Page 9 of 17
1 6 7 8 9 10 11 12 17

Supreme Court declines to block WhatsApp lawsuit over NSO phone hacking | TechCrunch

GettyImages-1236496545 - NSO Building
Supreme Court declines to block WhatsApp lawsuit over NSO phone hacking by Carly PageCarly Page (techcrunch.com)

The U.S. Supreme Court has declined to block a lawsuit brought by WhatsApp challenging the alleged mass phone hacking by Israeli spyware maker NSO Group. Meta-owned WhatsApp first filed a suit against NSO Group in 2019 claiming the spyware maker exploited an audio-calling vulnerability in WhatsApp to stealthily deliver its Pegasus phone spyware onto users’ […]

The U.S. Supreme Court has declined to block a lawsuit brought by WhatsApp challenging the alleged mass phone hacking by Israeli spyware maker NSO Group.Meta-owned WhatsApp first filed a suit against NSO Group in 2019 claiming the spyware maker exploited an audio-calling vulnerability in WhatsApp to stealthily deliver its Pegasus phone spyware onto users’ devices.…

Twitter leak of email addresses totals at least 200 million – The Washington Post

box
Hackers leak email addresses tied to 235 million Twitter accounts by Joseph Menn (The Washington Post)

Researchers say the information was assembled by unknown actors who exploited a previously disclosed flaw in Twitter’s system for verifying account ownership.

Records of 235 million Twitter accounts and the email addresses used to register them have been posted to an online hacking forum, setting the stage for anonymous handles to be linked to real-world identities. Source: Twitter leak of email addresses totals at least 200 million – The Washington Post

The role of copyright in online creative communities: law, norms, and policy

Naked Post
https://smartech.gatech.edu/handle/1853/53937 (smartech.gatech.edu)

Many sources of rules govern our interactions with technology and our behavior online—law, ethical guidelines, community norms, website policies—and they do not always agree. This is particularly true in the context of content production because copyright law represents a collection of complex policies that often do not always account for the ways that people use…

How the Internet was Stolen

How the Internet Was Stolen, a Godfather style poster image of Mark Zuckerber, Jeff Bezos, and Bill Gates around the word Stolen in the Godfather movie font.
How the Internet was Stolen from YouTube

I look at the history of the internet, from ARPANET & NSFNET, through privatization, to Tim-Berners Lee, Yahoo, Netscape, Google, eBay, and Facebook, examini…

[embed]https://www.youtube.com/watch?v=oLLxpAZzy0s&ab_channel=Then%26Now[/embed]

The Fediverse beyond Mastodon | Fedi.Tips – An Unofficial Guide to Mastodon and the Fediverse

FediTipsBanner3-Xmas-Version-cropped
The Fediverse beyond Mastodon by VinkkejenAdminni (fedi.tips)

Most new users join the Fediverse via Mastodon, but that’s just one part of a much wider Fediverse with many different kinds of servers. This section explores the non-Mastodon kinds of servers out there. Because Fedi servers use a common … Continue reading

Source: The Fediverse beyond Mastodon | Fedi.Tips – An Unofficial Guide to Mastodon and the Fediverse

LastPass says hackers stole customers’ password vaults | TechCrunch

LastPass
LastPass says hackers stole customers’ password vaults by Zack WhittakerZack Whittaker (techcrunch.com)

Password manager giant LastPass has confirmed that cybercriminals stole its customers’ encrypted password vaults, which store its customers’ passwords and other secrets, in a data breach earlier this year. In an updated blog post on its disclosure, LastPass CEO Karim Toubba said the intruders took a copy of a backup of customer vault data by […]

In a rare shituation (not a typo) like this — which we spelled out in our parsing of LastPass’s data breach notice — if a bad actor has access to customers’ encrypted password vaults, “all they would need is a victim’s master password.” An exposed or compromised password vault is only as strong as the…

Page 9 of 17
1 6 7 8 9 10 11 12 17
  • You’ve read the article, now get the t-shirt! :-D