Israel Says Iran Is Hacking Security Cameras for Spying

Spread the love

In the Israeli airstrikes Incoming threats of increasing further by the United States of America this week and the United States, Iran has begun to limit internet connection to its citizens seriouslyTo restrict access to Iranians’ important information and deliberately pushing them towards domestic applications that may not be protected. Meanwhile, Israel-bound is known as hacking group The hunter sparrow is running cyberwar in Iran’s financial systemAttacking to Iran’s Sepah Bank and destroying more than $ 90 million in cryptocurrency held by the Iran Crypto Exchange Nobitex.

Still reeling in the USA Violent shooting spree in Minnesota last weekend Aimed at the lawmakers of the democratic state and their families, an FBI affirmation indicates that Suspicious shooter Data broker sites complained to find the target address And other personal information about them. The search highlights the potential danger of the private data available.

This week, the wired revealed it How to win a fight Package, which include our roundup Tools to track the Trump administration’s attack on citizen freedomPlus is our most up-to-date version Guide to protect yourself from official surveillance, EgAnd Protect yourself from searching phones on the US borderThe When you are it, don’t forget Print its own copy of how to win a Fight ZineAnd! Better, print two and leave a local coffee shop or library.

And there are more. Every week, we look at the news of protection and privacy we didn’t cover the ourselves deeply. Click the titles to read the whole stories. And stay safe there.

Israeli officials said this week that Iran was compromising on private security cameras around Israel, so that both countries exchanged two countries’ missile strikes after Israeli Barrage. A former official of Israeli CyberSSCURIVER warned on public radio this week that Israelis should confirm that their home security cameras should be protected or shut down by strong passwords. “We know what the Iranians have happened in the last two or three days, trying to connect the camera to improve their missiles in the last two or three days,” said Refel Franco, a former Deputy Director General of the National Cyber ​​Department of Israel. Like many internet-off-thyings devices, surveillance cameras Techover is weakly weak If they are not protected with strong account protection. They were previously targeted in other conflicts for detective collection.

The Kive Post said this week that hackers from the Ukraine’s Chief Intelligence Department (HR) launched a cyberTack against Russian Internet service provider Orion Telecom that disabled 370 servers, took about 500 network switches and deleted backup systems to prevent recovery. The attacks are reported to have caused the Internet and television confusion. Orion Telecom has reported that it is recovering from a large DDS attack and will recover the service quickly. The attack is June 12, known as National Holiday Russia Day. In a message broadcast on the Telegram groups, the invaders wrote, “Happy Holiday, disrespectful Russians”. “Soon you will live in the era of stone – and we’ll help you get there UK Ukraine’s glory.” The attackers have claimed that the BO team hacking group in Ukraine is part of the Hacking Group. Sources have told Kiev Post that Russian security agencies working in the country against Ukraine were used by Orion Telecom and were affected by connection conflicts.

Bloomberg said this week that the satellite communications agency Viasat had discovered a violation of China’s Salt typhoon spy-centric hacking group earlier this year. In early December, US authorities revealed that Salt typhoon hackers embedded themselves to the US major telecom, including AT&T and Verizon. After Published last year Group’s broad telecom hacking spree in the United States and elsewhere, the wired February revealed that Salt typhoon was Still actively breaking the new victimsThe Viyasat says it is cooperating with the federal authorities to investigate the violation.

The UK Information Commissioner’s Office (ICO) said this week that it issued a £ 2.31 million ($ 3.1 million) fine Wandering As a result of the genetic testing agency 23 and company Damage 2023 Data ViolationThe The attackers were able to access user accounts and their data using the stolen login credentials, because 23 and 23 OME did not require that users set up bi-factor authentication, which ICO had violated the UK data protection law. The company has since then made this protection compulsory for all users. According to the ICO, their data was stolen by the violation of more than 5,000 UK residents, which said that the violation was 23 and “users have no additional verification steps to access and download their raw genetic data”.

Leave a Reply

Your email address will not be published. Required fields are marked *