For years, a The mysterious personality that leads to the handle led to a truck boot ransomware gang and avoiding identification. Even other members of the group were leaked and exposed. This week, the German authorities revealed, without any dhoom dham, who believes that the secret hacker is to be Kangapin: a 36 -year -old Russian man, Vatley Nicolich, who is largely left in his home country.
Near the home, the Wired revealed that Customs and Border Protection have seen 133,000 immigrants and adolescents from their mouths to submit their DNA and upload their genetic data to the national criminal database used by local, state and federal law enforcement agencies. Since the Trump administration’s refugee crackdown is underway, which often justifies crime and terrorism, the wired also revealed that a US -based Nazi “Fight Club” based in California is connected to the right -wing martial arts tournament in Swedish.
We want to avoid the US government’s surveillance, we have presented points about more private alternatives to the US -based web browsing, email, and search tools. And we have gathered another general guide to protect ourselves from surveillance and hacking, based on the questions that our senior author Matt Burgess received in a reddate, ask me something.
But that’s not all. Every week, we prepare for security and privacy news that we did not cover the depth. Click headlines to read full stories. And be safe there.
According to the Wall Street Journal, the FBI is investigating who has imitated Susi Willies one of the Trump White House chief of staff and close advisers of the president, which has called a fraud messages and high -level Republican political figures and business executives. Government officials and officials involved in the investigation say spare -fashing messages and calls have targeted individuals in the list of Wellies, and Willies has reportedly told colleagues that his personal phone has been hacked to access these contacts.
Despite Wils’s claim to hack his device, it has not been confirmed whether the attackers have really identified the Wildear’s colleagues. The combination of publicly available information and data sold by gray market brokers will also be possible to submit a target list.
“This is a shameful level of security awareness,” says Jack Williams, a former NSA hacker and vice president of research and development in the Hunter Strategy. You cannot persuade me that he really received his security training. ” “This is a variety of garden social engineering that everyone can end tackling these days, and certainly top government officials should expect it.”
In some cases, the goals not only received text messages, but also phone calls that imitate the voice of Wells, and some government officials believe that these calls may have used artificial intelligence tools for the sound of fake waves. If so, the incident will make the incident one of the most important issues of so -called Deep Fic Software in an attempt to fashing.
The bureau allegedly told White House officials that it is not yet clear how the Willes phone has been hacked, but the FBI has rejected the foreign nation’s involvement in the imitation campaign. In fact, when some of the imitation efforts achieved political goals – for example, a member of the Congress was asked to collect a list of people who can forgive Trump. The grip of money shows that the spopping campaign can be less than a high -level target, a run -off mill cyber criminal fraud scheme.


