Apple is challenging U.K.’s iCloud encryption backdoor order

Apple is challenging a U.K. Government data access order in the Investigatory Powers Tribunal (IPT), the Financial Times reports. The order targeted iCloud backups that are protected by end-to-end encryption. Last month, press leaks revealed the existence of the January order asking Apple to build a backdoor in iCloud’s encrypted backups. U.K. officials are exercising […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems.
“The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers

The Hacker News – ​Read More

Google Cuts Off uBlock Origin on Chrome as Firefox Stands Firm on Ad Blockers

The problem started with Manifest V3, Chrome’s new extension specification, which is supposed to improve privacy.

Security | TechRepublic – ​Read More

3 VMware Zero-Day Bugs Allow Sandbox Escape

The now-patched bugs are under active exploit and enable attackers to carry out a wide range of malicious activities, including escaping a virtual machine and gaining access to the underlying host.

darkreading – ​Read More

Threat Actor ‘JavaGhost’ Targets AWS Environments in Phishing Scheme

Palo Alto Networks’ Unit 42 details how a threat actor is dodging detection with careful targeting and the use of Amazon’s native email tools.

darkreading – ​Read More

Avoid unexpected credit card charges with my ultimate online shopping hack

I never use my personal credit card for free trials, and I never share my card info with unfamiliar vendors. Here’s what I do instead.

Latest stories for ZDNET in Security – ​Read More

Serbian Police Hack Protester’s Phone With Cellebrite Exploit Chain

Amnesty International said Serbian police used an exploit chain in tandem with legitimate mobile extraction dongle from vendor Cellebrite in an attack that brings up questions around ethical technology development.

darkreading – ​Read More

North Korea’s Latest ‘IT Worker’ Scheme Seeks Nuclear Funds

Fraudulent IT workers are looking for engineering and developer positions in the US and Japan, and this time it’s not about espionage.

darkreading – ​Read More