{"id":15253,"date":"2019-05-04T10:45:14","date_gmt":"2019-05-04T18:45:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/05\/04\/news-9002\/"},"modified":"2019-05-04T10:45:14","modified_gmt":"2019-05-04T18:45:14","slug":"news-9002","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/04\/news-9002\/","title":{"rendered":"Putin Will Put Russia Behind an Internet Curtain"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cccbc882948ca2e63b090c4\/master\/pass\/Putin-1139687798.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 04 May 2019 13:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">The week began <\/span>with dragon\u2019s breath. After a major breach in its firewall, a scrappy security team in the north engaged in an epic battle to rid its system of an infected payload that kept growing bigger and bigger, spewing frozen ice flames across all critical infrastructure. Yes, I\u2019m talking about <a href=\"https:\/\/www.wired.com\/story\/watch-game-of-thrones-online-hbo-now-west-coast\/\"><em>Game of Thrones<\/em><\/a>, folks, and yes, we asked an officer in the Army National Guard to do a <a href=\"https:\/\/www.wired.com\/story\/game-of-thrones-winterfell-battle-tactical-analysis\/\">tactical analysis of the battle of Winterfell<\/a>, and yes, it\u2019s wonderful and you should read it.<\/p>\n<p>In the real world, a mysterious hacker groups is on a <a href=\"https:\/\/www.wired.com\/story\/barium-supply-chain-hackers\/\">supply chain hijacking spree<\/a>. Though hacktivism is on the rise, the days of Anonymous-like groups making a real difference <a href=\"https:\/\/www.wired.com\/story\/hacktivism-sudan-ddos-protest\/\">are over<\/a>. The US Air Force has decided to <a href=\"https:\/\/www.wired.com\/story\/air-force-heather-wilson-carnegie-mellon\/\">embed airmen at Carnegie Mellon University<\/a> as part of its new Science and Technology Strategy. And security researchers all agree that <a href=\"https:\/\/www.wired.com\/story\/right-to-repair-security-experts-california\/\">Right to Repair is as much a security issue<\/a> as a matter of personal freedom.<\/p>\n<p class=\"paywall\">The week ended with president Donald Trump on the phone with Russian president Vladimir Putin, and according to Trump the two friends discussed a lot, <a href=\"https:\/\/www.wired.com\/story\/mueller-report-russia-redacted-trump-barr-read\/\">including the Mueller Report<\/a>, which they both agreed contained no evidence of collusion. Mueller expert Garrett Graff reminded the world this week that even if the Mueller probe is over, Trump and his team are still being <a href=\"https:\/\/www.wired.com\/story\/trumps-world-faces-16-known-criminal-probes\/\">actively investigated in at least 16 different criminal<\/a> probes.<\/p>\n<p class=\"paywall\">Of course, that\u2019s not all. Each week we round up the news that we didn\u2019t break or cover in depth, but that you should know about. As always, click on the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">Speaking of Putin, the Russian president did more this week than just gab with Trump. He also signed a controversial law that will allow Russia\u2019s internet censor and regulator to much more easily block websites and content that violate Russia\u2019s strict internet rules, and will enable Russia to fully disconnect its internet service from the rest of the world. Putin signed the so-called \u201cRunet\u201d law on Wednesday, requiring Russia to build its own Domain Name System, separate from the rest of the world\u2019s. Russia says it wants to protect its internet in the event that a hostile foreign agent attempts tot ake it down. But security experts say that\u2019s never happened to any nation state, and that the much more likely reason is for Russia in order to exert more control. Currently, websites and services like <a href=\"https:\/\/www.wired.com\/story\/zello-channel-venezuela-maduro\/\">Telegram and Zello<\/a> are able to continue operating in the country despite being banned, by using a few different elusive methods, like ISP hopping and VPNs outside the country. Once all traffic is gated within the country, those techniques will likely no longer work.<\/p>\n<p class=\"paywall\">Motherboard reports that hackers breached Citycomp, a German internet infrastructure provider for some of the world\u2019s biggest corporations, stealing financial data and then attempting to extort the companies to get it back. Airbus, Oracle, and Volkswagen are a just few of the companies who rely on Citcomp for things like servers and storage, and whose data was allegedly stolen. Motherboard reports that the hackers also set up a public website on which it published some of the data, apparently as proof of the theft. The hackers claim to have more than 512GB of private and financial information for Citycomp\u2019s clients. Citycomp publicly acknowledged that it had been hacked and was being blackmailed, and announced it was working with authorities to resolve the situation.<\/p>\n<p class=\"paywall\">We\u2019ve told you, <a href=\"https:\/\/www.wired.com\/story\/secure-elections-budget-congress\/\">over<\/a> and <a href=\"https:\/\/www.wired.com\/story\/time-about-up-to-secure-2018-midterm-elections\/\">over<\/a> and <a href=\"https:\/\/www.wired.com\/story\/midterm-elections-vulnerabilities-phishing-ddos\/\">over<\/a>, about how vulnerable the nation\u2019s voting infrastructure is. Machines are old, unprotected, and just plain broken. Despite voting machines being <a href=\"https:\/\/www.wired.com\/2016\/09\/elections-loom-officials-debate-protect-voting-hackers\/\">officially listed<\/a> as a <a href=\"https:\/\/www.wired.com\/story\/voting-village-hacking-report\/\">critical infrastructure<\/a> by the Department of Homeland Security, voting systems across the US are still insecure and often lack paper backups to make enable auditing votes when this go awry. So LA County, which has 5.2 million registered voters, took matters into its own hands, developing its own voting machines and and a whole new voting process in time for the 2020 presidential primary next year. Voter security experts laud the design, which was the result of open-source collaboration and cost $100 million. The new machines combine a paper ballot with a screen interface, automatically creating a paper backup and allowing voters to fill out the entire ballot by hand if they prefer. In addition to the new machines, the county is redefining voting day, spreading it over 11 days rather than a single one, which officials hope will allow them to get more votes cast on fewer machines than if everyone were voting on one day.<\/p>\n<p class=\"related-cne-video-component__dek\">Hacker and security researcher Samy Kamkar takes a look at a variety of hacking scenes from popular media and examines their authenticity.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/putin-russia-internet-law-security-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cccbc882948ca2e63b090c4\/master\/pass\/Putin-1139687798.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 04 May 2019 13:00:00 +0000<\/strong><\/p>\n<p>Hacking big companies, building a better voting machine, and more security news this week.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-15253","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15253"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15253\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15253"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}