After only three months Now there is a $ 30 million contract with Palantir to build a time surveillance platform almost reality Called immigration will monitor information about fake people (choose to leave the US). Meanwhile, the Ministry of Security has sent positive emails to people with a temporary legal status from the United States. It is It is not clear who has really been sent messagesAlthough it is said that some people who are citizens born in the US have reported them.
The US cybersecurity and network security agency seems to be ready this week Cancellation for the project to monitor important software vulnerabilities is called CVE program. CISA finally approved funding, but some members of the CVE program's Board of Directors were planning to turn the project into an independent non -profit organization.
A lawsuit against the Trump administration's Houthi signal group is revealing Details of the steps that federal departments have done and have no conservation of messages Each law file.
Wired reviewed The most dangerous hackers you have never heard ofDiving deep into the Russian intelligence group incessantly and on both sides Gamaredon; Chinese people are extremely full Smishing triad text message text; The dangerous members of the giant Ransomware have fallen Black Basta; Iranian important infrastructure hackers are called Cyberav3ngers; the Tradertraitor North Korea's cryptocurrency hackers are responsible for an amazing amount of great robberies; And the notorious, long -term Crossover hackers of China and hackers are supported by the state. Typhoon in copper.
Above all of that, a doubt Hack 4chan can have cruel consequences For controversial image table. Ai Massive Blue is Help the police create social media BOTs running with To set as sympathetic and talk to those who are interested. And New Jersey attorney general is suing DiscordStatement that this platform does not have adequate protection measures to protect children under 13 years old from sexual hunting and harmful content.
But wait, more! Each week, we fulfill the security news and privacy that we did not say deeply. Click on the title to read the full stories, and keep it safely out there.
A draft draft in Florida will require social media companies to provide law enforcement agencies with encryption back doors so that the police can access the user's account. The bill has agreed from the committee this week and will now go to the state of the state to vote. If passed, Using social media of adolescents Bill, sponsored by Senator Blaise Ingoglia, will ask Muslim's social media platforms to provide a mechanism to decode encryption from the beginning to the end when the law enforcement is plastered to demand a court. The bill will also prohibit the disappearing messages in accounts designed for children and will ask social media companies to create a mechanism for parents or guardians to access children's accounts. Experts have long warned that the coding back doors make people less safe, including the people they plan to help. However, encryption attacks have appeared many times over the years, including Recent trends In the European Union and the United Kingdom.
A Nevada district judge said this week that the practice of landfills of the tower, in which the law enforcement takes large quantities of personal data from mobile towers, violations of amendments in the fourth and thus, therefore, unconstitutional. Mobile towers collect large quantities of information about users, including phone numbers and phone positions, so when the police require data from the tower for a specific period of time, they often receive information about thousands of equipment or more. Despite the decision this week, Judge Miranda M. Du said that the law enforcement agency could still use the evidence they collected through a tower dump in their case.
China stated this week that the US National Security Agency caused Islamic cyber attacks against important industries in February in the Asian Winter Olympics. The law enforcement from Cable City of Taro Tan Duong has brought three NSA agents accused, Katheryn A. Wilson, Robert J. Snelling and Stephen W. Johnson, in a desired list and declared that the University of California and Virginia Tech participated in attacks. Lin Jian's spokesman said we called on the United States to be responsible for cybersecurity and prevent non -proven stains and attack on China. The US government regularly calls for a Chinese -backed hack and name the perpetrators accused of individuals, but China has at least consistent with such statements. This move this week takes place in the context of escalating tensions between the two countries, including the Trump government's trade war.
CBP is using many artificial intelligence tools to scan social media and identify people who are interested in online, according to information from the agency and marketing documents considered by 404 media from contractors. CBP has published information about the platforms this week in parallel with the announcement of the US Department of Security that it will start screening the social media activities of aliens for anti -oppositionism. The statement also said that the US civic and immigration services are conducting searches on the social media of Muslims. CBP told 404 media in an email that no tool was used to check or handle travel applications, he mentioned Dataminr and Onyx, but did not say more clearly. AI platforms to analyze large data streams and can be used to develop potential customers for those who may violate the US immigration law.