28 Burst results for "Citizen Lab"

"citizen lab" Discussed on WCBM 680 AM

WCBM 680 AM

02:43 min | 4 d ago

"citizen lab" Discussed on WCBM 680 AM

"Heard Island the remnants of Tropical Storm Odette and a new tropical depression not likely to come close to the U. S forecast to remain over the eastern Atlantic. For its lifetime is going to be moving Generally. Northwest Georgia North northwestward hit probably the cooler waters in a couple of days. National Hurricane Center specialists and the Lotto Heritage Foundation says the House voting rights legislation does nothing for voters Foundation. Legal experts say the provisions and it make it easy to cheat and to manipulate election results. HR one for the people act, I think that is dead in the water in the Senate. It looks like there's HR for the John Lewis voting rights, and I think that also faces an up hill battle in the Senate. Also a town hall dot com. Apple releasing a critical software patch to fix the security vulnerability that researchers say could allow hackers to directly in fact, iPhone security researchers at the University of Toronto Citizen Lab say the flaw was exploited to plant spyware on a Saudi activists iPhone and warned that it could allow hackers to similarly infect other Apple devices without any user action. The researchers say the flaw was exploited by Israel's and so group. The company responded with a one sentence statement saying it will continue providing tools for fighting terror and crime that is correspondent Jeremy House reporting. Two crew members have been injured three homes damage from the military jet went down this morning near Fort Worth, Texas. Officials say. The fighter jet trainer was north of the Naval Air Station Joint Reserve base on the two crew members ejected more on the stories that town hall dot com. Mostly clear skies. Let's fall back to the low sixties tonight Monday, Sunshine Clouds mix in afternoon high little warmed up to around 80 Those clouds built in for Monday night. As we slide back to the low to mid sixties cloud stick around for Tuesday, headed up to around 80 and then look for the showers. Possible thunderstorms for Wednesday that rain stays with us Wednesday night. And then the potential will be there for some heavy rain as we get into our Thursday I'm Gavino from the Weather Channel for talk radio 6 80 wcbm. Today on the Derrick Hunter Show, the Biden administration is targeting Red states for Covid deaths, denying them medicine. Americans are still trapped in Afghanistan, and Joe Biden spent the weekend at the beach. We'll talk about it from noon until three on talk radio 6 80 Wcbm. The Wcbm Studios are sponsored by a safe retirement solution called Rod Borowy. For that solution for 10266, 11 20 the.

Joe Biden Lotto Heritage Foundation Wednesday night Wednesday Monday night Apple Thursday Tuesday Today U. S iPhone John Lewis Heard Island Afghanistan Wcbm Studios Jeremy House Fort Worth, Texas University of Toronto Citizen one sentence Gavino
"citizen lab" Discussed on KDWN 720AM

KDWN 720AM

03:30 min | Last week

"citizen lab" Discussed on KDWN 720AM

"We build back, we have to build back better. It's not a Democrat thing. It's not a Republican thing. It's a weather thing. Biden also flew to California. That's where you warned of climate change and pitched his infrastructure program. Extreme Weather cost America last year. $99 billion. Let me say it again Extreme weather in the United States. Cost the United States of America total of $99 billion And this year, unfortunately, going to break that record. It's a devastating loss to our economy. And for so many communities. Today. President Biden heads to renewable Energy lab in Colorado to highlight how the investments in clean energy and his massive spending package would help combat climate change. Who did it. Walmart denying any partnership with the digital currency light coin after a fake news release briefly tipped up several national news outlets and a social media users on Monday. Wal Mart, saying their release is not real. The false announced Smith was temporarily featured on a major press release wire and in outlets, including Reuters, CNBC and Yahoo finance before Being deleted and corrected. It wasn't immediately clear who created the bogus release, though the announcements fake walmart looking to hire an expert in digital currencies and Blockchain Charlie Lee, creator of Light Coin and managing director of Light Coin Foundation, confirmed the release was fake. And Apple is holding its annual iPhone event today, the seventh straight virtual launch due to the Covid pandemic. The tech giant expected to unveil new iPhones and updates to its Airpods and Apple Watch. New Ipads and MacBook Pros are due for an update to the it's unclear whether Apple will pack all of its fall launches into one or two spread them out. Meanwhile, it's issued a patch to its IOS mobile operating system to fix the vulnerability related to the iPhones message function. An Israeli firm had been exploiting the weaknesses since February, according to research group Citizen Lab. The company NSO Group did not confirm or deny responsibility. Meanwhile, the FBI and Israeli officials Have been investigating the NSO group We will hear from tech expert tech blogger Clark read later on this week, Uh, on the new iPhone release and more Right here on a F N. Don't forget you can take us with you. Wherever you go Download the talk stream live a free mobile app Reach out to me anytime across the board on social media. I met Matt Ray talk. Use the hashtag and we are just getting started this hour on America's first news still to come, the secretary of state on the hot seat Pushing back at criticism of the handling of the withdrawal from Afghanistan. We will hear from Secretary of State Antony Blinken and Congressman Lee Zeldin, who suggested the secretary resigned. And the San Francisco Giants have clinched a playoff berth. The earliest date the franchises ever clinched a trip to the postseason. We will hear from their skipper boy, the Giants have really turned it around. Under his second year, all of that and more on the way. Grab the coffee. Let's go. You're listening to America's at first news. Good morning. Construction companies.

Walmart Wal Mart Matt Ray IOS Biden FBI Monday United States Light Coin Foundation California Clark Reuters Colorado Charlie Lee walmart Citizen Lab Today Apple CNBC Giants
"citizen lab" Discussed on WSB-AM

WSB-AM

01:44 min | Last week

"citizen lab" Discussed on WSB-AM

"Evacuees tested positive for measles reporter Nellie Brand says that pause will last at least a week, The administration will start vaccinating refugees from measles, mumps and rubella forex Minneapolis police officers face arraignment today in federal court for allegedly depriving George Floyd of his civil rights. The arraignment will be held remotely through videoconference. Former officers including Derek Chauvin, are expected to plead not guilty. The other officers will likely ask the court to separate their trial from Chauvet. He's been convicted in state Court of Floyd's murder. Apple creates a security patch to protect iPhones and other apple devices from spyware. According to researchers at the Citizen Lab, Hackers used a type of software capable of stealing data. Passwords and access and cameras and microphones to hack a Saudi activists. Phone reporter Moussa Dick Bader says the zero click spyware can infect the device without the user's knowledge, and then do anything you can Double DS reduced time. 6055 minutes after six. You come to the right place for maximum coverage of weather and traffic. And as we always say good news is news to. So let's appreciate the good weather today. Here's WSB your artist Cristina Edwards. Absolutely, essentially because this is the especially because this is the driest day of the week and mix of sun and clouds for this afternoon s stray shower can't be ruled out but mainly dry with a high of 86. Clouds moving in tomorrow. Mostly cloudy. Widespread showers and thunderstorms moving in in the afternoon. High of 81 for Wednesday Thursday High 80 Mostly cloudy 40% chance of widespread showers and thunderstorms. So recapping the forecast for today. Enjoy the sunshine, a hive 86 only a street shower or two possible. Currently 65 degrees in Marietta. Good morning. Winder at 64 70 degrees in midtown Atlanta WSB meteorologist Christina Edward. Let's check in the morning.

George Floyd Derek Chauvin Moussa Dick Bader Cristina Edwards Marietta Nellie Brand Apple iPhones Citizen Lab 64 40% 65 degrees Chauvet 6055 minutes Double DS Christina Edward apple tomorrow 80 today
"citizen lab" Discussed on WBZ NewsRadio 1030

WBZ NewsRadio 1030

01:46 min | Last week

"citizen lab" Discussed on WBZ NewsRadio 1030

"On loan from the military. The cameras provide a 360 degree view both day and night. They're also bringing back the security fencing, which was put in place in the aftermath of the January 6th attack. Defense will go up a day or two before and if everything goes well, it will come down very soon after Apple says it's fixing a flaw that could allow hackers to infect iPhones and some other Apple devices, CBS's Mosaddegh radar explains, according to researchers at the Citizen Lab, Hackers used a type of software capable of stealing data, passwords and access and cameras and microphones to hack a Saudi activists. Phone researchers said The software is capable of gaining access to the device without the user's knowing. Hackers in Israel already tried exploiting the problem. This is CBS News, traffic and weather together, the Subaru retailers of New England all wheel drive traffic on the threes. It's 12 03, and we begin downtown where it's slow going in the south bound side of 93 double right lane closure prior to the second bridge and through the O'Neill tunnel, Airport tunnels. No major delay. But the Ted Williams is down a lane in both directions on the pike Watch for lane closure with a bit of a slowdown. Westbound Prudential Tunnel to come have eastbound before the expressway, then Exit 1 23 B and C to 93 North and South is closed south of the city Expressway south, No trouble getting by a lane closure at East Milton Square. Route. 24 work crew delays both ways that route 1 40 North Bonner route 106 and then the ramp to 93 South and Randolph has closed Route three. North Dont watch for work crews that Clark wrote in Plymouth. In Pembroke at route 1, 39 and then at the Braintree split all with a bit of a delay for 95..

CBS East Milton Square New England iPhones Apple 360 degree Citizen Lab Pembroke CBS News Subaru Israel Randolph Plymouth 93 South Clark Braintree two second bridge O'Neill tunnel a day
"citizen lab" Discussed on WTOP

WTOP

01:31 min | Last week

"citizen lab" Discussed on WTOP

"That recall vote has brought out big name Democrats to rallied voters in the state President. Biden will speak on Newsom's behalf in Southern California later tonight. CBS News reporter Adam Booster uphold from Cal Berkeley last week showed that just 1.4% of likely voters were still undecided on that question now. You never know what can happen within the final stretch, then certainly why you've seen Gavin Newsom and other Democrats going around the state spending ads taking this effort very seriously, despite the fact that polls have been trending in their favorite conservative talk radio host Larry Elder is the Republican front runner, But polls show Newsom is leading the recall race. If you have an iPhone or other Apple products, the company says. You need to update your software right away. Now Apple has released And emergency software patch to fix the security vulnerability that researchers say could allow hackers to directly in fact, iPhones and other apple devices without any user action. Researchers at the University of Toronto Citizen Lab are saying that the flaw allowed spyware from the world's most infamous hacker for hire, firm and so group to directly, in fact, the iPhone of a Saudi activists It was the first time a so called zero click exploits have been caught in analyzed, and, according to the researchers, they had found the malicious code back on September 7th. They immediately alerted Apple 5 52. In other news. The surge in Covid cases driven by the Delta.

Adam Booster Southern California Larry Elder September 7th Apple iPhone Gavin Newsom last week Democrats apple Biden iPhones Delta University of Toronto Citizen Newsom CBS News Cal Berkeley Republican 1.4% first time
Apple patches exploit attributed to hacker-for-hire firm

AP News Radio

00:46 sec | Last week

Apple patches exploit attributed to hacker-for-hire firm

"Apple released an emergency software patch to fix a security vulnerability researchers at the university of Toronto citizens labs say the flaw could allow hackers to directly infect iPhones and other apple devices without any user action and allowed spy ware from the world's most infamous hacker for hire firm NSO group to directly infect the iPhones of a Saudi activist the lab says this was the first time a so called zero click exploit had been caught and analyzed security experts say average iPhone iPad and mac users generally don't need to worry these kind of attacks tend to be highly targeted in a blog post apple said it's issuing a security update for iPhones and iPads because a maliciously crafted PDF file could lead to them being hacked I'm a Donahue

Apple Nso Group University Of Toronto
Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses

Cyber Security Headlines

02:10 min | 2 months ago

Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses

"Israeli firm uses windows zero days to deploy spyware microsoft and citizen lab have linked israeli spyware company. Candy also tracked as sour gum to new windows. Spyware dubbed devil's tongue deployed using now patched windows. Zero day vulnerabilities. Candy row is a secretive israel based company. That sells spyware exclusively. The government's explained citizen lab and their spyware can infect and monitor. Iphones androids max. Pc's and cloud accounts citizen lab also tied over seven hundred and fifty websites to kangaroos spyware infrastructure finding that many of these domains mimicked domains representing media companies and advocacy organizations including amnesty. International and. Black lives matter. Cyber attacks increased seventeen percent in first-quarter. Twenty twenty one with seventy seven percent being targeted attacks this according to a new positive technologies cybersecurity threats scape q. One twenty twenty one report cybercriminals typically attacked government institutions industrial companies and science and education institutions. The main motive for attacks on both organizations and individuals remains acquisition data. Other findings in the report include. That ransomware is still the malware that is most often used by attackers. That the most popular vulnerabilities for attackers. This quarter were microsoft exchange server acceleration and sonic wall. Vpn and that more cybercriminals are developing malware to conduct attacks on virtualization environments another unpacked bug in windows prince. Buhler microsoft is warning of another vulnerability in its windows print spooner that can allow attackers to elevate privilege to gain full user rights to assist them this follows they're patching of two other remote code execution bugs that collectively became known as print nightmare. Microsoft released a new advisory late. Thursday for the vulnerability tracked as cv. Twenty twenty one dash three four four eight one microsoft credited dragos vulnerability researcher jacob baynes for identifying the issue. The vulnerability exists when the windows print spoiler service improperly performs privileged file operations

Microsoft Israel Government Buhler Jacob Baynes Dragos
"citizen lab" Discussed on WCBM 680 AM

WCBM 680 AM

02:03 min | 2 months ago

"citizen lab" Discussed on WCBM 680 AM

"Microsoft says it's blocked tools developed by an Israeli hacker for hire company that we're used to spy on more than 100 people around the world. Including politicians, human rights activists, journalists, academics and political dissidents. Microsoft issued a software update and worked with the Citizen lab at the University of Toronto to investigate the secretive Israeli company known as Candy ear. Oh, Said to be behind the hacking efforts. The report by Microsoft and Citizen Lab shines new light on a growing and lucrative industry of selling sophisticated hacking tools. Governments and law enforcement agencies attempts to reach representatives that candy row were unsuccessful. A mixed day on Wall Street as the Dow was up by 53 points, But the NASDAQ dropped 101 the S and P lower by 14. More details of SRE news dot com WCBM Baltimore Wcbm Traffic check is sponsored by indeed dot com Watch out for an accident Down the city on 8 95 north, now between Protea Street and Shell Road, blocking the left lane, multi vehicle accident there a 95 South between 8 95 Every 100. That accident moved to the shoulder of traffic is very slow from 1, 95 and Western 100 is quite slow between the Rundle Milk Boulevard and 95. Also, you will still find some stuff and going the interlude between 95 Security Boulevard and again between Charles Street, Providence, Rhode and some slowing on the outer loop between Liberty Road and Security Boulevard shift hiring years with. Indeed they go beyond the resume with 135 skills says it helped candidates show their abilities on things like computer proficiency or customer service. Indeed, skills test reduced hiring time by 27% on average, visit indeed dot com slash credit. Investment should talk Radio 6 80 wcbm Well, showers thunderstorms in and out of our forecast this weekend but catching a nice little break here tonight and tomorrow. Couple of splashing Dash storms west of us out in the Panhandle Tonight 76 are low tonight Mostly sunny and hot Tomorrow 96 degrees. I'm Scott Lorrie Moore at the Weather Channel on talk Radio. 6 80 Wcbm..

Charles Street Rundle Milk Boulevard Citizen Lab Citizen lab 95 Security Boulevard Liberty Road Protea Street 53 points Shell Road Security Boulevard NASDAQ tomorrow Microsoft 27% Providence Western 100 95 South Rhode Tomorrow Candy ear
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:28 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it and they could actually takeover of your machine apple re architect it. How i message worked so that it's not vulnerable but marcek who identified. It never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means it. Security is one of the best but no security is perfect and when security is really good but not perfect that means the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. Called verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work contract down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

february eleven months apple Bill maher Apple Tuesday Twenty eighth marcek iowa first agreement america one citizen lab zero marceca apples
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:29 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Of the usual tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it. And they could actually takeover of your machine apple re architect it. How i message worked so that it's not vulnerable. But marcek dented. It never found what the how the exploit worked because apple is so locked down and it didn't want to share that level of specificity with them. Then that's a problem. According to marcek marceca argument isn't that iowa security is bad apples ownership of the entire platform means it. Security is one of the best but no security is perfect and when security is really good but not perfect that means only the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. I've verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work contract down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

apple february Bill maher eleven months Twenty eighth Apple marcek first agreement apples iowa tuesday marceca america one zero once citizen lab agreement
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:28 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in a message. That apple recently re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it. And they could actually takeover of your machine apple re architect it. How i message works. So that it's not vulnerable. But marcek dented. It never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means it. Security is one of the best but no security is perfect and when security is really good but not perfect that means only the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. Called verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work and down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

february eleven months Bill maher apple Apple marcek Tuesday Twenty eighth iowa first agreement america marcek marceca one citizen lab zero apples once
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:28 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it. And they could actually takeover of your machine apple re architect it. How i message works. So that it's not vulnerable. But marcek dented. It never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means it. Security is one of the best but no security is perfect and when security is really good but not perfect that means only the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. I've verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work contract down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

february eleven months Bill maher apple Apple Tuesday Twenty eighth iowa first agreement marcek america marcek marceca one apples zero citizen lab once
"citizen lab" Discussed on Daily Tech News Showhttps://dailytechnewsshow.com/

Daily Tech News Showhttps://dailytechnewsshow.com/

05:28 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Showhttps://dailytechnewsshow.com/

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it and they could actually takeover of your machine apple re architect it. How i message works so that it's not vulnerable but marcek defied it never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means it. Security is one of the best but no security is perfect and when security is really good but not perfect that means only the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. Called verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work contract down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

february eleven months Bill maher apple Apple Tuesday Twenty eighth iowa marcek first agreement america one citizen lab zero marceca apples once
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:28 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it and they could actually takeover of your machine apple re architect it. How i message worked so that it's not vulnerable but marcek defied it never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means it. Security is one of the best but no security is perfect and when security is really good but not perfect that means only the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. Called verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work and down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

february eleven months Bill maher apple Apple Tuesday Twenty eighth iowa marcek first agreement america one citizen lab marceca zero apples once
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:28 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it and they could actually takeover of your machine apple re architect it. How i message worked so that it's not vulnerable but marcek who identified. It never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means is one of the best but no security is perfect and when security is really good but not perfect that means the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. Called verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work and down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

february eleven months apple Bill maher Apple Tuesday Twenty eighth marcek iowa first agreement america one citizen lab zero apples marceca once
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:28 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it. And they could actually takeover of your machine apple re architect it. How i message worked so that it's not vulnerable. But marcek dented. It never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means is one of the best but no security is perfect and when security is really good but not perfect that means the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. I've verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work and down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

february eleven months apple Bill maher Apple Tuesday marcek Twenty eighth iowa first agreement america marcek marceca one citizen lab apples zero
"citizen lab" Discussed on Daily Tech News Show

Daily Tech News Show

05:26 min | 7 months ago

"citizen lab" Discussed on Daily Tech News Show

"Tuesday and workers for glitch have signed a collective bargaining agreement for eleven months according to a press. Release the communication workers of america. It's the first agreement signed by white collar. Tech workers in the us going into effect february. Twenty eighth the agreement does not include higher wages but does include codifying benefits that currently exist agreement also ensures just 'cause protection for glitch employees which means workers can only be fired or disciplined through a specific process. All right let's talk. Apple security. Mit technology review talked to the senior researchers at citizen lab senior researcher. Bill maher check who helped to identify a no click exploit in. I message that apple recently. Re architect it. I message to fix if you remember us talking about that It was a no click thing. Somebody just sent you a text message. You'd never know it and they could actually takeover your machine apple re architect it. How i message worked so that it's not vulnerable. But marcek dented. It never found what the how the exploit actually worked because apple is so locked down and it didn't want to share that level of specificity with them then that's a problem according to marcek marceca argument. Isn't that iowa. Security is bad apples. Ownership of the entire platform means it. Security is one of the best but no security is perfect and when security is really good but not perfect that means the best attackers can get in once. They're in if the code is locked down. It's hard to tell that they're in and zero. Click exploits mean. The target of the attack doesn't know they're they're either company. I've verify was interviewed for the technology review article authorized by apple and looks for things like unexplained file modifications to kind of do some detective work and down like wait a minute. Why is this file being modified. Maybe something's going on but nobody can see inside. Memory for directive evidence of malware maximum. Moving this way to apple doesn't allow software to analyze the memory process of other apps so mauer makers have started developing memory only payloads that can avoid detection. Because apple doesn't let you look at the memory so if you put your malware in memory only payload you can't see it Lots of these operating systems are locked down these days..

marcek february eleven months apple Bill maher Apple Tuesday Twenty eighth iowa first agreement america one marcek dented marceca citizen lab zero apples
Dozens of Al Jazeera journalists had their iPhones hacked this summer by state-backed attackers

Mac OS Ken

02:07 min | 9 months ago

Dozens of Al Jazeera journalists had their iPhones hacked this summer by state-backed attackers

"A seriously troubling security story and gadget ran a piece over the weekend saying that the phones of thirty seven journalists most of whom worked for al jazeera were hacked. Using an i message vulnerability that had been present for roughly a year. That's according to findings from citizen lab reported by the guardian. According to the peace the zero click attacks left no trace and would have allowed access to passwords microphone audio and even snapping photos. The expert was reportedly part of a software suite from nso group. Wikipedia says nso group as an israeli technology firm who spyware called pegasus and the remote surveillance of smartphones. And they're saying don't get us according to end gadget the nso groups that it was not familiar with citizen labs claims and maintain that it doesn't have access to targets data. It said that it investigates any instance where there's credible evidence of misuse by customers and that the software is only meant for pursuing criminals. Apple said it couldn't independently verify citizen. Lab's work but said the attack was highly targeted and that it always urges people to install the latest versions of ios. speaking of which i s. Fourteen is believed to plug this particular hole as for. Nso's argument that their software is only meant for pursuing criminals. Who gets to decide who those are and gadget says. The exact motivations for the hacks aren't clear. But there were four that appear to have origins in saudi arabia and the united arab emirates and and at least two cases acted on the government's behalf so long as the findings says n. gadget. They suggest that some countries are still abusing. so group tools to spy on critics and dissidents. Of course you can just call them criminals and it's cool right

Nso Group NSO Al Jazeera Wikipedia Apple United Arab Emirates Saudi Arabia Government
"citizen lab" Discussed on Cyber Security Headlines

Cyber Security Headlines

02:52 min | 9 months ago

"citizen lab" Discussed on Cyber Security Headlines

"Attackers stage. A dry run get solar winds in october. Two thousand nineteen. Yahoo news is sources. Say the operators of the attack conducted a test of the campaign five months before the supply chain attack began in earnest. This test sent files without back. Doors through signed updates to orion seemingly detest they would actually be delivered and detected and updated. Faq by solar winds indicates that this was the first modification to its updates. It was aware of in related. News and analysis by the wall street journal farsight security and risk iq identified twenty four organizations that installed solar ones orion platform with militias backdoors installed including cisco intel invidia. Vm-ware belkin kent state university the california department of state hospitals and deloitte nso group spyware reportedly used against journalists a new report from security researchers at citizen lab at the university of toronto details. How government operatives used the pegasus spyware from nso group to attack the phones of thirty-six journalists producers and executives at al jazeera as well as journalist at el arab tv in london the attack was carried out using the click kismet exploit chain and i message that worked against phones running. Iowa's thirteen dot five dot one or earlier. Apple said at pets vulnerabilities seemingly with iowa's fourteen. Cia agents exposed with stolen data. A new report in foreign policy looks at the impact of data stolen by state-backed groups and other ap tease round twenty thirteen. The cia began to notice that undercover operatives in africa and europe began to be rapidly identified by chinese operatives. This marked a period where the us intelligence community noted a general professionalization of china's intelligence operations building infrastructure to process that data. They were already collecting both officially and illicitly as well as general rooting out of corruption that previously led to deep penetration into the chinese government. In the early two thousands china began tracking flights and passenger lists it also when after biometric data at airports like at bangkok this information was correlated with data gathered on an attack at the office of personnel management in two thousand twelve which leaked personal data from twenty one point five million people that data could be analyzed to figure out who was a us agent pair that information with travel data and you could figure out who from china those agents met with and with the background data indicating who might be approached at becoming sa asset europol. The european commission launch a new decryption platform. This platform was lodged in collaboration with the european commission's joint research center designed to aid authorities in decrypt information that is obtained lawfully in criminal investigations and managed by your oppose european cybercrime centre functionally. This platform will use in-house expertise with both software and hardware tools to provide effective assistance to national member. state investigations. National police forces from member states can now send lawfully obtained evidence to europol for decryption.

belkin kent state university california department of state citizen lab nso group el arab tv nso cia the wall street journal university of toronto al jazeera Yahoo intel cisco china Iowa iowa london Apple office of personnel management africa
SolarWinds hackers breached US Treasury officials’ email accounts

Cyber Security Headlines

02:52 min | 9 months ago

SolarWinds hackers breached US Treasury officials’ email accounts

"Attackers stage. A dry run get solar winds in october. Two thousand nineteen. Yahoo news is sources. Say the operators of the attack conducted a test of the campaign five months before the supply chain attack began in earnest. This test sent files without back. Doors through signed updates to orion seemingly detest they would actually be delivered and detected and updated. Faq by solar winds indicates that this was the first modification to its updates. It was aware of in related. News and analysis by the wall street journal farsight security and risk iq identified twenty four organizations that installed solar ones orion platform with militias backdoors installed including cisco intel invidia. Vm-ware belkin kent state university the california department of state hospitals and deloitte nso group spyware reportedly used against journalists a new report from security researchers at citizen lab at the university of toronto details. How government operatives used the pegasus spyware from nso group to attack the phones of thirty-six journalists producers and executives at al jazeera as well as journalist at el arab tv in london the attack was carried out using the click kismet exploit chain and i message that worked against phones running. Iowa's thirteen dot five dot one or earlier. Apple said at pets vulnerabilities seemingly with iowa's fourteen. Cia agents exposed with stolen data. A new report in foreign policy looks at the impact of data stolen by state-backed groups and other ap tease round twenty thirteen. The cia began to notice that undercover operatives in africa and europe began to be rapidly identified by chinese operatives. This marked a period where the us intelligence community noted a general professionalization of china's intelligence operations building infrastructure to process that data. They were already collecting both officially and illicitly as well as general rooting out of corruption that previously led to deep penetration into the chinese government. In the early two thousands china began tracking flights and passenger lists it also when after biometric data at airports like at bangkok this information was correlated with data gathered on an attack at the office of personnel management in two thousand twelve which leaked personal data from twenty one point five million people that data could be analyzed to figure out who was a us agent pair that information with travel data and you could figure out who from china those agents met with and with the background data indicating who might be approached at becoming sa asset europol. The european commission launch a new decryption platform. This platform was lodged in collaboration with the european commission's joint research center designed to aid authorities in decrypt information that is obtained lawfully in criminal investigations and managed by your oppose european cybercrime centre functionally. This platform will use in-house expertise with both software and hardware tools to provide effective assistance to national member. state investigations. National police forces from member states can now send lawfully obtained evidence to europol for decryption.

Belkin Kent State University California Department Of State Citizen Lab Nso Group El Arab Tv NSO CIA The Wall Street Journal University Of Toronto Al Jazeera Yahoo Intel China Cisco Iowa London Office Of Personnel Management Apple Africa
Al Jazeera journalists ‘hacked via NSO Group spyware’

News and Perspective with Tom Hutyler

00:30 sec | 9 months ago

Al Jazeera journalists ‘hacked via NSO Group spyware’

"Watchdogs Citizen Lab at the University of Toronto finds dozens of journalists at Al Jazeera have been targeted by advanced spyware likely linked to the governments of Saudi Arabia and the United Arab Emirates. Al Jazira zone by Cutter Citizen Lab says malware on the personal phones of reporters, producers and executives of the media company were traced to the Israel based NSO group. Apple hasn't been able to identify independently verify Citizen lab's analysis, but is reassuring Users and S O doesn't target the average iPhone owner

Al Jazira Cutter Citizen Lab University Of Toronto Al Jazeera United Arab Emirates Nso Group Saudi Arabia Israel Apple
User Coalition Fights To Keep Chinese App WeChat In U.S. Market

NPR's Business Story of the Day

03:42 min | 1 year ago

User Coalition Fights To Keep Chinese App WeChat In U.S. Market

"President trump recently issued an executive order that would effectively ban the Chinese APP we chat in the United States starting. In September the order says the APP poses a threat to national security, but is a coalition of users who are trying to intervene. Here's NPR's John Ru which cloud you practices corporate and commercial law in the San Francisco Bay area most of his clients Chinese and they all use we chat so I maintain develop clients through. All, the time I. probably spend two hours each and every day. It's also how he communicates with his sister and eighty five year old mother back in China's Hunan Province. Her Mama when trump issued executive order Jew and other lawyers who also served the Chinese speaking community were alarmed. They discussed it in a we chat group naturally and decided to fight it in court. So they set up a nonprofit called the US we chat users. One of the lawyers from the we chat group she says, they plan to file a suit in the coming days. The group she says has no connection to the Chinese government or tencent the Chinese company that owns Wechat we are not interested in the politics behind us but one the government tries to resolve a problem they should try to minimize the harm. The executive order is the latest in a string of measures. The trump administration has taken against China in recent weeks. It prohibits quote transactions with which at and ten. The term is open to some interpretation, but legal experts expect that APP stores at the very least will have to remove we chat. Angus knee is a lawyer in Seattle. The executive arm is while with its rights determine that something is or is not a threat to American national security, but it's reasoning especially when it's actions have such a negative impact on such a racially kind of based minority needs to be well justified in while supported China's so-called great firewall blocks many Western communication and social media APPS making indispensable. But we chat sensors, sensitive messages, and like every other APP in China, it would be required to hand over information. Should the government ask they're definitely? Security risks to people using those technologies and we need to address that I just wish it was done. Really Ron. Debate is director of the citizen lab and Internet watchdog at the University of Toronto. What the trump administration did as a way I think almost like a nuclear option fighting in court will be tough though Bobby Chesney is a national security law expert at the University of Texas. Oh it's a hugely uphill battle. He says it'll be hard to win a case arguing that the executive order curtails free speech came without due process or amounts to the government taking away property or livelihood. The same holds for a case that says, the government hasn't supplied enough evidence of the risks that we poses a judge is also going to save them, but maybe that somehow helps them to different court bringing a suit raises the profile of the issue, and just might influence how the government interprets the word transaction and ultimately enforces the order. If the legal challenge doesn't pan out businesses like launchings restaurant chain easterly will have to make major adjustments. Hunan style eatery offers group deals, takes orders and stays in touch with thousands of customers in the bay area through we chat. With no dining in because of the pandemic Wong says, easterly is even more reliant on we chat. H. You misleading trembled for now he says they are scraping by without we chat he fears easterly will lose business and its connection to its customers

Executive Chinese Government China United States Easterly San Francisco Bay Bobby Chesney NPR Hunan John Ru President Trump Seattle Hunan Province Tencent RON Wechat University Of Toronto Wong Director
Why does Donald Trump want to ban TikTok?

Risky Business

06:26 min | 1 year ago

Why does Donald Trump want to ban TikTok?

"For those who are blissfully unaware late last week, us? President Donald Trump announced that he would ban Tiktok and furthermore he said he would block Microsoft from taking over the APP which was apparently a deal that was in the works Then he's back flipped and given Microsoft, forty five days to complete the transaction and he's, but now he signed that the US Treasury should get a copy of the deal which seems weird in a country, which is terrified of socialism so like That's a basic recap, but there's so many little weird bonkers nuances to this Britain I actually bret benefit and I actually read about published on risky Biz in the Linke's quakes showing. But look, let's let's get the conversation going now and we'll start with you, alex, know they're probably some national security ramifications or concerns around APPs lactic TIKTOK. But why do we get the impression? That's not what's driving this whole thing? Well, you make it then. Prussian, because the president of the United States continues to change his justification of what he's doing is making a national data protection law up on the fly on twitter. and. So you know it's it's quite possible that watching what's going on that. You'd reasonably conclude that this isn't a well-considered change in policy, but perhaps part of the ongoing trade war and yell perhaps a mix of trump's anger at what would normally be protected speech against him on Tiktok and partially to distract from the fact that at the same day that he made that announcement, it was announced that the United States economy shrunk by nine percent in just one quarter. And so you know all those things together. Is really polluting this process now that being said I, think there are some interesting risks here in there is something we have to talk about about Chinese APPS and the data of Democracies sitting servers available to the PR. But if you're going to do that for my perspective Tiktok is probably not even the top five or top ten companies. I'd be concerned about there's a lot of Chinese companies that are much more critical inner city and much more important data than they are. This seems. To be completely driven by trump and not by some kind of process and either the White House or or the agencies were, there can rationally considering these things. Now look you and I, we have access to gripe bonds that most people don't actually have access to. A wonderful part of the job. I mean, my gripe tells me that this is not going through the usual processes. I mean the US investigation into Tiktok did start last year. Right? This is a legit sign. Lee Rooted investigation, but it's the escalation since like last week, that is just the just the mad pot, and as you say I mean why the hell out we talking about we chat and that's that's a curly a one to a strategy. I know that there are politicians here. Who Use we chat as a way to communicate with Chinese Australians, for example, right? So that whole thing is a can of worms and I think blocking chat in. A, lot of places around the world is going to be a real loser, right? So that's maybe one reason people don't WanNa. Touch it. But yeah, this is a very complicated. Nuanced issue that has just been. The whole thing strange. Isn't it? It is so syphilis. The law that we're talking about here is was really built to protect kind of the American industrial base around defense. Rightly, you have an important helicopter manufacturer and you don't WanNa get bought by Iran. That's what cities is for. It has never been used as a back door for data protection framework right here. In the United States, we do not have data protection framework. There is no law that says you cannot ship social security numbers of Americans to a Chinese company. Nothing prevents that in theory now, obviously, we have A. Rules that have been created through FTC decisions and such. But overall, we don't have a framework for deciding what is really important Pi and work in it set up, and so to create that out of whole cloth, using a stiffest interpretation is really probably the worst way to handle what is eight really really complicated problem, and like you said, there's other companies put away the top and I think for my perspective, we chat the top Vermont for me. Right is used by the entire chinese-speaking Gaspara. Anybody who has any in China uses it, and that includes people in Singapore people in Hong Kong people in Taiwan. So lots of these places where Chinese intelligence is really interesting. What's going? We chat has become. Part of People's daily lives, and unlike tiktok, it carries very sensitive data. Right? People run their companies. All we chat, they have their personal communications reach at the. They probably arrange affairs and do things that are very black maleable on we chat and there evidence from Citizen Lab, and some other folks who have done worth that demonstrate that you can kind of get side channel information out of we chat that demonstrates that they are watching and they are doing at least scanning of certain phrases, even communications that go. I. Mean I m point, I. think that's well known and well established that we chat is certainly used by the EPA to do surveillance, right? Like that is the reason. So successful in the reason that they can block other communications, funnel people through it, but this brings us to an important question. There are some concerns that say censorship on TIKTOK. For example, there was a case where they would deleting videos that referred to. Human Rights abuses occurring in Xinjiang in in China, right, and that turned into a into massive Khufu four. Good reason. Don't get me wrong Let's not pretend for a second, the PSE or a bunch of fluffy. Fluffy pandas. Okay. That is that is certainly not the case. But let's, be real. Trees names for them. But let's look. Let's be be real here. Right? Like the hottest security angle to this, right? It's it's. It's hard to make a case that it's. It's a terribly dangerous APP now when the United States blocked the sale of grinder. To to an offshore concern I, mean I think that was another Chinese company that wanted to buy that. Absolutely. Anyway, near when they wanted to buy a company that track Global Hotel reservations again, that it's type of information is incredibly valuable to US intelligence in two, thousand, six, the US government's blocked checkpoint, which is an Israeli from blind buying sauce fly because source for. Through. SNORT had deep in US government networks. The right in all of these situations where this has happened before you can point to a single reason and you can say this is why. Absent here,

United States Tiktok President Donald Trump Microsoft China President Trump Alex Wanna Vermont Iran Bret Britain EPA Twitter. White House LEE FTC
Trump declares national emergency over coronavirus

America First with Sebastian Gorka

02:45 min | 1 year ago

Trump declares national emergency over coronavirus

"Week the president declared a this national emergency on Friday what you seen occur over the last several days is for spread to increase across the United States and that'd been coincident with Italy in Europe really having a tremendous increase in cases that your listeners and viewers I'm sure aware this this started in China and so originally the president had an aggressive posture restricting travel back and forth to China and that slowed the spread into the United States but then Italy became the new China and seated most of Europe and that when we look at the data now most of our cases in the United States by far are coming from Europe the the good news is that we're seeing more testing availability what that means is that we're also going to see more cases we're going to see the numbers go up the people should expect to see the numbers increase quite a bit over the next several days because if there is a backlog of testing and it's not that we're now catching up on the other good news that I would mention is that China actually reported no new cases in the last twenty four hours so that's good news because even though we're going to see our our numbers increase that China and South Korea data tell us that we really lean into the mitigation measure these fifteen days to slow the spread then we can actually bend or curve and hopefully get on a trajectory where in six to eight weeks just like China just like South Korea we're seeing fewer and fewer cases a citizen lab's how important the the president's given out his guidelines we've used the video that you have posted of yourself talking about the next fifteen days the common sense measures how crucial is it that old age cohorts in America abide by those guidelines not just those over sixty five but everyone it is absolutely critical again and we we heard about two weeks away from where Italy wives or put another way two weeks ago Italy had the same numbers that we have right now in the United States so we are at an inflection point and we need to make a decision as a nation we want to end up like Italy where they're overwhelmed their health care workers are sick and they don't have any more capacity and people are dying or do we want to go like South Korea and in and China and when you look at the modeling out there we have the ability to bend this curve but the worst case models assume that we don't do anything the best case models assumed is fifty to seventy percent participation in the community mitigation efforts and that both go to corona virus that gov you will see the guidelines that the president put out for America and he put them out because all American need to

President Trump United States Italy Europe China South Korea America
"citizen lab" Discussed on Malicious Life

Malicious Life

04:57 min | 1 year ago

"citizen lab" Discussed on Malicious Life

"High. I'm Bill Marzak. I am a senior research fellow at the Citizen Lab at the University of Toronto. I'm also a postdoctoral researcher. And Computer Science at UC Berkeley and the International Computer Science Institute in Berkeley Citizen Lab is one of the world's premier suburb research institutions. It's reporting has contributed to the research we've done for episodes on. Is this China Versus Gab? And spyware for this episode. Bill will act as a guide where Patrick figured out the what of Tow Truck. It was bills. Investigative work that tied together the WHO and perhaps some of the why Nate Nelson. Our senior producer asked Bill. How did he come to work? On this case it's actually kind of an interesting story You know at at citizen lab were very interested in looking at these sorts of APPs which might have a security vulnerabilities or privacy vulnerabilities. So then when this to- touch case came we were contacted by Some some individuals who felt that maybe this APP was sort of a spy APP or was designed for surveillance so they said Hey citizen lab. Can you guys take a look at this? The first part of bills investigation was probably the easiest. It didn't take researcher of his talent. To figure out that Jacko and his co founder long who won weren't being completely straightforward with public. There's no indication in my mind that that despite the reports That this is some sort of Startup that is you know. Sort of organically funded in these people just decided to make this APP I think it's very unlikely if that's the case because there's just no discussion of this before co founding to talk long run spent two years as the VP of marketing. And then two more years as the chief operations officer for ye call the APP which to talk acquired and largely used as its own so these people were had no previous association with the name. To- Talk What they did have was a previous association with Group. Forty two and group forty two is interesting because talk was developed under the name group. Forty two I am. Before it became nameless ta-talk on linked in Jock list himself having been the marketing and communications manager at group forty two before co founding to talk longs connection is less clear at a certain point in two thousand nineteen group. Forty two changed. Its name to breach. Holding Ltd so in this case the APP store listed a a company called breeze holding which seemed. Kind of weird. I mean. Initially I thought was We'll wait a minute. This is an Arabic name and the address on the Google. Play store for talk is in Singapore. So that's weird like wise wise one from Singapore one have have these seemingly Arabic sounding name so I started digging a bit more to breach And I found they had an address in this economic free zone in the UAE so like a separate geopolitical entity inside the UAE that has its own a ultimately UAE. Federal law is enforced. But it has its own sort of business law which is different from from standard. Uae Law. So they have their own a website for registering the corporation and looking up corporation data. So as to to use those sorts of websites dig into breeze There was also another company called Toy. Talk Holding Which you know has its own set of directors and investors and all this So so that's sort of how I started was looking at okay. Well I knew the address. I know that this corporation should be registered on. This website was website. Say about who owns it. Who operate said might be behind us so I as I started digging more and more I started uncovering like a web of individuals and companies. This web of individuals and companies was Turbie complex. Trying TO UNDERSTAND. Who's really behind to talk is a little like trying to figure out who farted on a crowded bus. Oh man what is that smell? it's like somebody had some bad philophical in here. I think it's the guy with the microphone. The smell is diffuse enough. That a lot of people could have done it and whoever actually did do it will do their best to play off as if they did..

Bill Marzak Berkeley Citizen Lab postdoctoral researcher UAE Turbie complex Singapore Uae Law communications manager International Computer Science senior research fellow UC Berkeley University of Toronto China Nate Nelson Holding Ltd VP of marketing chief operations officer Jacko
WhatsApp accuses international tech company of cyberattack

PRI's The World

04:30 min | 2 years ago

WhatsApp accuses international tech company of cyberattack

"Millions of people around the world rely on what's up to send encrypted messages and make phone calls back in May around fourteen hundred users received a mysterious video call it installed malware on their phones whether they answer the call or not what's up does it now knows who was behind this an Israeli cyber intelligence company called Nso what's that filed a complaint in US Federal Court against the company this week John railed in helped what's APP chase down people who were attacked. He's a senior researcher at Citizen Lab at the University of Toronto will there to discoveries here one is remained by citizen lab and the other discovery made by what's up talking about WHATSAPP for a second they had been looking into the possibility that weird things were going on the way that their APP connected calls and they found something and what they found was that a private spyware company had been deploying this technology for hacking telephones through whatsapp so that doesn't mean hacking what's at messages that means leveraging what's up to deliver a malicious payload what's out then enclosed of honorability and told the world about it then for the past several months citizen lab volunteered to work with what's APP to try to understand who was targeted can you name any of them the organizations or types of people or are you keeping mum on that what I can tell you is the victims included human rights defenders analysts investigating official corruption broadcast journalists working on international issues prominent women in multiple countries who are the victims of cyber violence in other words a WHO's who of the kind of people that authoritarian states a water bug if they get the ability to do so and were they being targeted in particular country ace or was it people all over the world it was people all over the world the cases that we're talking about today include targets in over twenty countries in for continents and what kind of country is their common theme to any of them I would say that the most common theme is actually among the victims which is these are people who have often pushed back against authoritarian or unaccountable official behavior and been rewarded by being targeted for it now what's that is accusing NSO group an Israeli based Cyber Intelligence Company of committing the attack who and what is NSO and who so group is firm that sells to governments they claim the ability to remotely Hack and monitor telephones they've been doing this for a while and for as long as they really have been active citizen lab and researchers at Amnesty International have been finding cases where they're powerful products get abused target members of civil society like human rights defenders and journalists the product that they sell that they're most well known for is something called Pegasus and assists is basically a technology for turning a telephone into your in your pocket into a spy in your pocket it can read your encrypted messages listen to your encrypted phone calls siphoned off your personal photographs and also do things like quietly activating the microphone where your phone is in your pocket now is it even legal for Anisa group to produce such technology will this is a great question and the world of companies like NSO that pedal this sort of spyware has this interesting and until yesterday quite unaccountable me which is on the one hand they claim the because they're selling to governments we should trust them at the same time when the products could abused they say well this was czar government customers during this don't look at us but they're quick to cite successes of course never with any detail naps lawsuit yesterday basically pierces that bubble and says first of all and so was directly involved in these cases and second of all you can't be on accountable if you sell this kind of power technology with this potential for for being used and abused how pervasive is this Pegasus Technology I mean how worried should we be I think we can assume that the actual use of this kind of technology although not spectacular is quite a bit larger than the companies would have us believe which would make us all extremely concerned John. Scott Raritan is a senior researcher at Citizen Lab at the University of Toronto thanks a lot

Senior Researcher Citizen Lab University Of Toronto Us Federal Court John Scott Raritan One Hand
WhatsApp Security Flaw Could Allow Hackers To Install Spyware

The Takeaway

03:42 min | 2 years ago

WhatsApp Security Flaw Could Allow Hackers To Install Spyware

"Platform, what's revealed a major security flaw that could have made it's one point five billion users vulnerable to hacks. The company announced that hackers targeted a flaw in WhatsApp software to gain access to users phones, the tools the hackers used reportedly bear resemblance to those developed by NS group in Israel, cyber firm that has been accused of providing tools to spy on journalists in human rights advocates. What's has not said if specific users were targeted or how many may have been compromised, Molly Roberts is an editorial writer covering technology and society for the Washington Post, and she's been covering the breach mulling nice to have you on the show. Thanks for having me. So what specifically were these hackers looking for? Well, it really depends on the government that was using the tools developed by initial group. But essentially what they were given access to. By just placing a call or video call to a WhatsApp number was the entirety of users phone, so they were given access to the microphone to the camera. And then from that they were able to take a look at a lot of it was on the device. So not only what that messages, and we're hearing that the attack has been linked to the NS group and Isreaeli cyber firm. What do we know about them? And why are people making that connection? So they're making that connection because the analysts have taken a look at this said that the aware has a similar digital footprint. What they've seen before from this group what we know is that this group was operating in secret until about twenty sixteen when their software was found on the phone of a now jailed human rights activist in the United Arab Emirates. And since then they've been a number of lawsuits active in raising alarms that they are providing the software to government and law enforcement agencies to spy. Bye on kind of whoever they want to spy on. So NS. Oh group says well, we are vetting these people for human rights concerns. We are ensuring that they're using it legitimately for law enforcement purposes, but it has been given to some questionable governments, including the including Saudi Arabia, Mexico, Morocco, some governments human rights records aren't really perfect. And so it's uncertain how they'll be using it once they have this off where they can kind of do what they want what our producers spoke to John Scott rail. Tin who's a senior researcher at citizen lab. And they're in academic investigative group at the university of Toronto. Let's take listen to what John had to say about NSO. Most recent case if indeed this is Dennis O is troubling. Because that no trickery is required. You can just target anybody with what's number. What does he mean by no trickery is required there? So what he means that we've all been told to look out for phishing attacks, we've been told not to click suspicious links or maybe even now to answer. Spacious numbers. What's particularly interesting about this attack? And particularly pernicious is that it's quote unquote, zero click attack you don't even have to answer. This phone call. These numbers were calling. They were coming from the strange location, the London human rights lawyer who noticed this was getting calls from Sweden. But then they'd hang up after about two rings and without him or anyone else who's been subject to these attacks doing anything the softwares able to gain access to the phones. Is there anything that people can do or are there any particular devices that are more that are safer than others? So people can do at least for the what's at Filner ability is downloaded updated version of what's at because what's up once. This was discovered worked frantically to patch. The problem and has announced that the problem has been patched. If you download an updated

Molly Roberts John Israel NS Washington Post United Arab Emirates John Scott Rail University Of Toronto Writer Isreaeli Senior Researcher Saudi Arabia Dennis O London Sweden Morocco
UC Berkeley settles lawsuit over treatment of conservative speakers

Morning Edition

01:10 min | 3 years ago

UC Berkeley settles lawsuit over treatment of conservative speakers

"And I'm Rachel Martin. A lot of countries have a stake in figuring out the truth behind the death of Jamal kashogi. He was a U S resident he died inside the Saudi consulate in Istanbul. So turkeys involved in Saudi fingerprints are everywhere. Now, Israel may have a link specifically secretive Israeli cybersecurity company another Saudi dissident is suing that company he claimed Saudi officials use the company's software to intercept his text messages with Jamal kashogi which in turn led the Saudis to go after the Washington Post columnist NPR's Daniel estrin is online from Jerusalem to talk about this. Hey, daniel. Hi, tell us more about these allegations. And what do we know about the Saudi dissident making them? His name is Omar Abdulaziz. He tells a very compelling story. He's a social media activist. He's a critic of the Saudi Royal family. He lives in Montreal. And in his lawsuit. He says Saudi officials in Canada met him in may told him crown prince Mohammad bin Salman was unhappy with his activism, they asked him to come to the Saudi consulate for further discussion, and he declined and he says that he and Jamal Shoghi started working together on an initiative to organize a group of Twitter activists against the Saudi regime, and then this dissident got a text message with a link supposedly DHL package delivery, and he clicked on the link and later a Canadian group citizen lab said it believed that he fell victim to a cell phone spyware her from an Israeli based company NSO, he spoke with NPR's, Shannon, van sands. And he said he thinks the Saudis intercepted his WhatsApp text messages with cou- show. And that was the deciding factor that led to his death. Here's what he said for. Sure conversations between us. Played a major role of what happened to Jim. They found out what we were working on. And what are these project on? Why was behind what do we know about this company? That makes a spyware NSO is its name. It's a very secretive company. It doesn't have a website. It was founded by three Israelis there. First names form, the initials NSO and their Isreaeli reports that the company recently sold its spyware technology to Saudi officials the company defends itself. It says its products are only sold to governments and to law enforcement till to fight terrorism and crime, but Israel is actually involved in his company, and that is rarely government officials have to give the okay to let it settle its products abroad. This company is faced a lot of controversy. Mexican human rights activists and others say Mexican government officials hacked into their phones using this company spyware same accusations from a human rights activist in the United Arab Emirates Amnesty International also says the software was used against one of its employees and amnesty is accusing Israel of allow. Allowing the spyware to be sold to regimes that violate human rights, well, considering the company's connections to the Israeli government is the suit likely to go anywhere. It seems like it's more of a symbolic lawsuit. Rachel to draw public attention to this issue. I think it's going to be hard to prove these claims in court and the Israeli defense ministry has constantly defended its vetting of NSO technology sales abroad, and I should add that Israel's not the only place in the world where companies are developing spyware technology. But it is Israel is a big player in the field and presumably Saudi officials aren't weighing in on whether or not they actually bought this technology confirming connection, they're not. And it's very interesting Saudi and Isreaeli ties are kind of under the radar. But this may be an example of some those times NPR's, Daniel estrin. Thank you so much Daniel, we appreciate it. You're welcome. On a chilly day. This month veterans marched a dozen miles up the island of Manhattan to a special spot. It was where in November seventeen seventy six. The first woman to fight for the US army fired her candidate British Redcoats, a Bill in congress now proposes to name the Manhattan VA medical center after Margaret Corbin the effort to honor her is linked with a movement to change. The motto of the department of veterans affairs to also reflected women have always served NPR's quil Lawrence reports at the northern tip of Manhattan. There's a high bluff with a great view, just what General George Washington wanted for the defensive of New York against the British the actual defending fell two soldiers like John Corbin and his wife, Margaret, they were outnumbered after John was killed Margaret sponged loaded and fired the gun all by herself. That's Christian rows who served three tours with the army in Afghanistan and witnesses

Saudi Consulate Israel Omar Abdulaziz Jamal Kashogi Saudi Royal Family Daniel Estrin NPR Margaret Corbin Rachel Martin Jamal Shoghi NSO Prince Mohammad Bin Salman Washington Post Istanbul Jerusalem Manhattan Israeli Government Rachel