Tech News

Hackers Donate $ 90M From Japan’s Liquid Crypto Exchange

[ad_1]

Earlier this week, T-Mobile has confirmed the data breach affecting at least 48 million people, a number that could rise as the company continues to investigate. The archives contain important information such as social security numbers, driver’s license, and he says even the unique IMEI numbers associated with each phone. Not only that, but also most of the victims so far are not T-Mobile customers; but instead of old or prospective customers who sometimes apply for a loan with the carrier. The court has already filed a lawsuit despite the fact that a court ruling in the case of T-Mobile customers could be a barrier to a refund.

We also highlighted the dangers posed by ThroughTek Kalay, a software development tool for a platform that provides tens of thousands of online video tools. This means babysitters, security cameras, and so on. Researchers have shown how attackers can use the error to watch live videos in real time or shut them up in this rebellion. Through Tek sent out updates in 2018 that offered ways to reduce attacks, but not clear guidelines on how customers should apply.

Google has made a similar change to Workspace, a cloud-based software platform formerly known as G Suite, after the 2017 Google Docs worm revealed how the platform was at risk of fraud. But a security analyst has indicated that it is it is very possible for volunteer hackers to use a cruel system.

Tens of a human rights organizations are in control because of the complexities that Apple used people iPhones that help find child rape items. China has become a false power and soon turned to the BBC, attacking various reports that contradict the country’s interests. And we made haste to guide how to send missing messages in the most popular social networking programs.

And there is more! Every week we encourage all security issues WIRED does not explain in detail. Click on the headlines to read all the articles, and stay safe out there.

It has been a great month to steal cryptocurrency money! Last week it was Poly Network, which saw hackers coming out with $ 610 million in several digital currencies before restoring many. Now it’s time for the Liquid. The cryptocurrency exchange in Japan also reported this week that its “hot” wallets – which are connected to the internet, as opposed to “cold” wallets, which are not the same – were hacked into a scam that resulted in nearly $ 97 million worth of bitcoin, ethereum, and other cash. The fluid allegedly moved some of the goods into the cold bags as a response, but damage was done.

Elliot Carter uses a page called WashingtonTunnels.com, which gives his name. The “DC Underground Atlas” describes in detail the underground routes of the US capital. As you can imagine, this often attracts lovers instead of seeing the rise of highways. That is, until a few days before The rebels seized the US Capitol. About that time, Carter told NBC-affiliated NBC, he saw an increase in the number of visitors from all over the country, many of whom came from “anonymous telecommunications stations, places and organizations named after the military or guns, or using Donald’s name. Trump. ” Doubtful! Carter reported the incident to the FBI, and a few days later this happened.

The bad news is that thieves swindled the US Census Bureau in January 2020, in a way that could have failed and possibly embarrassed them. The good news, or a few bad news, is that the burglars did not find anything close to human census results. But he got a chance to server because of the threat that software company Citrix revealed a few weeks earlier, the next day a confirmation of the idea of ​​using the error was posted on GitHub. According to the time of the Office of the Inspector General, the Cwall Bureau firewall prevented the fighters from connecting to their monitoring and control server after a few days, but it took the gods to end the intrusion.

Apple takes a very strong line against exit, sending a team of researchers to reduce the loss of corporate secrets and reduce falls. They must also register one of the members in the community who sells illegal Apple licenses and equipment, according to a new Motherboard report. The informant reportedly spoke with Apple, instead of circling, but eventually disrupted their relationship. It’s worth reading to understand Apple’s team that fights losses as well as people who try to hunt them down.


Many Great Stories

[ad_2]

Source link

Related Articles

Leave a Reply

Back to top button