Monday, December 10Always On-point

Security

Internet traffic hijack disrupts Google services

Internet traffic hijack disrupts Google services

Security
An internet traffic diversion rerouted data through Russia and China and disrupted Google services on Monday, including search, cloud-hosting services and its bundle of collaboration tools for businesses. Service interruptions lasted for nearly one and a half hours and ended about 5:30 p.m. EST., network service companies said. In addition to Russian and Chinese telecommunications companies, a Nigerian internet provider was also involved. The diversion “at a minimum caused a massive denial of service to G Suite (business collaboration tools) and Google Search” and “put valuable Google traffic in the hands of ISPs in (internet service providers) in countries with a long history of Internet surveillance,” the network-intelligence company ThousandEyes said in a blog post. A Google stat
India Leads The World In The Number Of Internet Shutdowns: Report

India Leads The World In The Number Of Internet Shutdowns: Report

Breaking News, News, Security
India leads the world in the number of internet shutdowns, with over 100 reported incidents in 2018 alone, according to a report by Freedom House, a U.S.-based non-profit that conducts research and advocacy on democracy, political freedom, and human rights. Freedom on the Net, an annual study by Freedom House on internet and digital media freedom in 65 countries around the globe, which covers 87% of the world’s internet users, scores countries from zero (most free) to 100 (least free). This serves as the basis for an internet freedom status designation of "free" for countries that score between 0 and 30, "partly free" for countries between 31 and 60, or "not free" for those with scores of 61 or higher. The newly released report is the eighth in this series and covers developments that occ
Hackers Breach MEGA Chrome Extension To Steal Crypto Private Keys

Hackers Breach MEGA Chrome Extension To Steal Crypto Private Keys

Security
Modern technologies, such as the internet, smartphones, and blockchain, are often touted as world-changing innovations, and while this may be the case, there are still glaring problems with the security of digital systems. MEGA Falls Victim To Cybersecurity Breach On Tuesday morning, concerned individuals across the web took to social media to reveal that malicious code had taken the place of MEGA’s chrome extension, which has been downloaded tens of millions of times across the globe. Some claimed that the updated code allowed the extension to gather sensitive data from popular websites across the internet. At first, many believed that this hack only affected popular websites, like Google and Facebook, but upon further analysis, cybersecurity experts noted that the updated MEGA ext
Traveling The World With Crypto? Ten Tips To Keep You Safe

Traveling The World With Crypto? Ten Tips To Keep You Safe

FinTech, Security
Thanks to the internet and the subsequent rise of cryptocurrencies, we are living in an increasingly borderless world. Digital nomads bounce from country to country and some intrepid travelers have started using bitcoin or ethereum in order to have more control over their financial accounts. But as crypto becomes more mainstream there are more pitfalls, especially when it comes to protecting your digital security. Traveling with crypto like Bitcoin or Ethereum can be easy thanks to blockchain technology... but are you staying safe? Photo credit: Shutterstock. Whether you’re interested in exploring the crypto nomad lifestyle more, or just want to buy a beer with BTC, here are ten tips on staying safe and having fun while traveling with cryptocurrency. The t
Whatsapp Admin In India Spends 5 Months Behind Bars For A Message Forwarded By Someone Else

Whatsapp Admin In India Spends 5 Months Behind Bars For A Message Forwarded By Someone Else

News, Security
A 21-year-old student in India has been in prison for the last 5 months because he was the admin in a group that an offensive message had been forwarded. The message was then reported to the authorities. The person who sent the message and the admin were arrested. His family has tried to argue that he was not admin at the time the message was sent and the other admins left the group but the police said nobody mentioned this when he was arrested and any evidence is welcome. advertisement On what basis do they even do such things? Under the Indian Penal Code (IPC) and IT Act, admins of groups on social media can face jail time for sharing messages that are seen to be religiously or politically offensive. So yes in India when you see the message ‘you are now admin’ you shou
Zim police arrest 4 for ‘hate speech’ on social media

Zim police arrest 4 for ‘hate speech’ on social media

Security
Zimbabwe police have arrested four people for publishing "falsehoods and hate speech" on social media, a newspaper reported. The suspects weren't named, and the state-run Sunday Mail did not say what law the four are being charged under. "I want to warn those that abuse social media that we have mechanisms to catch them if they commit crimes," senior police officer Erasmus Makodza told the paper. Last week Makodza said police would arrest people who used social media to spread misinformation on a controversial postal vote by police officers that began on Thursday. Right to information The opposition Movement for Democratic Change (MDC) Alliance alleged police officers were forced to vote in front of their commanding officers, a charge denied by the police. In
Apps caught secretly recording smartphone screens

Apps caught secretly recording smartphone screens

Applications, Security
A number of apps are recording people’s phone screens and sending the information out to third parties, claim scientists investigating smartphone surveillance. Researchers have found that some of the most popular Android apps are recording videos and screenshots and sending it to other companies, without the user's knowledge. "Our study reveals several alarming privacy risks in the Android app ecosystem, including apps that over-provision their media permissions and apps that share image and video data with other parties in unexpected ways, without user knowledge or consent," said Elleen Pan, one of the computer science academics at Northeastern University behind the study. The team found 21...--telegraph
Google Accused Of Allowing Third-party App Developers To Read People’s Emails In Gmail

Google Accused Of Allowing Third-party App Developers To Read People’s Emails In Gmail

Applications, Security
Google has been accused of allowing third-party app developers access to users private messages in Gmail. While the report says that it is primarily done to offer a better experience to users and makes several new features available to users, the app developers can view sensitive and private details including the recipient’s e-mail id, timestamps, the entire body of the mails for millions of Gmail users. According to The Verge, the third-party Gmail apps require user consent to access and read the emails, however, allowing them doesn’t guarantee that emails would only be seen by machines and not the human developers at these companies. Some companies do allow human developers to skim through your emails, of which Google is one of them. But Google said it only accesses emails in very spe
This fingerprint-verified padlock is extremely easy to hack

This fingerprint-verified padlock is extremely easy to hack

Applications, Gizmos, Security
We here at The Verge have tried to warn everyone about smart locks, particularly smart locks that rely on fingerprints for authentication. The TappLock is one such lock that was crowdfunded on Indiegogo and is now available to buy. And unsurprisingly, it’s incredibly easy to physically and virtually hack. YouTuber JerryRigEverything proved that he could pull the lock apart using just a sticky GoPro mount, while cybersecurity company PenTest Partners found that the actual code and digital authentication methods for the lock were basically nonexistent. All someone would need to unlock the lock is its Bluetooth Low Energy MAC address, which the lock itself broadcasts. Essentially, the lock doesn’t encrypt any of its data, leaving anyone who’s looking for it all the information they’d need
Zimbabwe Banned From Accessing New York Stock Exchange Website

Zimbabwe Banned From Accessing New York Stock Exchange Website

Security
The largest equities-based exchange in the world, The New York Stock Exchange (NYSE) has banned users in Zimbabwean from accessing its website. NYSE has blocked the country’s IP address hence its preventing people located in Zimbabwe from accessing NYSE’s website. Check out what; IP address blocking can be used to restrict access to or from a particular geographic area. For example, the syndication of content to a specific region. To achieve this, IP addresses are mapped to the countries they have been assigned to. This has been used for example to target Nigerian IP addresses due to the perception that all business originating from the country is fraudulent, thus making it extremely difficult for legitimate businesses based in the country to interact with their counterparts in the res
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.