Man jailed for selling VPNs to evade China’s ‘Great Firewall’ SCM
Grizzly bears go vegetarian due to climate change, choosing berries over salmon Telegraph
Cybersecurity firm says Russian hacking group using new malware tool
The Washington Post
Russian journalists Andrei Soldatov and Irina Borogan first published “The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries” in 2015. In that book, the pair used investigative reporting and sharp analysis to show how the Kremlin was using the Internet to its advantage. Two years later, Russia's alleged use of covert online operations became a topic of discussion all around world. And so Soldatov and Borogan began investigating again. Now they have released a new version of their book that includes an additional chapter on the alleged Russian interference in the 2016 U.S. presidential election. The new chapter provides important context about Russian President's Vladimir Putin's possible motivations — as well as evidence of apparent links between WikiLeaks and the Kremlin, and details of the ongoing fallout in Russia.
A sloppy spamming operation has exposed on a server in the Netherlands gigabytes of files that include 711 million email addressees and some associated account passwords. It's perhaps the largest batch of email addresses ever found in one spot. It tops the 393 million email addresses exposed earlier this year by U.S-based email and SMS marketing company River City Media, says Troy Hunt, an Australia-based data breach expert. While a good chunk of the email addresses and accompanying credentials appear to have been taken from other well-known breaches, including LinkedIn, Badoo and the Exploit.in list, some of them, nevertheless, are valid, which puts some users at risk. Hunt says individuals often reuse authentication credentials despite repeated warnings about the risks that come from data breaches. "There will be valid data in it," he says of the exposed batch of files. "The individual who passed this on has verified that there are valid credentials." The data is still exposed on an IP address hosted in the Netherlands that is run by a Russian hosting company. The spam operators mistakenly left directory browsing open, which exposed the data. Dutch law enforcement has been notified, and efforts are being made to have it taken down.
On a warm Phoenix night five years ago, Aaron Cashatt walked down the red-carpeted hall of the second floor of a Marriott hotel, trying to move casually despite the adrenaline and methamphetamine surging through his bloodstream.