Pro-Trump Recent Twitter Clone Leaks User Data on Day 1

[ad_1]
Security risks of pro-Trump media pages has become the theme of 2021: First, a A bad license to Parler allowed all his records to be removed a few hours before the demolition by those who help to entertain guests and go out. Then Gab was hacked by hackers who stole and released his 40 million copies, both publicly and publicly. Now a page called Gettr, launched by a former Trump employee, has become the third, strongest in the worst-case race between pro-Trump sites, where thieves have succeeded Set up high-profile accounts and push thousands of people into their secrets, including email addresses and birthdays – all before.
Fortunately for Gettr, there were some very bad news reports during the self-defense week, which severely disrupted the current global epidemic. Lily Hay Newman of WIRED looked at new things are being revealed about the theft of remote Kaseya management equipment, which resulted in the death of thousands of companies by ransom, as well as the threat posed to Kaseya about three months before the use of the gun. We also reviewed the errors of Microsoft’s malware, which the company tried toand he has failed!-Fix this week.
In other articles, we saw how Amazon’s Echo became invisibly saves resources even after repairs, the status of European rulers and security guards pushing a complete ban on biometric control, and how difficult it is to leave a secret path in favor of proven safeguards.
And there are more. Every week we encourage all security issues WIRED does not explain in detail. Click on the headlines to read all the articles, and stay safe out there.
Given the security situation with Parler and Gab, it should come as no surprise that the newly-appointed Trump Trump fundraisers have also been spotted: On its opening day, July 4, burglars immediately hacked the site and revealed non-secret information to at least 85,000 people, including emails usernames, names, and birthdays, as first seen by the human rights company at Hudson Rock. The breach of the privacy policy appears to have been made possible by the missing API — a problem that security experts described even before the page was launched. Instead, many users of the site were also hacked directly, in mysterious ways: Legitimate congresswoman accounts right Marjorie Taylor-Greene, former secretary of state Mike Pompeo, Steve Bannon, even the founder of the page, former Trump employee Jason Miller, all captured by someone named “@JubaBaghdad.” For his part, Trump, has refused to participate in the process – either because of security concerns, or because He was overwhelmed by the pornographic Sonic Hedgehog.
Review of MIT Tech’s Patrick Howell O’Neill has made a number of interesting articles from cybercriminal cat-and-mouse games: a story about how a coalition between the FBI, the Ukrainian spy agency SBU, and the Russian FSB met to capture some of Russia’s biggest terrorists. – and it has failed. The three organizations worked together for a number of months to review and follow up on their findings, with well-known figures such as Evgeniy Bogachev, chief executive of botnet called Game Over Zeus, and Maksim Yakubets, leader of the Evil Corp. 100 million digital theft. At a time when the agencies had reorganized their operations, the Ukrainian SBU repeatedly delayed the operation – probably due to corruption in their ranks – and the Russian FSB withdrew its full response from the FBI, assisting those who already had it. As Howell O’Neill wrote, one of the most serious human trafficking incidents in history – as well as the extraordinary attempts to cooperate between the US and Russian police forces – were thwarted by “a vicious cycle of corruption, strife, and stoning.”
Last month the FBI and Australian and European law enforcement agencies revealed that they had secretly taken over and operated a mobile phone company called Anom. He used the company to sell phones that he claimed were kept confidential by suspected scammers around the world. The phones had a secret door where they were used by more than 800 alleged terrorists. Now the Board has found and reviewed one of the phones used for the project. He explains how he hid his hidden form within a fake accounting program, ran an operating system called ArcaneOS, and provided a quick look. It also makes for an interesting reminder from one of the great laws that has been broken by international organizations – as long as you are not one of the many owners who will be imprisoned for this.
In the wake of Kaseya’s fall this week, Bloomberg said something about Russia’s kidnapping: All Cozy Bear robbers, formerly linked to Russia’s SVR, have violated a Republican National Committee, two people familiar with the matter he told Bloomberg. The RNC denied any wrongdoing – but acknowledged that the RNC technology specialist, Synnex, had been robbed last week. It is not known if the incident is linked to Kaseya’s robbery, which is linked to the use of a Russian weapon called REvil. But since SVR has the task of unknowingly taking part in politics and all governments, it is probably not surprising that it targeted the RNC, just as it targeted the DNC in 2016.
Many Great Stories
[ad_2]
Source link