy.com: Bill Gates Hacked? Coronavirus Conspiracy Theories Rage
NBC News: Logins of WHO, Gates Foundation employees circulate on fringes of the internet
Washington Post: Nearly 25,000 email addresses and passwords allegedly from NIH, WHO, Gates Foundation and others are dumped online
protothemanews.com: Gates Foundation and WHO hacked with thousands of documents and e-mails leaked online
Gizmodo Australia: Right-Wing Extremists Appear To Be Circulating 25,000 Stolen WHO, NIH Passwords And Emails
Security News | Tech Times: 25,000 Email Addresses and Passwords from the CDC, WHO, Gates Foundation Were Dumped Online
Security Affairs: COVID-19 – Neo-Nazis spread a list of credentials for Gates Foundation, NIH, and WHO employees
Zero Hedge: Email Addresses And Passwords From WHO, NIH, Wuhan Lab, And Gates Foundation Dumped On 4chan
MSN : Nearly 25,000 email addresses and passwords allegedly from NIH, WHO, Gates Foundation and others are dumped online
BGR: Thousands of email addresses and passwords from CDC, WHO, and more leaked online
CNET: Passwords for WHO, CDC, Gates Foundation employees reportedly spread online
Gadgets Now: WHO, Wuhan Institute data hacked: Report
Daily Dot: Why the Gates Foundation, WHO were hacked at the same time
DataBreachToday.com: WHO, Gates Foundation Credentials Dumped Online: Report
The Independent: State-sponsored hackers target US government employees with fast food bait amid fog of coronavirus

@JaneLytv: Yesterday, links to a fake “hack” of the WHO, Gates Foundation, and CDC were posted to 4ch and anon conspiracy-focused Twitter accounts. As many have pointed out, the hoax hack was actually a compilation of old leaked email and password databases. Not a new or recent breach.
@JaneLytv: To confirm, I reached out to the Gates Foundation and the WHO. The Gates Foundation said they did not suffer any new breaches. The WHO confirmed that too, saying some of the published emails were genuine but nobody was able to use the credentials to log in. Statements below: