A Dallas, Texas man accused of prostituting underage girls was secretly ordered by a federal judge to unlock his iPhone using his fingerprint, according to federal court documents that are now unsealed.
WikiLeaks committed another blunder over the weekend when the organization published 19,252 emails stolen and donated by a Russian hacker that contained among other things the sensitive information of Democratic Party donors.
The data, which is still online at the time of writing, three days after WikiLeaks dumped the files, contains sensitive information such as full names, Social Security numbers, passport IDs, addresses, phone numbers, and more.
A fresh batch of leaked documents reportedly stolen from the computer networks of the Democratic National Committee (DNC) has been released online and include opposition research, political donor lists and internal memos.
The files were released by a hacker known as Guccifer 2.0, who has previously leaked sensitive information from the internal Democratic Party networks, including over 200 files relating to presumptive presidential nominee Hillary Clinton and a research dossier on her opponent, Donald Trump.
Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks — Tor — has prompted computer scientists to try to come up with more secure anonymity schemes.
LTE is a more advanced mobile network but not absolutely secure.
In this presentation, we will introduce a method which jointly exploits the vulnerabilities in tracking area update procedure, attach procedure, and RRC redirection procedure in LTE networks resulting in the ability to force a targeted LTE cellphone to downgrade into a malicious GSM network where an attacker can subsequently eavesdrop its voice calls and GPRS data.