Security · Social Media Engineering · Supply Chain Hacking

China Uses Hacking to Target Dissidents and Protesters

China went so far as to create fake security tools to collect data to target dissidents and protesters. This included a fake antivirus software that actually installed, instead of removed, trojans on to anyone foolish enough to install Anvisoft. They also created a data mining platform called SonarX to mine social media and gaming accounts… Continue reading China Uses Hacking to Target Dissidents and Protesters

Security

Messaging Service Telegram Used to Track, Trap and Torture Iranian Dissidents

When COVID hit and contract tracing in the EU and North American became “a thing”, I warned everyone that this was not a good idea. When Google and Apple made it a feature on smart phones, I warned everyone that this was not a good idea. Now we have proof as to how this is… Continue reading Messaging Service Telegram Used to Track, Trap and Torture Iranian Dissidents

Biometrics · Electronic Voting · Mobile · Security

Voatz E voting Attacking Critics

They appear to be taking a page of the electric generation and telecom industry handbook and going after their critics. Instead of cleaning up the security of their voting platform, they are suing to make it illegal to make sure that their voting application can’t be used fraudulently. When I google Voatz, I get a… Continue reading Voatz E voting Attacking Critics

Security

Yet Another Reason to Automate Off Boarding

A Cisco employee was fired in April but in September he managed to access enough of Cisco’s infrastructure to delete thousands of accounts and virtual machines. How could he have done this five months after he was fired? Simple, the off boarding process at Cisco is either not automated or not sufficiently automated to cancel… Continue reading Yet Another Reason to Automate Off Boarding