After the last reporting The video of the “raw” Jeffrey Apstine jail posted by the FBI on Saturday was changed in at least in some ways (though there is no evidence that the footage was manipulated by fraud), the wired reported on Tuesday that the video’s metad data was about 2 seconds and 2 seconds.
The United States Department of Homeland Security is facing a dispute over DNA samples, which has been taken from about 133,000 migrants and young men, which the department has included in a criminal database. Meanwhile, researcher Jeremiah Folder published the results this week that data on biological parents, children and adoption parents, including 2GB of information, were exposed and publicly accessible to the Internet.
Roblox’s new reliable contacts feature includes age verification of age that uses AI to scan the video selfies and determines whether they can be accessed with unauthorized chatting with them. And as video depp is firm in capabilities – including AI tools that can also directly add to video footage – the “noodiev” platform is pulling millions of users and generating millions of dollars from US companies using tech.
And more. Every week, we prepare for security and privacy news that we did not cover the depth. Click headlines to read full stories. And be safe there.
The Chinese state -organized hacking group is known as Salt Typhone, last year, with the revelation that the United States was surprised that it had deeply entered the US telecom system, even when the then substance Donald Trump and JD Venice were made of real -time and telephone. Now it appears that the group’s spying is involved in the US military, and has spent most of the last year inside the US National Guard’s network in at least one state. NBC News reported this week about the DHS memo, which has been obtained by the transparency of people’s national security through non -profit property, warning that the Chinese hacker group violated this state -level National Guard network from March to December last year. He did not identify which state was targeted. According to the memo, Salt Typhone’s access “potentially provides data to Beijing, which can provide many of the Hacking of Army National Guard units in other states and possibly providing many of their state -level cyber -scorey partners.”
The Trump administration is developing a new digital system designed for the implementation of immigration and customs, which is accessing taxpayers’ sensitive data, including their home addresses. The internal blueprints revealed by Propabilica on Tuesday shows that the system is designed to automatically and accelerate the exchange of data, ignoring traditional IRS protective forces, which usually require all kinds of reviews and legal justification. This system represents a major change on how IRS data is accessed, and it is already raising concerns among civilian freedom experts who say the process can violate privacy laws, and can further gain tax data for deportation purposes.
It is a disturbing idea that a zero -day weakness that allows train brakes to be malicious hackers through malicious hackers. The risk of more than 7,300 days that leaves the trains exposed to this brake hack is a shocking level of negligence for a significant part of the US infrastructure. The CyberScureti and Infrastructure Security Agency last week issued a consultation on the reduction of verification in a protocol that allows a device (hot) head to send a break signal to another device at the end of the train (EOT), such as freight trains such as freight trains. This meant that hackers could send their extraordinary orders to disrupt trains, shut down rail networks, or even cause tracks, the consulting consultation told Security Week. The issue has been further considered by the fact that the researchers discovered that the threat was first reported in 2005 but it was never taken seriously nor decided. The process, which began next year, is designed to replace thousands of weak and EOT devices.
Hackers who want to make a bottle of malware -controlled Internet -Things devices can make these devices CL for weaknesses. Or better yet, they can affect them before sending them. Google has announced this week that it will file a lawsuit against the so -called Bed Box 2.0 boot net organizers, which included 10 million Android -powered TVs that were somehow affected by malware before being sold to consumers. Botnet operators, as described by Google as Chinese cyber criminals, then sold access to devices that can be used as proxy machines or uses fake advertising ideas in a wide click fraud scheme. Google’s complaint states that Bed Box 2.0 “is already the biggest boot of Internet -connected TV devices, and it increases every day. It has damaged millions of victims in the United States and around the world.”


