Reposted by Kim Zetter
How to counter disinformation, based on science: Jon Bateman and Dean Jackson produced a must-read report for the Carnegie Endowment that looks at ten interventions against disinformation. www.techpolicy.press/how-to-count...
0 replies
15 reposts
25 likes
I wrote about Nevada attorney general's attempt to bar Meta from encrypting communications of minors in Nevada. I've included links to court brief filed by Nevada and Meta's response. Riana Pfefferkorn calls it the biggest attack on encryption since the 2016 San Bernardino case. Court hearing is Mon
1 replies
12 reposts
16 likes
Nevada's attorney general filed for a restraining order and prelim injunction against Meta this week to prevent it from pushing out end-to-end encryption as default on Messenger for users in Nevada who are under 18. Hearing is Monday morning. Court brief is here: drive.google.com/file/d/1qq9Z...
1 replies
16 reposts
14 likes
Why did BlueSky just mess with my interface? I liked it the way it was
0 replies
0 reposts
1 likes
Tim Burke was indicted today for leaking unaired Tucker Carlson video clips to media outlets. I wrote about his case last year. You can read the details here: www.zetter-zeroday.com/did-a-journa...
0 replies
0 reposts
3 likes
Banking trojan stole victim face then $40k. "Unsuspecting users are tricked into giving up personal IDs and phone numbers and are prompted to perform face scans. These images are then swapped out with AI-generated deepfakes that can easily bypass security checkpoints" venturebeat.com/security/fac...
0 replies
1 reposts
3 likes
What are the rules for taking something produced by chatGPT. Isn't it stealing from stuff it ingests?
1 replies
0 reposts
2 likes
Great story. Github repository of Chinese firm iSoon reveals hacking ops its done for Chinese gov - "lists targets...summaries of...data amounts extracted and details on whether the hackers [got] full or partial control...spreadsheet showed that the firm had...459GB of road-mapping data from Taiwan"
1 replies
9 reposts
15 likes
Never thought about trying one of those. Thanks for the tip
1 replies
0 reposts
0 likes
✈️
0 replies
0 reposts
0 likes
😂 didn't know that was actually a thing
1 replies
0 reposts
0 likes
US State Department is offering up to $10 million in reward for info about identity or location of the leaders behind LockBit ransomware, and up to $5 million for info that leads to arrest or conviction of any affiliates who used the ransomware in a criminal scheme
1 replies
9 reposts
10 likes
I've left Substack and have moved my ZERO DAY publication to Ghost. It took a while to get it set up and move the content and subscribers, and I still need to tweak the design a bit and get a logo (anyone have a suggestion for a logo?) but this is where you'll find ZERO DAY now:
6 replies
28 reposts
87 likes
Reposted by Kim Zetter
New: Trump Media's long-delayed merger just cleared a major hurdle. The deal would value Trump's company at $8 billion, even though it made only $3 million - and lost $49 million - in the first nine months of 2023. "Classic meme stock," one expert said www.washingtonpost.com/technology/2...
6 replies
11 reposts
50 likes
The real reason companies don't want you to work remotely.
1 replies
2 reposts
8 likes
Responding to call from Rep. Turner calling on Biden to declassify info related to an unnamed national security threat (it's reportedly a threat related to Russia and space), Senate intel committee leaders Warner and Rubio released this statement:
0 replies
0 reposts
2 likes
CiSA could be gutted if Trump wins presidential election -- potential retaliation for its past efforts to fight election disinfo and its adversarial stance against Trump's false claims that the 2020 election was stolen www.politico.com/news/2024/02...
0 replies
10 reposts
9 likes
Reposted by Kim Zetter
Alarmist media coverage of disinformation has negative downstream consequences, including increasing support for heavily restrictive speech regulation, finds @ajungherr.bsky.social & @adrauc.bsky.social doi.org/10.1007/s111...
0 replies
8 reposts
11 likes
He used to work at a Tribune-owned TV station and supplied members of Anonymous with a password to access its content-management system. One of the hackers was able to access the LA Times web site, owned by the same parent company, and altered a headline www.wired.com/2016/04/jour...
1 replies
0 reposts
1 likes
Ok I get it now. This is personal for you.
2 replies
0 reposts
1 likes
I deleted it because I realized there's no point in trying to engage with you. And this reply only confirms that decision. I think you're a good reporter, Matt. I don't understand the aggressive attitude that wants to make things personal and undermine the good work you do.
1 replies
0 reposts
0 likes
Why so arrogant? A respectful conversation to try to understand the perspective of a legal expert is what a journalist should welcome. Don't understand the defensive attitude here.
2 replies
0 reposts
1 likes
Reposted by Kim Zetter
Key takeaway @washingtonpost.com missed: the secret Office of Legal Counsel memorandum that asserts a President can’t be prosecuted for crimes while in office was cited today, but that legal opinion still isn’t available to the American people to read. “Democracy dies in darkness,” after all.
1 replies
8 reposts
20 likes
It's interesting that you mentioned Interstellar as being influenced by Malick - I didn't really make that connection between them before yet I've always thought of Tree of Life and Interstellar as kind of bookends to each other, and it's another film that's highly under-rated.
1 replies
0 reposts
9 likes
I wonder if he re-watched it again today if he'd thank you for introducing him to it.
1 replies
0 reposts
1 likes
The podcast interview made me think I should re-watch a few of his other films as well. Didn't appreciate all of them at the time I saw them.
1 replies
0 reposts
2 likes
Mesmerizing, under-rated film. Reminds me to watch it again.
1 replies
0 reposts
3 likes
Of 8,000 teens surveyed in Europe ages 13-17, two-thirds use encrypted messaging apps. More than half use them for political organizing and 4/5 say they wouldn't be comfortable organizing or exploring their sexuality online if govs could monitor messages
0 replies
0 reposts
1 likes
Critics of end-to-end encryption say children are harmed by it because it lets abusers hide evidence. Susan Landau says this isn't true. "Just like adults—and in some cases even more so—children benefit from the privacy and confidentiality afforded by E2EE."
1 replies
6 reposts
9 likes
I wish this were available in English. Google Translate does a horrible job of translating it.
0 replies
0 reposts
0 likes
Reposted by Kim Zetter
As a reminder, this is *not* the first time the 14th Amendment has been used to disqualify a candidate from running for office. This has happened several times before, as @kevinmkruse.bsky.social helpfully detailed.
7 replies
92 reposts
273 likes
Teixeira was suspended from school 1 day and had to take a psych assessment. His stepfather, an Air Force master sergeant, told police he worried police report might hurt Teixeira’s chance of joining military. A year later Teixeira joined Mass. Air National Guard and got security clearance in 2020
0 replies
1 reposts
4 likes
Alleged Discord leaker Jack Teixeira got gov clearance despite history of violent threats. In 2018, classmates reported him to high school after talking repeatedly about guns and saying “I want to kill all Black people,” according to police report. Teachers also expressed concern about him to police
1 replies
3 reposts
12 likes
Meta Facebook Messenger is rolling out end-to-end encryption by default. "Private communication for several billion people just got a lot more secure. Messenger has begun the migration for two-party chats ...and E2EE group chat will soon be on the way"
0 replies
3 reposts
7 likes
Reposted by Kim Zetter
Feels like it's missing a crucial detail in that headline
2 replies
26 reposts
108 likes
Interesting. I wonder if that inspired the researchers to look for this.
0 replies
0 reposts
2 likes
"Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw"
0 replies
0 reposts
1 likes
"In many cases, LogoFAIL can be remotely executed in post-exploit situations using techniques that can’t be spotted by traditional endpoint security products. And because exploits run during the earliest stages of the boot process, they are able to bypass a host of defenses"
1 replies
0 reposts
1 likes
Holiday gift from @dangoodin.bsky.social: "Hundreds of Windows/Linux computers from virtually all..makers are vulnerable to a new attack that executes malicious firmware early in..boot-up..allows infections..nearly impossible to detect/remove...a constellation of 12 newly discovered vulns..in UEFI"
4 replies
19 reposts
25 likes
Reposted by Kim Zetter
NEW in Just Security: The Biden Administration Should Continue Rebuffing NSO Group’s Latest Lobbying Efforts. @knightcolumbia.org's Carrie DeCell, Nicole Mo, and Talya Nevins discuss how NSO is scrambling to avoid accountability in U.S. courts. www.justsecurity.org/90328/the-bi...
1 replies
4 reposts
5 likes
Reposted by Kim Zetter
Kaspersky has lifted the lid on StripedFly, an intriguing piece of malware that seems closely related to the Equation Group's STRAITBIZARRE implant. Custom Tor exfil module and also has a *ransomware* component. Good story by @kimzetter.bsky.social: www.zetter-zeroday.com/p/sophistica... #infosec
0 replies
1 reposts
7 likes
"the workers used various techniques to make it look like they were working in the US, including paying Americans to use their home Wi-Fi connections"
0 replies
0 reposts
0 likes
Court documents allege that North Korea dispatched thousands of skilled IT workers to live in China and Russia with the goal of getting hired by companies in the US and elsewhere as freelance remote employees. In some cases the workers also stole info from the companies that hired them
1 replies
0 reposts
0 likes
Thousands of IT workers contracting with US companies have for years secretly sent millions of dollars of their wages to North Korea for use in its ballistic missile program. They worked remotely with companies around the US and used false identities to get the jobs, according to the FBI
1 replies
2 reposts
9 likes
Wait. Was his FBI code name Genius or "Genius"? Punctuation matters
11 replies
16 reposts
215 likes