Category: Security & Privacy

  • FTC Eases Enforcement of Children’s Online Privacy Law for Age Verification Technologies

    This article was generated by AI and cites original sources.

    The Federal Trade Commission (FTC) has decided not to enforce the Children’s Online Privacy Protection Act (COPPA) Rule against certain websites that collect and utilize minors’ personal data for age verification purposes. Instead, the FTC is encouraging the adoption of age verification technologies.

    According to a statement by Christopher Mufarrige, the director of the Bureau of Consumer Protection, these technologies are considered effective in protecting children online and offer parents tools to safeguard their children’s privacy. Websites must meet specific criteria under the COPPA Rule to be exempt from enforcement, such as deleting data after verification, disclosing data collection to users, implementing robust security measures, and ensuring accurate verification results.

    While proponents of age verification technologies welcome the FTC’s move, some privacy advocates, including the Electronic Frontier Foundation (EFF), are cautious about the effectiveness of these tools in enhancing online child protection. The debate continues on the impact and efficacy of age verification technologies in safeguarding minors’ privacy on the internet.

    Source: The Verge

  • NATO Approves Apple Devices for Handling Classified Information

    This article was generated by AI and cites original sources.

    In a significant development, NATO has officially sanctioned the use of iPhones and iPads for storing NATO-restricted information. The approval signifies that standard devices running iOS 26 and iPadOS 26 are now deemed secure enough to manage classified data without the need for additional software or configurations, as reported by The Verge.

    The NATO-restricted classification represents the lowest tier of classified data, encompassing information that could be detrimental to NATO’s interests if exposed. Notably, this clearance aligns with the endorsement granted to BlackBerry 10 phones back in 2013 for handling similar levels of classified information.

    Following a meticulous assessment by Germany’s Federal Office for Information Security (BSI), Apple’s iPhone and iPad have now received the green light for processing classified data within the German government. Subsequently, the BSI has extended its approval to Apple devices with iOS 26 and iPadOS 26 for use across NATO member nations.

    Apple attributes this milestone to the robust security features embedded in its devices, such as encryption, Face ID biometric authentication, and Memory Integrity Enforcement aimed at combatting spyware. These measures have been acknowledged as meeting rigorous government and international security standards.

    Source: The Verge

  • Spyware Maker Sentenced for Illegal Wiretapping in Greece

    This article was generated by AI and cites original sources.

    In a recent legal development, the founder of Intellexa, a spyware collective, has been sentenced to eight years in prison by a Greek court for illegal wiretapping and privacy violations.

    The scandal, known as the ‘Greek Watergate,’ traces back to 2022 when the Greek government allegedly used Intellexa’s spyware to eavesdrop on politicians, journalists, business figures, and military personnel.

    Tal Dilian, along with three other Intellexa executives, faced trial for their involvement in the wiretapping scheme. The court’s decision marks a significant moment, as it is reportedly the first time a spyware maker has been imprisoned due to the misuse of their technology.

    Notably, in 2024, the U.S. government imposed sanctions on Intellexa, Dilian, and others associated with the company for their role in developing Predator, the spyware used to target Americans, including government officials and journalists.

    As the legal proceedings continue, the court has instructed authorities to conduct further investigations, while the defendants have the option to appeal the verdict.

    Source: TechCrunch

  • Former U.S. Defense Contractor Sentenced for Leaking Sensitive Hacking Tools to Russia

    This article was generated by AI and cites original sources.

    A former cybersecurity executive, Peter Williams, has been sentenced to 87 months in prison for selling sensitive hacking and surveillance tools to a Russian firm. Williams, who previously worked at the U.S. defense contractor L3Harris, pleaded guilty to leaking his company’s trade secrets in exchange for $1.3 million in cryptocurrency between 2022 and 2025. This case highlights the risks associated with insider threats and the importance of robust security measures within tech companies.

    Williams, the former general manager of Trenchant, a division of L3Harris specializing in developing hacking tools, misused his access to the company’s secure networks to download these tools and sell them. The tools, known as zero-day exploits, are highly valuable in the cybersecurity market due to their ability to exploit unknown software vulnerabilities, potentially compromising millions of computers.

    This incident underscores the critical need for stringent security protocols to prevent unauthorized access and data exfiltration within tech organizations. It also highlights the ongoing challenges in safeguarding intellectual property and proprietary technology from malicious actors seeking to exploit vulnerabilities for personal gain.

    Source: TechCrunch

  • 1Password Announces Price Increase to Fund Ongoing Innovation and Security Enhancements

    This article was generated by AI and cites original sources.

    1Password, the popular password manager, will be increasing its prices starting March 27th, 2026. The individual plan will rise from $3.99/month to $4.99/month, while the family plan will increase from $6.95/month to $7.99/month. In an email to users, 1Password explained that despite providing enhanced features and capabilities over the years, its pricing has remained stable for an extended period.

    The company stated that the price adjustment is necessary to support ongoing innovation and maintain top-notch security measures. Recent updates to the platform include new features like saving logins and payment details, anti-phishing protection, and streamlined device setup processes.

    1Password emphasized that the revised pricing structure will impact users at their next renewal following March 27th, aligning with the company’s commitment to continuous service improvements.

    Source: The Verge

  • Insights into Tech Companies’ Responses to Government Data Requests Revealed in Epstein Files

    This article was generated by AI and cites original sources.

    A recent disclosure by the US Justice Department has shed light on how tech giants like Google handle government inquiries, as revealed through the Epstein Files. These documents provide insights into the intricate processes tech companies follow when responding to subpoenas and requests for user data.

    WIRED’s investigation uncovered numerous grand jury subpoenas directed at Google, along with documents indicating the data produced about specific users and Google’s official responses to these requests. While Google refrained from commenting on the specific contents of the disclosed documents, the company emphasized its commitment to safeguarding user privacy while complying with legal obligations.

    The revealed documents highlight the extent to which government agencies seek information without judicial review, Google’s resistance to requests deemed excessive, and the types of user data the company has shared in response to legal demands.

    Subpoena processes, typically veiled in secrecy, were brought to light in these disclosures. Instructions from the US attorney’s office in 2019 to Google prohibited the disclosure of a subpoena’s existence to a specific individual for a set period, emphasizing the covert nature of such legal proceedings.

    These revelations underscore the delicate balance that tech companies must maintain between user privacy and legal compliance in the face of government requests for information.

    Source: WIRED

  • Cybersecurity Breach at CarGurus Exposes Risks in Online Auto Marketplaces

    This article was generated by AI and cites original sources.

    In a recent cybersecurity incident, the popular online automotive marketplace CarGurus fell victim to a data breach, impacting approximately 12.5 million user accounts. The breach, which compromised sensitive user information including names, email addresses, phone numbers, and physical addresses, was attributed to the actions of the ShinyHunters hacking group.

    CarGurus, established in 2006, offers a platform for individuals to engage in buying, selling, and financing vehicles online. The breach underscores the importance of robust cybersecurity measures in safeguarding user data on digital marketplaces.

    According to Have I Been Pwned, a renowned data notification service operated by security researcher Troy Hunt, the extent of the breach highlights the potential risks associated with cyber threats in the automotive e-commerce sector.

    The ShinyHunters group, notorious for their social engineering tactics, has a history of targeting organizations through deceptive means, as seen in their previous data breaches affecting prominent entities such as Salesforce, Google, and Workday. The breach serves as a stark reminder of the ongoing cybersecurity challenges faced by online platforms in protecting user privacy.

    CarGurus, along with other affected parties, is expected to address the breach and enhance security protocols to mitigate future risks. The incident sheds light on the critical need for continuous vigilance and proactive measures to combat evolving cyber threats in the digital automotive marketplace.

    Source: TechCrunch

  • Former L3Harris Trenchant Executive Sentenced for Selling Hacking Tools to Russian Firm

    This article was generated by AI and cites original sources.

    Peter Williams, the former general manager of U.S. hacking tools maker L3Harris Trenchant, has been sentenced to seven years in prison for selling the company’s hacking and surveillance tools to a Russian firm. This incident raises concerns about the security implications of advanced hacking tools falling into the wrong hands.

    Williams admitted to selling seven trade secrets to a Russian broker. The U.S. Department of Justice highlighted the potential global impact of these tools, capable of compromising millions of computers and devices worldwide.

    This case underscores the critical need for robust cybersecurity measures and stricter controls over the distribution of sensitive hacking technologies. The incident also highlights the challenges in preventing insider threats within tech companies dealing with cutting-edge security tools.

    As technology continues to advance, ensuring the responsible use and safeguarding of such powerful hacking capabilities is paramount to maintaining digital security on a global scale.

    Source: TechCrunch

  • U.S. Sanctions Russian Firm for Acquiring Stolen Cyber Exploits

    This article was generated by AI and cites original sources.

    The U.S. Treasury has taken action against a Russian firm known for acquiring undisclosed software vulnerabilities and reselling them for potentially malicious purposes. The sanctions target Operation Zero, a company accused of obtaining cyber exploits stolen from a U.S. defense contractor.

    Operation Zero’s activities, including offering substantial sums for exploits targeting popular platforms like Android, iPhones, and Telegram, underscore the growing sophistication of cyber threats faced by governments and organizations worldwide. These zero-day exploits, while lucrative commodities in the cyber underworld, present significant risks to U.S. national security, foreign policy, and economy.

    By disrupting these activities, authorities aim to mitigate the potential impact of cyberattacks fueled by stolen exploits and unauthorized access to sensitive software vulnerabilities. The Treasury’s move sheds light on the intricate web of cyber espionage, where actors like Operation Zero operate at the intersection of technology, security, and geopolitics.

    Source: TechCrunch

  • Cybersecurity Breach: Chinese Hackers Exploit VPN Vulnerabilities, Compromise Ivanti Customers

    This article was generated by AI and cites original sources.

    In a recent cybersecurity incident, Chinese hackers reportedly infiltrated the network of an Ivanti subsidiary through vulnerabilities in its VPN software, potentially compromising the data of multiple organizations. The breach, which dates back to February 2021, involved exploiting a backdoor in Pulse Secure’s VPN product, as detailed by Bloomberg. This backdoor granted unauthorized access to 119 other entities utilizing the same VPN solution.

    According to sources, Mandiant, a prominent cybersecurity firm, was aware of the breaches and alerted Ivanti about the exploitation of the software bug, affecting various European and U.S. military contractors. The incident underscores the critical importance of robust cybersecurity measures, especially in a landscape where malicious actors continuously target vulnerabilities in popular software.

    Furthermore, the report highlighted the impact of organizational changes following private equity acquisitions on cybersecurity practices. Ivanti’s acquisition by Clearlake Capital Group in 2017 led to cost-cutting measures, including layoffs that may have impacted the security posture of its technologies. Similar challenges were observed in the cybersecurity realm with Citrix, following acquisitions by investment firms Elliott Management and Vista Equity Partners.

    As cybersecurity threats continue to evolve, organizations must prioritize proactive security measures, regular software updates, and comprehensive risk assessments to safeguard against potential breaches.

    Source: TechCrunch

  • Public Backlash Grows Against Flock Surveillance Cameras in the U.S.

    This article was generated by AI and cites original sources.

    Amid rising public concern over the use of Flock surveillance cameras and their potential ties to U.S. immigration authorities, Americans are taking direct action against the technology, reports Brian Merchant for TechCrunch. Flock, a $7.5 billion Atlanta-based startup, manufactures license plate readers that have come under scrutiny for their perceived connections to U.S. Immigration and Customs Enforcement (ICE).

    The surveillance cameras, which are spread across the country, capture license plate data that can be accessed by federal authorities. While Flock denies direct data sharing with ICE, reports suggest that local police have shared access to Flock’s cameras and databases with federal agencies.

    Instances of vandalism against Flock cameras have been reported in various states, including California, Connecticut, Illinois, and Virginia. In La Mesa, California, cameras were destroyed despite city council approval for their continued use, reflecting residents’ privacy concerns and opposition to the technology.

    DeFlock, a project mapping license plate readers, estimates nearly 80,000 such cameras in the U.S. The public pushback highlights a growing resistance to surveillance technologies with perceived links to controversial government practices.

    Source: TechCrunch

  • Wikipedia Blacklists Archive.today Amid Allegations of DDoS Attack and Content Tampering

    This article was generated by AI and cites original sources.

    Wikipedia editors have taken action by removing all links to Archive.today, a popular web archiving service that has been heavily referenced on the online encyclopedia. The move comes after concerns were raised about Archive.today’s alleged involvement in a distributed denial of service (DDoS) attack and allegations of content alteration.

    Archive.today, known for providing access to paywalled content and serving as a resource for Wikipedia citations, has faced scrutiny due to its association with potentially malicious activities. The decision to blacklist Archive.today was reportedly supported by evidence that the service may have compromised users’ computers to launch DDoS attacks and tampered with archived content, raising reliability concerns.

    Notably, the recent DDoS attack targeted blogger Jani Patokallio, who reported unauthorized scripts running on the archive’s CAPTCHA page, leading to increased traffic on his blog. Patokallio’s prior investigation into Archive.today highlighted the mystery surrounding its ownership, suggesting a single individual with technical prowess and ties to Russia.

    This development underscores the critical role of web archiving services in preserving online content ethically and securely. As internet users increasingly rely on archived resources for research and verification, ensuring the integrity of such platforms is paramount for maintaining trust and accuracy in digital information dissemination.

    Source: TechCrunch

  • Addressing the Hidden Vulnerability in Password Managers

    This article was generated by AI and cites original sources.

    Recent reports have highlighted a concerning vulnerability in password managers, shedding light on potential security risks for users. According to WIRED, a database containing sensitive information like passwords and Social Security numbers was left exposed online, raising alarms within the cybersecurity community. Although the data in the database has not yet been exploited, the incident underscores the persistent threat of identity theft.

    While password managers are generally effective in enhancing online security by storing and encrypting login credentials, this revelation serves as a reminder that no technology is completely immune to vulnerabilities. The incident highlights the crucial need for robust security measures and regular updates in password manager software to mitigate risks and safeguard user data.

    As technology continues to evolve, so do the tactics of cybercriminals. It is imperative for users to remain vigilant, adopt best practices in password management, and stay informed about potential security threats. The cybersecurity landscape is ever-changing, and maintaining proactive measures is key to ensuring digital safety in an increasingly interconnected world.

    Source: WIRED

  • DHS Consolidates Biometric Technologies for Enhanced Cross-Agency Operations

    This article was generated by AI and cites original sources.

    The Department of Homeland Security (DHS) is set to streamline its biometric technologies by creating a unified system that can analyze faces, fingerprints, iris scans, and other identifiers gathered across its various enforcement branches. This initiative, as reported by WIRED, aims to replace the current disparate tools used by agencies like Customs and Border Protection, Immigration and Customs Enforcement, and others, enabling seamless data sharing and search capabilities.

    By seeking input from biometric contractors, DHS is looking to develop a comprehensive platform that can facilitate watch-listing, detention, and removal operations. This move comes as DHS expands biometric surveillance beyond entry points to include intelligence operations and remote field agents, enhancing overall security measures.

    The proposed system would incorporate a versatile ‘matching engine’ capable of processing different types of biometric data efficiently. For face recognition tasks, it would provide quick identity verification by comparing a photo with a stored record, while investigative searches would yield a list of potential matches for further human review.

    Despite the system’s advanced capabilities, technical limitations exist, particularly in balancing sensitivity and accuracy in identifying individuals. While stringent in identity verifications to minimize false positives, the system may occasionally miss matches, underscoring the ongoing challenges in biometric technology.

    Source: WIRED

  • Metadata Reveals Key Personnel Behind ICE’s ‘Mega’ Detention Center Plans

    This article was generated by AI and cites original sources.

    A recent discovery regarding the metadata embedded in a PDF document has shed light on the individuals involved in crafting the Department of Homeland Security’s proposal for constructing ‘mega’ detention and processing centers, as reported by WIRED. The document, related to ICE’s ‘Detention Reengineering Initiative’ (DRI), inadvertently disclosed key personnel responsible for the plan.

    Jonathan Florentino, the director of ICE’s Newark, New Jersey, Field Office of Enforcement and Removal Operations, was identified as the author of the document. Additionally, Tim Kaiser, the deputy chief of staff for US Citizenship and Immigration Services, collaborated with David Venturella, a former GEO Group executive, on details regarding the average length of stay at these new detention centers.

    While the exposure of this information has raised questions about data security practices within the government, it also underscores the importance of understanding metadata implications in document sharing. The incident comes at a time when there is significant public scrutiny surrounding the expansion of ICE detention facilities and enforcement strategies.

    As technology continues to play a crucial role in information dissemination and transparency, incidents like these serve as a reminder of the potential risks and unintended consequences associated with digital data. Understanding the nuances of metadata and its impact on privacy and security is essential in today’s digital age.

    Source: WIRED

  • Ukrainian Man Sentenced for Facilitating North Korean Employment Scam at U.S. Companies

    This article was generated by AI and cites original sources.

    A Ukrainian man has been sentenced to five years in prison for orchestrating an identity theft operation that helped North Korean workers secure illicit employment at numerous U.S. companies. Oleksandr Didenko, 29, from Kyiv, set up a scheme where North Koreans used stolen identities of U.S. citizens to get hired, with their earnings funneled back to North Korea to fund its nuclear weapons program.

    Didenko operated a website named Upworksell, where overseas workers, including North Koreans, could purchase or rent stolen identities to secure jobs at American firms. The Justice Department revealed that Didenko managed over 870 stolen identities through this platform. The FBI intervened in 2024, taking down Upworksell and leading to Didenko’s arrest and subsequent extradition to the U.S., where he pleaded guilty.

    In addition to the identity theft scheme, Didenko paid individuals to host computers at their homes in California, Tennessee, and Virginia, creating ‘laptop farms’ where North Koreans could remotely conduct their work as if they were physically present in the United States. This case is part of a series of convictions related to North Korean IT worker scams, which have been identified as posing a significant threat to U.S. and Western businesses.

    Source: TechCrunch

  • Texas Sues TP-Link Over Alleged Misrepresentation of Chinese Ties

    This article was generated by AI and cites original sources.

    Texas Attorney General Ken Paxton has filed a lawsuit against TP-Link, alleging that the router manufacturer has been misleading customers about its ties to China. The lawsuit claims that TP-Link, despite efforts to distance itself from China by establishing operations in Vietnam and the US, still heavily relies on Chinese components for its products. The lawsuit further accuses TP-Link of misrepresenting the security of its products and hiding its Chinese affiliations.

    This legal action is part of a broader trend of increased scrutiny on Chinese companies, with TP-Link’s connections drawing attention from both the Trump administration and state authorities. The lawsuit highlights the challenges companies face in navigating geopolitical tensions and ensuring transparency in their supply chains.

    TP-Link’s situation underscores the importance for tech companies to clearly communicate their manufacturing and sourcing practices to build trust with consumers and regulators alike. As the case unfolds, it will be crucial to monitor how TP-Link addresses these allegations and adapts its business practices to comply with regulatory requirements.

    Source: The Verge

  • Cellebrite Faces Scrutiny Over Alleged Misuse of Phone Unlocking Tools

    This article was generated by AI and cites original sources.

    Cellebrite, a prominent provider of phone hacking tools, has come under scrutiny for the alleged misuse of its tools in Serbia, Jordan, and Kenya. Last year, Cellebrite suspended sales to the Serbian police following accusations of hacking into the phones of a journalist and an activist. However, the company chose not to investigate similar claims that surfaced in Jordan and Kenya, deviating from its previous stance.

    According to a report by the Citizen Lab at the University of Toronto, Cellebrite’s tools were used by the Kenyan government to unlock the phone of activist Boniface Mwangi and by the Jordanian government to access the phones of local activists and protesters. This scrutiny was based on the discovery of a specific Cellebrite-linked application on the victims’ phones, indicating potential tool usage.

    While Cellebrite has been urged to address these concerns directly, the company’s response remains guarded, with a spokesperson emphasizing the need for evidence-based claims. This scrutiny highlights the challenges faced by tech companies providing tools that can be repurposed for surveillance and raises questions about accountability and oversight in the digital security sector.

    Source: TechCrunch

  • Fulu Foundation Offers Bounty to Enhance Privacy of Ring Cameras

    This article was generated by AI and cites original sources.

    Amid concerns over user data privacy, the Fulu Foundation, a nonprofit focused on improving user experiences, has initiated a $10,000 bounty program to incentivize the discovery of vulnerabilities in Ring cameras. The goal is to prevent unauthorized data sharing with Amazon, the parent company of Ring.

    The bounty program is a response to the controversy surrounding Ring’s Search Party feature, which raised fears of neighborhood surveillance and potential data misuse. The Search Party feature, showcased in a recent Amazon Super Bowl commercial, utilizes Ring cameras to assist in locating lost pets within local communities. However, leaked internal emails suggest the feature could be used for broader tracking purposes, sparking criticism from both social media users and tech analysts.

    Ring CEO Jamie Siminoff has addressed the backlash, including severing ties with the AI surveillance company Flock in response to public concerns. The Fulu Foundation, led by repair advocate Louis Rossmann, views this as an opportunity for users to regain control over their devices and data.

    Kevin O’Reilly, Fulu’s co-founder, emphasized the importance of data control in ensuring security for users of security cameras. The foundation’s latest bounty program targets Ring’s video doorbell, aiming to empower users to assert control over their data and devices.

    Source: WIRED

  • FBI Warns of Surging ATM ‘Jackpotting’ Attacks, Highlighting Cash Dispenser Vulnerabilities

    This article was generated by AI and cites original sources.

    The FBI has issued a warning about a significant rise in ATM ‘jackpotting’ attacks, where hackers manipulate ATMs to dispense cash illicitly, resulting in millions of dollars in stolen currency. This criminal activity, once a demonstration by security researcher Barnaby Jack, has escalated into a profitable venture for cybercriminals.

    According to the FBI’s security bulletin, over 700 attacks targeted ATMs in 2025, yielding at least $20 million for hackers. The attacks involve a combination of physical access techniques, like using generic keys to unlock ATM components, and digital methods, such as deploying malware like Ploutus to force dispensers to release cash rapidly.

    Ploutus, a malware strain highlighted by the FBI, exploits vulnerabilities in the underlying Windows operating system that powers many ATMs. By compromising an ATM, hackers gain full control, enabling them to manipulate the cash dispensing process without affecting customer accounts directly.

    This type of attack, focused on the ATM hardware itself, allows for quick cash-out operations that are challenging to detect until after the money is withdrawn. The FBI’s bulletin underscores the urgency for financial institutions to address security gaps in their ATM systems to prevent further exploitation by cybercriminals.

    Source: TechCrunch