After a sprawling hacking campaign exposed the communications of an unknown number of Americans, U.S. cybersecurity officials are advising people to use encryption in their communications. To safeguard against the risks highlighted by the campaign, which originated in China, federal cybersecurity authorities released an extensive list of security recommendations for U.S. telecom companies — such as Verizon and AT&T — that were targeted. The advice includes one tip we can all put into practice with our phones: “Ensure that traffic is end-to-end encrypted to the maximum extent possible.” End-to-end encryption, also known as E2EE, means that messages are scrambled so that only the sender and recipient can see them. If anyone else intercepts the message, all they will see is garble that can't be unscrambled without the key. Law enforcement officials had until now resisted this type of encryption because it means the technology companies themselves won't be able to look at the messages, nor respond to law enforcement requests to turn the data over. Here's a look at various ways ordinary consumers can use end-to-end encryption: Officials said the hackers targeted the metadata of a large number of customers, including information on the dates, times and recipients of calls and texts. They also managed to see the content from texts from a much smaller number of victims. If you're an iPhone user, information in text messages that you send to someone else who also has an iPhone will be encrypted end-to-end. Just look for the blue text bubbles, which indicate that they are encrypted iMessages. The same goes for Android users sending texts through Google Messages. There will be a lock next to the timestamp on each message to indicate the encryption is on. But there's a weakness. When iPhone and Android users text each other, the messages are encrypted only using Rich Communication Services, an industry standard for instant messaging that replaces the older SMS and MMS standards. Apple has noted that RCS messages “aren’t end-to-end encrypted, which means they’re not protected from a third party reading them while they’re sent between devices.” Samsung, which sells Android smartphones, has also hinted at the issue in a footnote at the bottom of a press release last month on RCS, saying, “Encryption only available for Android to Android communication.” To avoid getting caught out when trading texts, experts recommend using encrypted messaging apps. Privacy advocates are big fans of Signal, which applies end-to-end encryption to all messages and voice calls. The independent nonprofit group behind the app promises never to sell, rent or lease customer data and has made its source code publicly available so that it can be audited by anyone to examine it “for security and correctness.” Signal's encryption protocol is so reputable that it has been integrated into rival WhatsApp, so users will enjoy the same level of security protection as Signal, which has a much smaller user base. End-to-end encryption is also the default mode for Facebook Messenger, which like WhatsApp is owned by Meta Platforms. Telegram is an app that can be used for one-on-one conversations, group chats and broadcast “channels" but contrary to popular perception, it doesn't turn on end-to-end encryption by default. Users have to switch on the option. And it doesn’t work with group chats. Cybersecurity experts have warned people against using Telegram for private communications and pointed out that only its opt-in ‘secret chat’ feature is encrypted from end-to-end. The app also has a reputation for being a haven for scammers and criminal activity, highlighted by founder and CEO Pavel Durov's arrest in France. Instead of using your phone to make calls through a wireless cellular network, you can make voice calls with Signal and WhatsApp. Both apps encrypt calls with the same technology that they use to encrypt messages. There are other options. If you have an iPhone you can use Facetime for calls, while Android owners can use the Google Fi service, which are both end-to-end encrypted. The only catch with all these options is that, as with using the chat services to send messages, the person on the other end will also have to have the app installed. WhatsApp and Signal users can customize their privacy preferences in the settings, including hiding an IP address during calls to prevent your general location from being guessed. Receive the latest in local entertainment news in your inbox weekly!
EL SEGUNDO, Calif. (AP) — J.K. Dobbins will miss at least the next four games after the Los Angeles Chargers placed the running back on injured reserve Saturday. The team also placed safety Alohi Gilman on injured reserve and signed safety Tony Jefferson to the active roster. Dobbins sprained the MCL in his left knee late in the first half of the Chargers’ 30-23 loss to the Baltimore Ravens on Monday. Dobbins is fourth in the AFC in rushing with 766 yards and averages 4.8 yards per carry, third highest among AFC running backs with at least 100 carries. He has been considered among the candidates for AP Comeback Player of the Year after suffering a torn Achilles tendon in last season’s opener. Gus Edwards will be counted on to be the lead back in Dobbins' absence. Edwards missed four games during the middle of the season because of an ankle injury and has 25 carries for 93 yards in three games since returning to the lineup. Story continues below video The Chargers are 7-4 and hold the sixth seed in the AFC going into Sunday's game at NFC South leader Atlanta (6-5). Los Angeles is at Kansas City (10-1) in a prime-time game on Dec. 8, hosts Tampa Bay (5-6) on Dec. 15 and Denver (7-5) on Dec. 19. Gilman suffered a hamstring injury in the loss to the Ravens. He has 47 tackles, which is fifth on the team, along with one sack. Los Angeles also elevated cornerback Dicaprio Bootle and linebacker Jeremiah Jean-Baptiste from the practice squad for Sunday’s game. AP NFL: https://apnews.com/hub/nflJ.K. Dobbins and Alohi Gilman are placed on injured reserve by Chargers
NoneBlack plastic kitchen utensil risks were overstated. But you should still toss them, group saysLudhiana: Gates outside colonies have often become a bone of contention between residents and the civic body. In the case of the two private colonies, civic officials claimed to have demolished the gates to facilitate public movement. On the other hand, free public movement is exactly what residents of colonies, who install the gates, want curtailed. Sometimes, they go to great lengths to prevent it. In a few areas, residents do not open the gates at any time of the day, stopping commuters from entering the premises on the grounds of safety. Most gates were closed in 2020 to prevent unnecessary movement during the Covid lockdown. However, they were not opened even when public movement was restored. According to civic officials, gates cannot be closed during the day as they are located on public roads and people’s movement cannot be restricted. However, members of residents’ welfare associations argue that they keep the gates closed for safety reasons. Gates of several residential colonies, including Model Town, Tagore Nagar, Kitchlu Nagar, Pakhowal Road, Haibowal, Rajguru Nagar and SBS Nagar etc have locked gates. A resident of Kitchlu Nagar, who wished to remain anonymous, said that he had to struggle to get a few gates opened in the area. However, he said that other residents pressurised him to discontinue his efforts. He claimed that authorities initially allowed the gates to be closed at night due to concerns about car theft but now, some residents keep them closed during the day to restrict movement. An MC official claimed that they have served notices to residents welfare associations against which they received complaints and action was taken in the past but they could not act due to political pressure. He added that another factor which deterred them from taking stern action is safety concerns of residents, who feel that having the gates closed at night would prevent thefts. He also said that very few RWAs have taken permission from the MC to install gates. What the rules say ? Punjab Municipal Corporation Act 1976 says that the MC can develop only those streets/roads that are declared “public streets” and nobody has the right to stop any person from using a public street at any point of time. According to a resolution passed by the MC general house in 2014, installation of gates could be allowed for security. However, the resolution made it clear that RWAs need to apply for permission after taking consent from all area residents. It added that the colony would designate three persons to sign an agreement with the MC, which would allow gates only in colonies recommended by the police department. The association of the area is to ensure that gates remain open from 5am to 11pm. When gates are closed from 11pm to 5am, gate keepers are supposed to be there to open the gates in emergency conditions. The house approved the resolution and specified that gates can be installed only on outer roads not in inner lanes. However, gates are commonly seen in internal lanes of the city.
NFL Power Rankings: Bills Remain Firm No. 2 Following Bye Week | Sporting NewsWASHINGTON — A ninth U.S. telecoms firm has been confirmed to have been hacked as part of a sprawling Chinese espionage campaign that gave officials in Beijing access to private texts and phone conversations of an unknown number of Americans, a top White House official said Friday. Biden administration officials said this month that at least eight telecommunications companies , as well as dozens of nations, had been affected by the Chinese hacking blitz known as Salt Typhoon. But Anne Neuberger, the deputy national security adviser for cyber and emerging technologies, told reporters Friday that a ninth victim had been identified after the administration released guidance to companies about how to hunt for Chinese culprits in their networks. The update from Neuberger is the latest development in a massive hacking operation that has alarmed national security officials, exposed cybersecurity vulnerabilities in the private sector and laid bare China's hacking sophistication. The hackers compromised the networks of telecommunications companies to obtain customer call records and gain access to the private communications of “a limited number of individuals." Though the FBI has not publicly identified any of the victims, officials believe senior U.S. government officials and prominent political figures are among those whose whose communications were accessed. Neuberger said officials did not yet have a precise sense how many Americans overall were affected by Salt Typhoon, in part because the Chinese were careful about their techniques, but a “large number" were in the Washington-Virginia area. Officials believe the goal of the hackers was to identify who owned the phones and, if they were “government targets of interest,” spy on their texts and phone calls, she said. The FBI said most of the people targeted by the hackers are "primarily involved in government or political activity.” Neuberger said the episode highlighted the need for required cybersecurity practices in the telecommunications industry, something the Federal Communications Commission is to take up at a meeting next month. “We know that voluntary cyber security practices are inadequate to protect against China, Russia and Iran hacking of our critical infrastructure,” she said. The Chinese government has denied responsibility for the hacking.
ECOVIEWS: What should be the penalty for killing native wildlife?
None
Nutanix Reports First Quarter Fiscal 2025 Financial ResultsIsrael and Lebanon's Hezbollah agree to a ceasefire to end nearly 14 months of fighting
2 small cap ASX stocks with big price targets( MENAFN - EIN Presswire) TDR technology Solutions Swatting the Weapon of Choice for Terrorizing Students and Politicians. MONROE, NY, UNITED STATES, November 30, 2024 /EINPresswire / -- Swatting -a malicious tactic involving false emergency calls to provoke armed law enforcement responses-has become the weapon of choice for terrorizing students and Political figures. Once considered a fringe activity, swatting has evolved into a widespread and dangerous trend, disrupting schools, intimidating public officials, and costing taxpayers a staggering $500 million annually. TDR Technology Solutions, a leader in threat-prevention technology headquartered in Monroe, NY, is calling attention to this escalating crisis and offering advanced solutions to prevent these incidents. “Swatting is no longer just a reckless prank; it's a deliberate act of intimidation targeting our most vulnerable-students-and those at the forefront of public discourse,” said Don Beeler, CEO of TDR Technology Solutions.“These attacks are not only terrorizing communities but are also crippling emergency response systems and draining public resources.” The Alarming Rise of Swatting Swatting incidents have surged across the United States, affecting schools and political figures at an unprecedented rate: .Impact on Schools: Over 2,000 schools experienced swatting incidents in September 2024 alone, leaving students traumatized and disrupting education nationwide. .Political Weaponization: High-profile individuals, including politicians and activists, are increasingly targeted, turning swatting into a tool for political intimidation. .Taxpayer Burden: The annual cost of swatting to taxpayers has soared to $500 million, driven by school disruptions, lost instructional time, and mental health impacts-excluding the costs incurred by emergency response and first responders. “Every fake threat diverts resources away from genuine emergencies, putting entire communities at risk,” added Beeler.“The toll on mental health, especially for students, is immeasurable. These children should feel safe in their schools, not terrified by hoaxes designed to cause chaos.” TDR Technology Solutions: A Technology-Driven Solution TDR Technology Solutions has developed cutting-edge tools to combat the swatting epidemic: .SAM Voice: Prevents fraudulent calls from reaching 911 centers and schools, ensuring real emergencies are prioritized. .SAM AirDrop: Tracks and identifies anonymous AirDrop senders used to spread hoaxes in schools. .SAM Email Swatting Protection: Blocks fake email-based threats before they disrupt communities. These tools are already helping municipalities and schools nationwide prevent swatting, saving millions in taxpayer dollars and protecting lives. For a detailed analysis of the financial and societal impacts, see the report: The Real Cost of Swatting . This looks at the cost impact to schools. Call to Action TDR Technology Solutions urges schools, law enforcement, and policymakers to adopt advanced technologies to counteract swatting.“As swatting becomes the weapon of choice for terrorizing students and public figures, the time for action is now,” said Beeler.“We must invest in proven solutions to safeguard our communities from this escalating threat.” For More Information Visit TDR Technology Solutions or contact: Media Contact: Don Beeler CEO 845-293-3588 ... About TDR Technology Solutions Based in Monroe, NY, TDR Technology Solutions is the global leader in threat-prevention technology. The company's state-of-the-art solutions protect schools, emergency response centers, and communities from swatting fake threats and hoaxes. With a mission to enhance public safety, reduce disruptions, and save taxpayer dollars, TDR Technology Solutions is trusted by institutions nationwide. Don Beeler TDR Technology Solutions +1 845-293-3588 email us here Legal Disclaimer: EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above. MENAFN30112024003118003196ID1108941469 Legal Disclaimer: MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.