{"id":15584,"date":"2019-06-15T10:45:26","date_gmt":"2019-06-15T18:45:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/06\/15\/news-9333\/"},"modified":"2019-06-15T10:45:26","modified_gmt":"2019-06-15T18:45:26","slug":"news-9333","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/06\/15\/news-9333\/","title":{"rendered":"Security News This Week: Telegram Says China Is Behind DDoS"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d03f9f46874e023c3efb715\/master\/pass\/Security-HongKongProtests-AP_19164322233009.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 15 Jun 2019 13:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">It\u2019s mid June, <\/span>and according to tradition, the news cycle is supposed to be lethargic, cooling off in a hammock somewhere and taking it easy. Not so much this week.<\/p>\n<p>It started off well enough: On Sunday we explained how to actually, finally <a href=\"https:\/\/www.wired.com\/story\/stop-robocalls-slow-down-apps-tips-carriers-fcc\/\">stop all those robocalls<\/a>\u2014or at least slow them down.<\/p>\n<p class=\"paywall\">But then Monday hit, and the US <a href=\"https:\/\/www.wired.com\/story\/hackers-stole-traveler-photos-border-agency-database\/\">government confirmed<\/a> that hackers had stolen a border agency database full of traveler photos. The incident proves that as the government has rushed to embrace biometrics, it hasn\u2019t bothered to worry enough about securing that sensitive data.<\/p>\n<p class=\"paywall\">Things didn\u2019t slow down from there. Tuesday, a much more fun cache of data leaked online: 18 hours of previously unreleased music from Radiohead. And who leaked it? None other than Radiohead themselves, who did it to undercut someone trying to extort the band for $150,000 to keep the songs offline. Hail to the thief, indeed.<\/p>\n<p class=\"paywall\">Google continues to swear it is not trying to kill ad blockers, despite what ad blockers say, Lily Hay Newman <a href=\"https:\/\/www.wired.com\/story\/google-chrome-ad-blockers-extensions-api\/\">reported<\/a> Wednesday. And Symantec VP Darren Shou <a href=\"https:\/\/www.wired.com\/story\/the-next-big-privacy-hurdle-teaching-ai-to-forget\/\">explained<\/a> why the next big hurdle for AI is teaching it to forget.<\/p>\n<p class=\"paywall\">Thursday we brought you three big stories: we went inside <a href=\"https:\/\/www.wired.com\/story\/cloudflare-project-galileo-protect-nonprofits\/\">Cloudflare\u2019s five-year project<\/a> to protect nonprofits; reported that Google is actually trying to close the <a href=\"https:\/\/www.wired.com\/story\/google-encrypted-top-level-domains\/\">major loophole<\/a> in web encryption; and had the exclusive\u2014and insane!\u2014story of how Alphabet-owned <a href=\"https:\/\/www.wired.com\/story\/jigsaw-russia-disinformation-social-media-stalin-alphabet\/\">Jigsaw bought a disinformation campaign<\/a> in Russia for the low, low price of $250.<\/p>\n<p class=\"paywall\">Wanting to end the week on a terrifying note, Andy Greenberg reported on Friday that the dangerous hacking group known as Triton has been <a href=\"https:\/\/www.wired.com\/story\/triton-hackers-scan-us-power-grid\/\">probing the US power grid<\/a>. Oh, and then that Cellebrite, an Israeli data extraction company that contracts with the US government, <a href=\"https:\/\/www.wired.com\/story\/cellebrite-ufed-ios-12-iphone-hack-android\/\">says<\/a> it now has a tool that can unlock any iPhone.<\/p>\n<p class=\"paywall\">Of course, there was more. Every Saturday we round up the security and privacy stories we didn\u2019t break or report on in depth, but which we think you should know about nonetheless. Click on the headlines to read them, and stay safe out there.<\/p>\n<p class=\"paywall\">As protests erupted in the streets of Hong Kong this week, over a proposed law that would allow criminal suspects to be extradited to mainland China, the secure messaging app Telegram was hit with a massive DDoS attack. The company tweeted on Wednesday that it was under attack. Then the app\u2019s founder and CEO Pavel Durov <a href=\"https:\/\/twitter.com\/durov\/status\/1138942773430804480\" target=\"_blank\">followed up<\/a> and suggested the culprits were Chinese state actors. He tweeted that the IP addresses for the attackers were coming from China. \u201cHistorically, all state actor-sized DDoS (200-400 Gb\/s of junk) we experienced coincided in time with protests in Hong Kong (coordinated on <a href=\"https:\/\/twitter.com\/telegram\" target=\"_blank\">@telegram<\/a>). This case was not an exception,\u201d he added. As Reuters notes, Telegram was DDoSed during protests in China in 2015, as well. Hong Kong does not face the strict internet censorship that exists in mainland China, although activists have <a href=\"https:\/\/freedomhouse.org\/report\/freedom-world\/2019\/hong-kong\" target=\"_blank\">expressed concern<\/a> about increased pressure from Beijing on the region.<\/p>\n<p class=\"paywall\">After years of criticism that its voting machines contained flawed and insecure software, major voting machine supplier Election System and Software announced this week that it will stop selling machines that have no paper ballot\u2014as the primary machines in any given jurisdiction, at least. Voting security experts have <a href=\"https:\/\/www.wired.com\/story\/voting-machine-vulnerabilities-defcon-voting-village\/\">long warned about ES&amp;S\u2019s<\/a> machines in particular, and advised that paper ballots are always more secure because they provide an auditable backup. Ars Technica explains the move comes after 18 months of increased scrutiny from lawmakers and outside experts, and a wave of states embracing paper ballots ahead of the 2020 presidential election.<\/p>\n<p class=\"paywall\">It\u2019s the end of an era, folks. For six years, the website <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\">Have I Been Pwned<\/a> has helped internet denizens understand just that: Put in your email address and, voila, the site would tell you not only if your email was on any breached lists, but which ones and why. Want to know if you were affected in the great Target hack of 2013? Check Have I Been Pwned. Same for the Experian breach, and literally any since security researcher Troy Hunt first created the site in December 2013. But now Hunt is ready for the site \u201cto grow up.\u201d Writing in a blog post, Hunt said, \u201cIt\u2019s time to go from that one guy doing what he can in his available time to a better-resourced and better-funded structure that&#x27;s able to do way more than what I ever could on my own.\u201d Hunt needs to be careful, though. Since Have I Been Pwned itself is now a massive repository of sensitive information, people won\u2019t take kindly to it being sold to a corporate overlord who may not be as responsible a steward of their privacy as Hunt has been.<\/p>\n<p class=\"related-cne-video-component__dek\">Clint Emerson, retired Navy SEAL and crisis management professional, explains how we can prepare for almost any emergency situation by being ultra aware of our surroundings.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/telegram-says-china-behind-ddos\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d03f9f46874e023c3efb715\/master\/pass\/Security-HongKongProtests-AP_19164322233009.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 15 Jun 2019 13:00:00 +0000<\/strong><\/p>\n<p>Voting machine security gets a boost, Have I Been Pwned is for sale, and more of the week&#8217;s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-15584","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15584"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15584\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15584"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}