Technology

Israel says Iran is hacking to monitor security cameras

In Israeli air strike This week, Iran began severely restricting its citizens’ internet connections, limiting access to Iranians to critical information and deliberately pushing them to domestic applications that may not be secure, a looming threat this week and starting to severely restrict its citizens’ internet connections. Meanwhile, an Israel-bound hacker group known as the predatory sparrow is launching Sebval on Iran’s financial system, attacking Iran’s Sepa Bank and destroying more than $90 million in cryptocurrency held by Iran’s cryptocurrency exchanges.

As the U.S. violent shooting frenzy in Minnesota is still targeting Democratic state lawmakers and their families, the FBI affidavit states that allegedly used the data broker website to find the target’s address and possibly make other personal information about it. The finding highlights the potential dangers of widely available personal data.

This week, Wired released ways of how to win a battle plan, including a review of our tools for the Trump administration’s attack on civil liberties, and the latest version in our guide to protect ourselves from government surveillance, protest safely in the age of surveillance, and protect ourselves from telephone searches at the U.S. border. Don’t forget to print your own copy of How to Win a Fight when you use it! Better yet, print two and leave them at your local coffee shop or library.

And more. Every week, we fill in security and privacy news that we don’t cover in depth. Click on the headlines to read the full story. And stay safe.

Israeli officials said this week that Iran is espionage in damage to private security cameras across Israel as the two countries strike after Israel’s first explosion. A former Israeli cybersecurity official warned on public radio this week that Israelis should confirm that their home security cameras are protected or turned off by strong passwords. “We know that over the past two or three days, Iranians have been trying to contact the cameras to understand what happened and where the missiles are to improve their accuracy,” said Refael Franco, former deputy director of the Israeli National Network. Like many Things Internet devices, they are known to be easy to take over if the surveillance cameras do not have strong account protection. They have previously targeted other conflicts in other conflicts that intelligence gathered.

The Kiev Post reported this week that hackers from the major Ukrainian intelligence agency (HUR) launched a cyber attack on Russian internet service provider Orion Telecom, which disabled 370 servers, removed about 500 network switches and cut down weakened backup systems to hinder recovery. These attacks reportedly caused power outages on the Internet and TV. Orion Telecom reportedly said it is recovering from a large DDOS attack and will quickly restore services. The attack took place on June 12, the national holiday, called Russia Day. “Happy holidays, disrespect for Russians,” the attacker wrote in a message from the telegram group. “Soon you will live in the Stone Age and we will help you get there. Glory Ukraine.” The attacker claimed to be part of the Ukrainian BO team hacking group. Sources told the Kiev Post that Russian security agencies are using Orion telecom for Ukraine and are affected by the disruption of connectivity.

Bloomberg reported this week that satellite communications company Viasat discovered a violation of the violations conducted by a hacker team centered on espionage in China’s Salt Platform Typhoon earlier this year. In early December, U.S. authorities revealed that the Salt Typhoon hacker embedded itself in major U.S. telecommunications, including AT&T and Verizon. After the revelation of the group’s extensive telecom hacking rave in the U.S. and elsewhere last year, Wired reported in February that the salt typhoon is still actively violating new victims. Viast said it has been working with federal authorities to investigate its violations.

The UK Information Commissioner’s Office (ICO) said this week it fined £2.31 million ($3.1 million) to troubled genetic testing company 23andMe as it hurts data breaches in 2023. The attacker was able to access user accounts and their data using stolen login credentials because 23AndMe did not require the user to set up two-factor authentication at the time, and the ICO stated that it was a violation of the UK’s data protection law. The company has since imposed this protection on all users. According to the ICO, data from more than 155,000 UK residents were stolen, which said when the violation occurred, 23andMe “has no additional verification steps available for users to access and download their original genetic data”.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button