WhatsApp Messenger Fends Off Paragon Spyware
In December of last year, WhatsApp noticed that some users were being targeted with "malicious PDF" files that could compromise the user's WhatsApp account and messages without requiring the user to open the file. TechCrunch reports that the spyware used in the attacks was found to belong to Paragon, a commercial spyware company founded by former Israeli intelligence officers. Meta, WhatsApp's parent company, was quick to notify the victims of these attacks.
So far, we know that Paragon's spyware has only been used by governments to spy on a handful of journalists and activists in Europe. However, Paragon has a contract with the US agency ICE. Whenever government spy tools like this are outed, it's interesting to us lay-people because it provides some context for what the very best hackers in the world are able to do, and what they aren't. In this case, they'd figured out a way to spy on the WhatsApp messages of specific victims, but nothing else on the phone was compromised.
The Bottom Line: WhatsApp uses end-to-end encryption and is still a secure method for communicating with your community. If you use WhatsApp, be suspicious of messages from unknown accounts, especially when they include attachments such as images or pdf files. Consider reviewing your WhatsApp privacy settings and disabling link previews.
Signal Messenger Fends Off Russian Spooks
Just a couple of weeks ago, we recommended Signal, a free secure messaging app available on the app store, for end-to-end encrypted messaging. Signal's security makes it popular with journalists, activists, and also soldiers in Ukraine. Now, Google Threat Intelligence Group has discovered attempts by Russian hackers to try to snoop on Ukrainian soldiers who use Signal. To compromise a Signal account, the hackers must send the user a fake group invite or convince them to scan a QR code that links their Signal account with the threat actor's device. Thankfully, Signal has pushed updates to its iOS and Android apps to protect against these attacks.
The Bottom Line: Signal is still the most secure messenger app out there. However, if you are using it, be wary of scanning QR codes, and don't accept any group invites that you didn't expect to receive. The Google Blog post linked above has examples.
What Surveillance Is Active in Your Neighborhood? Check This Guide
Regional law enforcement agencies, such as local police departments, frequently lease or rent access to surveillance technologies like license plate scanners, facial recognition, drones, and more. This growing market frequently blurs the line between state and private interests, as, for example, a license plate scanner set up on city intersections may be built and operated by a private company that might sell its data to other parties besides the police. The Electronic Frontiers Foundation, a non-profit organization, has released a new crowd-sourced web service and archive to track police and law enforcement surveillance technologies. You can enter your city or county, and they may be able to tell you what surveillance tech is in use in your area.
Keep Your Data out of the Wrong Hands
A VPN is an important part of any online security toolkit, and NordVPN gets our vote. Right now, you can get up to 72% off a 2-year plan, and up to 1 year free with their Prime plan (U.S. only).
Protect the Privacy of Your Community: Free Guide
Speaking of the Electronic Frontier Foundation, the organization recently published a guide to "Building a Community Privacy Plan." We definitely recommend taking a look. It describes different ways to stay private online, be aware of who you are sharing your content with, and how to respond to digital crises.
How Scammers Fool Credit Card Companies
For years, crooks stealing credit cards to use online, a crime called carding, were the scourge of the internet. But then, credit card companies got better at spotting fraudulent use and locking it down. For the past few years, though, carding has been on the rise again, driven by innovative new strategies to avoid the notice of credit card companies. Brian Krebs at Krebs On Security has an excellent and entertaining writeup of the latest techniques: instead of simply capturing the card number and using it in a spending spree, scammers add the card to a mobile phone's digital wallet. Once the phone is loaded with a dozen or so stolen cards, it's sold. The new owner can get away with charging each card a few times before it's shut down.
The Bottom Line: Be wary any time you enter your credit card info in an online form. Your bank will not normally need to send you a text message to verify online credit card activity. However, if your card is added to a digital wallet, your bank will send you an SMS message to verify. If you enter your card data in an online form and then receive a text message, that may be a possible indicator that the web form is secretly trying to add your card to a wallet instead of simply charging it.
Viral Social Media App Rednote Gets Red Marks for Security
When TikTok temporarily went offline in the USA, roughly 3 million Americans jumped over to the Chinese social media app Rednote. Security research institution Citizen Lab has popped open the hood on Rednote and had a good rummage. What they've found is about what you'd expect: its privacy practice is not good. Worse than Tiktok (which isn't that much worse than Meta or X).
Cryptocurrency Scams Account for $12 Billion in 2024
Cryptocurrency analysis company Chainalysis released a report looking back at 2024. They've found that the cryptocurrency scams are still rampant, probably made more money in 2024 than in 2023, and continue to wreak havoc across the savings of victims in the USA and Europe.
International Efforts Crack Down on Cambodian Romance Scams
Prison-like compounds in Laos and Cambodia house hundreds or thousands of scammers, many of whom have been tricked or human trafficked. They are forced to execute romance and cryptocurrency scams, mostly targeting middle-class victims in the USA, Europe, and China. Now, Thailand, which is right next door, is fighting back by cutting off electrical power to the areas and working with cross-border militant groups to liberate compounds.
Newspaper Publisher Hit by Ransomware Attack
US publisher Lee Enterprises has suffered a devastating ransomware cyberattack. The incident has caused outages across the company's services, which it expects to last for several weeks. Lee is one of the largest media companies in the country, with 72 publishers under its umbrella. As a result, there have been disruptions to the printing and publishing of several newspapers. According to Lee, the attackers "encrypted critical applications and exfiltrated certain files," making it impossible for customers to access those applications.
Learn How to Stay Safe Online in 2025
Our online security experts will teach you everything you need to know about protecting yourself online in today's world. Learn how to secure your devices, master password systems, outsmart online scams, and more. Sign up for iPhone Life Insider and receive access to our complete Online Security course.
Comentarios
Publicar un comentario