Android may soon warn you about fake cell towers


In recent years, North Korea has sent thousands of so -called information technology workers to infiltrate Western jobs, receive wages and send money to support the regime. As these designs have become more successful, they are increasingly wrapped up and have used new tactics to escape the diagnosis.

But this week, the US Department of Justice has revealed one of its biggest operations to deal with information technology workers to date. The Ministry of Justice says it has identified six Americans who are said to have activated the projects and arrested one of them. Law enforcement authorities in 16 states searched for 29 “laptop farms” and discovered more than 200 computers as well as web domains and financial accounts.

Meanwhile, a group of young cybercriminals have created chaos around the world and empty food stores and temporarily carry out some flights due to their crippling cyber attacks. After a quiet period in 2024, sporadic spider hackers returned this year, targeting cruel retailers, insurers and airlines.

Also this week, we have explained in detail how LGBTIQ+ organizations in El Salvador help activists carry out attacks against their community and better protect themselves from government oversight.

And there are more things every week, we collect security news and privacy that we have not covered deeply. Click the titles to read the full stories. And stay safe there.

Cell site simulators, often referred to as stingrays or imsi catchers, are some of the most secret and powerful supervision tools today. Devices that forge cell towers and intercept communications can collect uterine calls, place information and other traffic about what you do on your devices. They are increasingly used by law enforcement and immigration authorities.

However, according to a report from Android Authority and ARS Technica, future hardware progress has led Google to make their efforts to combat possible snooping. Starting at Android 16, compatible devices will be able to identify device IDs such as device or SIM IDS and issue warnings when connecting to a non -encrypted cellular network. Examples of warnings show warnings that “calls, messages, and data are vulnerable to vulnerable” when connecting to insecure networks. There will also be notifications when returning to an encrypted network. The option to turn on these notifications will appear on the mobile network security settings page next to the option to prevent 2G networks, which can help block some IMSI receivers to connect to your device. However, while the settings will be available on Android 16, it may take some time for Android devices to use the required hardware.

Prior to the presidential election last November, Iran -related hackers attacked Donald Trump’s presidential campaign and stole a large number of emails in a clear offer to influence the results of the election. Some emails were distributed to journalists and Biden campaigns. This week, after the Israeli-Iran clash and US interference with the “Bunker-Beat” bombs, the hackers behind the email again disrupted the email and told Reuters that they might be disclosed or sold most stolen emails.

Cyber criminals claimed that they stole 100 GB of email, including some of the White House chief of staff. Email cache is also said to include items by Lindsey Halligan, a Trump lawyer, Roger Stone’s advisor and the star of Adult Daniels Adult Movie. The hackers used by Robert’s name told Reuters to “want to broadcast this.” It is unclear whether they will act on threats.

In response, US officials claimed that the threat of hackers was a “calculated smear campaign” by an external power. “A hostile foreign enemy threatens to illegally use repeated stolen and unconfirmed materials in an attempt to divert, discredit and divide,” said Marseille McCarthy, a spokesman for the Cyber Security and Infrastructure Agency.

Over the past few years, Salt Typhoon has been hacking against US telecommunications networks and has been successful in at least nine firms and access to American texts and calls. Brett Litreman, a recently appointed leader in the FBI cyber section, tells CyberCoop that Chinese hackers are now “mostly” and are lying on the networks. Litreman said these groups are not out of the network, because the more there is in the systems, the more there are more ways to find “sustainability tips”. “At present, we are very focused on resistance, deterrence and significant support for the victims,” Litreman said.

Deepfake platforms that allow people to create non -sensory, often illegal and harmful women without clothing in recent years. A former whistle and documents from one of the so -called “Nudify”, textile programs, claims that the service has several million euros budget and is planning an offensive expansion in which it creates non -existent images of celebrities and influential people. According to the report, the expansion claims that the marketing budget is 150,000 euros (about $ 176,000) to promote images of celebrities and influential people. It said that more than three -ten people work for the fabric, and identified some of the potential key operators of the platform. Exposed documents also revealed the customer’s email address. A spokesman who claimed to represent Clothoff, as part of the central team, rejected more than 30 people and told Der Spiegel that it had no budget for several million euros.

Leave a Reply

Your email address will not be published. Required fields are marked *