Value of Trump media stock hits all-time low as president faces Epstein and affordability fury
#AffordabilityFury #TMTGSharePrice #AllTimeLow #PersistentIssues #StockMarketLow
Infosec nerd | watching đ§ Surveillance Capitalism | reverse engineering enthusiast | former cricketer đ | physics educated | privacy advocacy
Value of Trump media stock hits all-time low as president faces Epstein and affordability fury
#AffordabilityFury #TMTGSharePrice #AllTimeLow #PersistentIssues #StockMarketLow
India is planning to enable direct satellite connectivity for mobile phones, potentially bringing ubiquitous internet to remote areas. The Department of Telecommunications will seek recommendations from TRAI on a framework for these direct-to-device (D2D) services, including pricing. This move aims to make phone connectivity as seamless as 4G/5G, though telcos have raised concerns about business impact.
LibreOffice 25.8.3 is now available! All users are recommended to update, to get the latest bugfixes and compatibility improvements: https://blog.documentfoundation.org/blog/2025/11/13/announcement-of-libreoffice-25-8-3/ #foss #openSource #freesoftware
Russia is temporarily cutting mobile Internet access for SIM cards that connected to foreign networks while roaming, hoping to disrupt Ukrainian drone operations. Hereâs how the system works and why it wonât be enough.
https://meduza.io/en/feature/2025/11/14/meduza-s-analysts-break-down-how-russia-s-temporary-sim-card-blocks-are-supposed-to-stop-drones-and-why-they-won-t
Trump has twisted this sleazy shame into a crisis that could doom America
#JeffreyEpsteinFiles #PowerAndImpunity #AccountabilityMatter #FoundersWarningsIgnored #RightwingMediaBias
https://www.rawstory.com/raw-investigates/jeffrey-epstein-2674292637/
The Cyber Police Department of Ukraine sent this email to me, @zackwhittaker, and some other cyber journalists.
Basically, it seems they are asking for help going after hackers expecting journalists to share information we would never share with law enforcement. Nope, this is not how it works.
As Paris commemorates ten years since the November 13 attacks that left 132 people dead, terrorism analyst Michael S Smith II says that 'there still remains a great deal that can be done by social media companies & internet companies to help blunt the influence capacities of groups like ISIS'.
Getting stuck in space sounds like the plotline from a science fiction filmâbut thatâs whatâs happened to three Chinese astronauts who were due to return to Earth last week. The Shenzhou-20 crew has been living on Chinaâs Tiangong space station since April. But damage to the spacecraft caused by junk floating in orbit has delayed their return.
TL;DR
Google is working to make it easier for âexperienced usersâ to install apps made by unverified developers.
The company is building a new âadvanced flowâ that allows these users to accept the risks of installing unverified apps.
Previously, the only permitted method for experienced users to install apps from unverified developers was to use ADB.
US President Donald Trump on Monday defended allowing foreign students to study in the United States, describing it as âgood for businessâ practice that supports the countryâs higher education system.
Speaking in an interview with Fox News host Laura Ingraham, Trump said cutting international student numbers would be âfinancially destructiveâ for American universities.
NEW: I tried to explain why there are so many victims of spyware, despite the fact that its makers have been telling us for years that the tech is only intended to be used in limited cases.
There are several reasons, including how the spyware systems are designed, how powerful and easy to use they are.
https://techcrunch.com/2025/11/10/why-a-lot-of-people-are-getting-hacked-with-government-spyware/
'Surveillance under Surveillance' ¡ A proj. mapping the ever-present cameras & guards that are watching you â almost everywhere.
đđť https://sunders.hamburg.ccc.de/
Journalists in Europe found it was "easy" to spy on top European Union officials using commercially obtained location data sold by data brokers, despite the continent having some of the strongest data protection laws in the world. https://techcrunch.com/2025/11/04/phone-location-data-of-top-eu-officials-for-sale-report-finds/?utm_source=dlvr.it&utm_medium=mastodon
I have been doing training to journalists since 2023 with @GIJN on digital investigations, and they just published a article on several investigations that used skills journalists learned in these sessions (it is so great to see the direct consequences of a training).
How Digital Threats Training Has Powered Innovative Cyber Investigations Around the World
https://gijn.org/stories/investigative-impact-gijn-digital-threats-training/
@tek the question is who was supporting them to stay in power. That will also give us answers about the source of Tech they are using to activate censorship. Unmasking #SurveillanceCapitalism is the ultimate form of theoretical digital rights advocacy. Practical form would be to develop anti-Censirship Technologies.
ClayRat: lo spyware che colpisce gli utenti Android con propagazione autonoma
La campagna spyware ClayRat si sta espandendo rapidamente e prende di mira sempre piĂš gli utenti Android. Secondo Zimperium, il malware si sta diffondendo attivamente tra gli utenti russi attraverso falsi siti web e canali Telegram, camuffandosi da app popolari come WhatsApp, TikTok, YouTube e Google Foto.
Una volta installato, il malware ottiene lâaccesso a unâampia gamma di funzioni, tra cui la lettura di SMS e notifiche, la visualizzazione dellâelenco delle app installate, lo scatto di foto con la fotocamera frontale, lâeffettuazione di chiamate e lâinvio di messaggi.
La caratteristica principale di ClayRat è il suo aggressivo meccanismo di autopropagazione. Il malware invia automaticamente link dannosi a tutti i contatti della vittima, trasformando il dispositivo infetto in un hub di distribuzione attivo. Ciò consente ai creatori della campagna di scalare rapidamente i loro attacchi senza lâintervento umano.
Negli ultimi 90 giorni, gli specialisti hanno identificato almeno 600 campioni di spyware unici e circa 50 downloader. Ogni nuova versione include ulteriori livelli di stealth, consentendo di aggirare i meccanismi di difesa.
La distribuzione inizia tramite siti web falsi che reindirizzano le vittime ai canali Telegram controllati dagli aggressori. Questi canali offrono file APK dannosi con presunte alte percentuali di download e recensioni positive. Di particolare rilievo è la falsa app âYouTube Plusâ con âfunzionalitĂ premiumâ, che può essere installata anche su dispositivi con Android 13 o versioni successive, nonostante le limitazioni integrate nella piattaforma.
Alcune versioni di ClayRat si mascherano da app legittime e agiscono esclusivamente come programmi di installazione. Sullo schermo viene visualizzata una finta finestra di aggiornamento di Google Play, mentre il codice dannoso crittografato è nascosto nelle risorse interne dellâapp. Questo approccio abbassa la guardia dellâutente e aumenta la probabilitĂ di unâinfezione riuscita. Una volta attivato, il malware richiede lâautorizzazione per essere impostato come app SMS predefinita, ottenendo pieno accesso a messaggi e notifiche.
ClayRat utilizza richieste HTTP standard per comunicare con lâinfrastruttura di controllo e può trasmettere informazioni dettagliate sul dispositivo. Le sue funzioni includono anche lâacquisizione di foto, lâinvio di un elenco delle applicazioni installate e la gestione delle chiamate. Il potenziale pericolo di questo malware non risiede solo nelle sue capacitĂ di spionaggio, ma anche nella sua capacitĂ di trasformare un dispositivo infetto in uno strumento di distribuzione automatizzata, il che ne complica notevolmente il contenimento.
Secondo Google, le versioni attive di ClayRat sono giĂ bloccate sui dispositivi che eseguono Google Play Services grazie a Play Protect. Tuttavia, gli aggressori continuano ad adattarsi e la minaccia rimane rilevante.
Nel frattempo, i ricercatori dellâUniversitĂ del Lussemburgo e dellâUniversitĂ Cheikh Anta Diop hanno esaminato le app preinstallate sugli smartphone Android economici venduti in Africa. Dei 1.544 file APK analizzati, 145 hanno esposto dati sensibili, 249 hanno fornito accesso non protetto a componenti critici e 226 hanno eseguito comandi con privilegi elevati. Ciò indica una vulnerabilitĂ di sistema su questi dispositivi e ulteriori rischi per gli utenti.
L'articolo ClayRat: lo spyware che colpisce gli utenti Android con propagazione autonoma proviene da Red Hot Cyber.
@tek Transparency report for the period 1 January 2025 to 30 September 2025
Fulfilled requests from India for IP address and/or phone number:
Q1 â 9197
Q2 â 9653
Q3 â 8867
Affected users:
Q1 â 9941
Q2 â 11041
Q3 â 9820
All requests are processed according to section 8.3 of the Privacy Policy
The next transparency report will be published in January 2026.
The German company that makes the mechanical ladder used in the Louvre heist has used the image to advertise, with the heading 'When you need to move fast'
"The BĂścker Agilo transports your treasures weighing up to 400kg at 42m/min - quiet as a whisper."
For HotTopics' CISO Insights series (and my debut as a freelancer for the publication) I examined the role of the CISO and where accountability lies in the aftermath of a data breach.
Of course, I spoke to some actual CISOs to get their opinions on the matter!
The TLDR is it's not simple: There's a big difference between a CISO being deemed to be negligent and a CISO doing everything they can to keep their organisation safe. And naturally, the availability of a budget plays a big part of it.