Everything is old New this week again Ransomware makes a comeback It made headlines and hit an important Iowa Grain Cooperative and other targets.with WIRED and DeSnake sit down, The former No. 2 figure in the dark web market AlphaBay, listen to the news of his reappearance and restart four years after AlphaBay was banned by law enforcement. “After the raid, AlphaBay’s name was exposed. I am here to make up for this,” DeSnake said.
With the annual release of Apple’s latest mobile operating system, iOS 15, the atmosphere of Groundhog Day continues.The new operating system is equipped with Lots of privacy features, Including more detailed details about your application, a mechanism to block email trackers, and a VPN-Tor Frankenstein monster called iCloud Private Relay to protect your browsing activity. A handy guide to using WIRED Speed up and start changing some settings.
If you want a DIY project that has nothing to do with the walled garden of a technology company, we have about How to set up your own network attached storage (NAS) plugs directly into your router, allowing you to share files between devices or easily store backups.
there are more! Every week we collect all safety news that WIRED has not covered in depth. Click on the title to read the full story and stay safe there.
A letter to Congress shared with Motherboard shows that the National Security Agency, the Central Intelligence Agency, and other members of the intelligence community use ad blockers as security protection on their networks. “IC implemented web-based ad blocking technology and used multiple layers of information including domain name system information to block unwanted and malicious ad content,” the IC chief information officer wrote in the letter.
You can use ad blockers to make your browsing experience more enjoyable, but these tools also have potential defensive advantages. Attackers who try to place malicious ads on unethical ad networks or taint advertisements that look legitimate can steal data or sneak malware into your device when you click, and sometimes exploit network vulnerabilities. The fact that IC views advertising as an unnecessary risk or even a threat illustrates a long-standing problem in the industry. The National Security Agency and the Network Security and Infrastructure Security Agency have issued public guidelines in recent years, recommending the use of ad blockers as security protection, but the IC itself does not need to take this measure. Its members voluntarily deployed ad blockers.
Due to a flaw introduced by the developers of the malicious platform, the security department of the Russian telecom giant Rostelecom removed part of the infamous botnet this week. This error allowed Rostelecom to “Tiankeng“Part of the system. A botnet is an army of zombies that are infected with malware to centrally control and coordinate operations. These platforms are commonly used in DDoS attacks, in which attackers direct large amounts of spam traffic to the targeted Web system , Trying to overload them.
The Meris botnet is currently the largest botnet available to cybercriminals and is thought to consist of approximately 250,000 systems working together. It has been used to combat targets in countries such as Russia, the United States, and the United Kingdom. The partial demolition of Rostelecom is significant because the Meris attack is very powerful and challenging for the target. Earlier this month, the Meris attack on the Russian tech giant Yandex broke the record for the largest DDoS attack ever. Yandex tries to protect itself from attacks.
European law enforcement agencies in Italy and Spain arrested 106 people suspected of carrying out large-scale fraudulent activities over the years, and the total profit in the last year alone exceeded 11.7 million U.S. dollars. The police said this week that the person involved was connected to an Italian mafia organization. The suspects allegedly carried out phishing schemes, conducted commercial email intrusion scams, launched SIM swap attacks, and often committed credit card fraud against hundreds of victims. Allegedly, the activity is also related to drug trafficking and other property-related crimes. In order to actually extract funds from these digital frauds, the suspect allegedly used money mules and shell company systems to launder money. In addition to the arrests, law enforcement agencies also frozen 118 bank accounts and confiscated computers, SIM cards, 224 credit cards and the entire cannabis plantation.
More exciting connection stories