Gangnam Industrial Style APT campaign targets South Korea.
Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies
Section 52, CyberXโs threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.
๐๐ผ The research can be found here:
https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/
#apt #korea #CyberX #Section52 #cyberwire #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Section 52, CyberXโs threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.
๐๐ผ The research can be found here:
https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/
#apt #korea #CyberX #Section52 #cyberwire #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Generate WireGuard profile from Cloudflare Warp account
wgcf is a utility for Cloudflare Warp that allows you to create and manage accounts, assign license keys, and generate WireGuard profiles.
๐ก Features:
๐๐ผ Register new Cloudflare Warp device and account
๐๐ผ Update account to allow connection via WireGuard
๐๐ผ Update account with new license key, sharing Warp+ status with up to 5 devices
๐๐ผ Generate WireGuard profile
๐๐ผ Check Cloudflare device status
๐๐ผ Print trace information to debug Warp/Warp+ status
๐ป Download:
You can find pre-compiled binaries on the releases page.
https://github.com/ViRb3/wgcf/releases
๐๐ผ Read more:
https://github.com/ViRb3/wgcf
๐ Try with:
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ )
https://t.me/BlackBox_Archiv/919
#cloudflare #warp #FuckCloudflare #script
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
wgcf is a utility for Cloudflare Warp that allows you to create and manage accounts, assign license keys, and generate WireGuard profiles.
๐ก Features:
๐๐ผ Register new Cloudflare Warp device and account
๐๐ผ Update account to allow connection via WireGuard
๐๐ผ Update account with new license key, sharing Warp+ status with up to 5 devices
๐๐ผ Generate WireGuard profile
๐๐ผ Check Cloudflare device status
๐๐ผ Print trace information to debug Warp/Warp+ status
๐ป Download:
You can find pre-compiled binaries on the releases page.
https://github.com/ViRb3/wgcf/releases
๐๐ผ Read more:
https://github.com/ViRb3/wgcf
๐ Try with:
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ )
https://t.me/BlackBox_Archiv/919
#cloudflare #warp #FuckCloudflare #script
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
GitHub
Releases ยท ViRb3/wgcf
๐ค Cross-platform, unofficial CLI for Cloudflare Warp - ViRb3/wgcf
โ ๏ธ Important message from @BlackBox_Archiv โ ๏ธ
โผ๏ธ Any contribution in this channel(s) is for educational purposes only
All actions and/or activities in connection with the material contained in this channel are your sole responsibility. Use of the information in this channel may result in criminal charges against the persons concerned.
The authors and @BlackBox_Archiv are not liable in the event that criminal charges are brought against persons who misuse the information in this telegram channel to violate applicable law.
โ ๏ธ Always remember to use these techniques, instructions or hardware only with devices whose owners or users permitted it. The unauthorized access to foreign infrastructure is punishable by law.
#EducationalPurposes #BlackBox
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ก@FLOSSb0xIN
โผ๏ธ Any contribution in this channel(s) is for educational purposes only
All actions and/or activities in connection with the material contained in this channel are your sole responsibility. Use of the information in this channel may result in criminal charges against the persons concerned.
The authors and @BlackBox_Archiv are not liable in the event that criminal charges are brought against persons who misuse the information in this telegram channel to violate applicable law.
โ ๏ธ Always remember to use these techniques, instructions or hardware only with devices whose owners or users permitted it. The unauthorized access to foreign infrastructure is punishable by law.
#EducationalPurposes #BlackBox
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ก@FLOSSb0xIN
Bellingcat's free online open source research toolkit
Version 5.1 (March 09, 2020)
The list includes satellite and map services, photo and video review tools, web archiving sites, and more.
Content (All links lead to GoogleDocs):
๐ก Maps, Satellites & Streetview
๐ก Location Based Searches
๐ก Image & Video Verification
๐ก Social Media
๐ก Transportation
๐ก Date & Time
๐ก WhoIs, IPs & Website Analysis
๐ก People & Phone Numbers
๐ก Archiving & Downloading
๐ก Company Registries
๐ก Data Visualization
๐ก Online Security & Privacy
๐ก Finding Experts
๐ก Miscellaneous
๐ก Guides & Handbooks
https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/mobilebasic#h.6igzqqftqvh4
#Bellingcat #toolkit #research #collection
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Version 5.1 (March 09, 2020)
The list includes satellite and map services, photo and video review tools, web archiving sites, and more.
Content (All links lead to GoogleDocs):
๐ก Maps, Satellites & Streetview
๐ก Location Based Searches
๐ก Image & Video Verification
๐ก Social Media
๐ก Transportation
๐ก Date & Time
๐ก WhoIs, IPs & Website Analysis
๐ก People & Phone Numbers
๐ก Archiving & Downloading
๐ก Company Registries
๐ก Data Visualization
๐ก Online Security & Privacy
๐ก Finding Experts
๐ก Miscellaneous
๐ก Guides & Handbooks
https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/mobilebasic#h.6igzqqftqvh4
#Bellingcat #toolkit #research #collection
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Now More Than Ever, Facebook Is a โMark Zuckerberg Productionโ
For years, he was an obsessive C.E.O. in some ways, distant in others. Then Facebookโs problems became too acute to leave to anyone else.
SAN FRANCISCO โ On Jan. 27, at a regularly scheduled Monday morning meeting with top executives at Facebook, Mark Zuckerberg turned the agenda to the coronavirus. For weeks, he told his staff, he had been hearing from global health care experts that the virus had the makings of a pandemic, and now Facebook needed to prepare for a worst-case scenario โ one in which the companyโs ability to combat misinformation, scammers and conspiracy theorists would be tested as never before.
To start, Mr. Zuckerberg said, the company should take some of the tools it had developed to fight 2020 election garbage and attempt to retool them for the pathogen. He asked executives in charge of every department to develop plans for responding to a global outbreak by the end of the week.
The meeting, described by two people who attended it, helped vault Facebook ahead of other companies โ and even some governments โ in preparing for Covid-19. And it exemplified a change in how the 36-year-old is running the company he founded.
Since the day he coded the words โa Mark Zuckerberg productionโ onto every blue-and-white Facebook page, he has been the singular face of the social network. But to an extent not widely appreciated outside Silicon Valley, Mr. Zuckerberg has long been a kind of binary chief executive โ extraordinarily involved in some aspects of the business, and virtually hands-off in areas that he finds less interesting.
๐๐ผ Read more:
https://www.nytimes.com/2020/05/16/technology/zuckerberg-facebook-coronavirus.html
#DeleteFacebook
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
For years, he was an obsessive C.E.O. in some ways, distant in others. Then Facebookโs problems became too acute to leave to anyone else.
SAN FRANCISCO โ On Jan. 27, at a regularly scheduled Monday morning meeting with top executives at Facebook, Mark Zuckerberg turned the agenda to the coronavirus. For weeks, he told his staff, he had been hearing from global health care experts that the virus had the makings of a pandemic, and now Facebook needed to prepare for a worst-case scenario โ one in which the companyโs ability to combat misinformation, scammers and conspiracy theorists would be tested as never before.
To start, Mr. Zuckerberg said, the company should take some of the tools it had developed to fight 2020 election garbage and attempt to retool them for the pathogen. He asked executives in charge of every department to develop plans for responding to a global outbreak by the end of the week.
The meeting, described by two people who attended it, helped vault Facebook ahead of other companies โ and even some governments โ in preparing for Covid-19. And it exemplified a change in how the 36-year-old is running the company he founded.
Since the day he coded the words โa Mark Zuckerberg productionโ onto every blue-and-white Facebook page, he has been the singular face of the social network. But to an extent not widely appreciated outside Silicon Valley, Mr. Zuckerberg has long been a kind of binary chief executive โ extraordinarily involved in some aspects of the business, and virtually hands-off in areas that he finds less interesting.
๐๐ผ Read more:
https://www.nytimes.com/2020/05/16/technology/zuckerberg-facebook-coronavirus.html
#DeleteFacebook
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
NY Times
Now More Than Ever, Facebook Is a โMark Zuckerberg Productionโ
For years, he was an obsessive C.E.O. in some ways, distant in others. Then Facebookโs problems became too acute to leave to anyone else.
Tell your House Representative to vote against letting the FBI access internet history without a warrant
The Patriot Act is up for renewal with the USA FREEDOM Reauthorization Act and this bill as-is allows the Federal Bureau of Investigation (FBI) and Department of Justice (DOJ) to access your internet history without a warrant. Under this new law, all the DOJ has to do is claim that an American citizen is tangentially related to an ongoing investigation and theyโd be able to access your internet history that is stored with your internet service provider (ISP) โ this gross privacy violating power must be stopped. The bill is currently in the House of Representatives and could be voted on as soon as next week.
The USA FREEDOM Reauthorization Act of 2020 passed the Senate on 5/14/2020 with a reprehensible amendment attached which was introduced by Senate Majority Leader Mitch McConnell. The McConnell amendment snuck in an expansion to the Patriot Act that would allow the FBI to access Americansโ internet history without a warrant. Another amendment by Wyden-Daines sought to remove the ability of the FBI/DOJ to access internet history without a warrant but said amendment failed by one vote. These are the 37 Senators that voted against that amendment and therefore voted to allow the FBI to access your internet history without a warrant.
๐๐ผ Read more:
https://www.privateinternetaccess.com/blog/tell-your-house-representative-to-vote-against-letting-the-fbi-access-internet-history-without-a-warrant/
#USA #Congress #patriotact #DOJ #phone #metadata #surveillance #privacy #why #thinkabout #vote
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
The Patriot Act is up for renewal with the USA FREEDOM Reauthorization Act and this bill as-is allows the Federal Bureau of Investigation (FBI) and Department of Justice (DOJ) to access your internet history without a warrant. Under this new law, all the DOJ has to do is claim that an American citizen is tangentially related to an ongoing investigation and theyโd be able to access your internet history that is stored with your internet service provider (ISP) โ this gross privacy violating power must be stopped. The bill is currently in the House of Representatives and could be voted on as soon as next week.
The USA FREEDOM Reauthorization Act of 2020 passed the Senate on 5/14/2020 with a reprehensible amendment attached which was introduced by Senate Majority Leader Mitch McConnell. The McConnell amendment snuck in an expansion to the Patriot Act that would allow the FBI to access Americansโ internet history without a warrant. Another amendment by Wyden-Daines sought to remove the ability of the FBI/DOJ to access internet history without a warrant but said amendment failed by one vote. These are the 37 Senators that voted against that amendment and therefore voted to allow the FBI to access your internet history without a warrant.
๐๐ผ Read more:
https://www.privateinternetaccess.com/blog/tell-your-house-representative-to-vote-against-letting-the-fbi-access-internet-history-without-a-warrant/
#USA #Congress #patriotact #DOJ #phone #metadata #surveillance #privacy #why #thinkabout #vote
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Private Internet Access Blog
Tell your House Representative to vote against letting the FBI access internet history without a warrant
The Patriot Act is up for renewal with the USA FREEDOM Reauthorization Act and this bill as-is allows the Federal Bureau of Investigation (FBI) and Department of Justice (DOJ) to access your internet history without a warrant. Under this new law, all theโฆ
This Service Helps Malware Authors Fix Flaws in their Code
Almost daily now there is news about flaws in commercial software that lead to computers getting hacked and seeded with malware. But the reality is most malicious software also has its share of security holes that open the door for security researchers or neโer-do-wells to liberate or else seize control over already-hacked systems. Hereโs a look at one long-lived malware vulnerability testing service that is used and run by some of the Dark Webโs top cybercriminals.
It is not uncommon for crooks who sell malware-as-a-service offerings such as trojan horse programs and botnet control panels to include backdoors in their products that let them surreptitiously monitor the operations of their customers and siphon data stolen from victims. More commonly, however, the people writing malware simply make coding mistakes that render their creations vulnerable to compromise.
At the same time, security companies are constantly scouring malware code for vulnerabilities that might allow them peer to inside the operations of crime networks, or to wrest control over those operations from the bad guys. There arenโt a lot of public examples of this anti-malware activity, in part because it wades into legally murky waters. More importantly, talking publicly about these flaws tends to be the fastest way to get malware authors to fix any vulnerabilities in their code.
๐๐ผ Read more:
https://krebsonsecurity.com/2020/05/this-service-helps-malware-authors-fix-flaws-in-their-code/
#malware #hacked #hacker #flaws #code
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Almost daily now there is news about flaws in commercial software that lead to computers getting hacked and seeded with malware. But the reality is most malicious software also has its share of security holes that open the door for security researchers or neโer-do-wells to liberate or else seize control over already-hacked systems. Hereโs a look at one long-lived malware vulnerability testing service that is used and run by some of the Dark Webโs top cybercriminals.
It is not uncommon for crooks who sell malware-as-a-service offerings such as trojan horse programs and botnet control panels to include backdoors in their products that let them surreptitiously monitor the operations of their customers and siphon data stolen from victims. More commonly, however, the people writing malware simply make coding mistakes that render their creations vulnerable to compromise.
At the same time, security companies are constantly scouring malware code for vulnerabilities that might allow them peer to inside the operations of crime networks, or to wrest control over those operations from the bad guys. There arenโt a lot of public examples of this anti-malware activity, in part because it wades into legally murky waters. More importantly, talking publicly about these flaws tends to be the fastest way to get malware authors to fix any vulnerabilities in their code.
๐๐ผ Read more:
https://krebsonsecurity.com/2020/05/this-service-helps-malware-authors-fix-flaws-in-their-code/
#malware #hacked #hacker #flaws #code
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Krebs on Security
This Service Helps Malware Authors Fix Flaws in their Code
Almost daily now there is news about flaws in commercial software that lead to computers getting hacked and seeded with malware. But the reality is most malicious software also has its share of security holes that open the door forโฆ
Media is too big
VIEW IN TELEGRAM
Exposed: CIA used Sheldon Adelson's firm to spy on Julian Assange
In his latest Grayzone exposรฉ, Max Blumenthal reveals new details on the CIA spying and sabotage operation against Wikileaks founder Julian Assange. The US surveilled Assange inside Ecuador's London embassy, all while working with Trump mega-donor and casino magnate Sheldon Adelson's security team and a Spanish company that had initially been hired to protect the embassy.
Drawing on court testimony and internal documents, Blumenthal reports on how the CIA sabotaged an asylum plan for Assange; installed software that allowed it to directly monitor him; and harassed and monitored Assange's attorneys, friends, family, and journalist colleagues.
https://invidio.us/watch?v=I73VcDRGnk0
#Assange #FreeAssange #USA #CIA #spy #video #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xI
In his latest Grayzone exposรฉ, Max Blumenthal reveals new details on the CIA spying and sabotage operation against Wikileaks founder Julian Assange. The US surveilled Assange inside Ecuador's London embassy, all while working with Trump mega-donor and casino magnate Sheldon Adelson's security team and a Spanish company that had initially been hired to protect the embassy.
Drawing on court testimony and internal documents, Blumenthal reports on how the CIA sabotaged an asylum plan for Assange; installed software that allowed it to directly monitor him; and harassed and monitored Assange's attorneys, friends, family, and journalist colleagues.
https://invidio.us/watch?v=I73VcDRGnk0
#Assange #FreeAssange #USA #CIA #spy #video #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xI
FBI finds al Qaeda link after breaking encryption on Pensacola attacker's iPhone
Washington (CNN)The Saudi military trainee who killed three US sailors and wounded several others in a terror attack last year on a military base in Pensacola, Florida, was in touch with a suspected al Qaeda operative, according to multiple US officials briefed on the matter.
US investigators uncovered the al Qaeda connection after the FBI broke through the encryption protecting the Saudi attacker's iPhones, the officials said. Attorney General William Barr and the FBI are expected to announce the finding Monday in a news conference.
Mohammed Alshamrani, a member of the Royal Saudi Air Force who had been training at Naval Air Station Pensacola, was killed by law enforcement during the attack.
A breakthrough on the shooter's phone encryption for now temporarily disarms a standoff between the Justice Department and Apple over national security and the limits of encryption and privacy. The government has complained in recent years that stronger encryption, without the ability of law enforcement to get court-ordered access to data, endangers the public.
If Alshamrani was directed or trained by al Qaeda, it would mark the first time since 9/11 that a foreign terrorist organization had done so in a deadly attack in the US, according to New America, a think tank.
The Justice Department has previously called the attack an act of terrorism that was motivated by "jihadist ideology." Alshamrani had made anti-American, anti-Israel and jihadi posts on social media, including one on the September 11 anniversary, that stated "the countdown has begun," and another two hours before the attack that referenced the words of an al Qaeda cleric.
๐๐ผ Read more:
https://edition.cnn.com/2020/05/18/politics/pensacola-shooting-al-qaeda/index.html
#usa #fbi #iphone #apple #pensacola #shooting #qaeda
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Washington (CNN)The Saudi military trainee who killed three US sailors and wounded several others in a terror attack last year on a military base in Pensacola, Florida, was in touch with a suspected al Qaeda operative, according to multiple US officials briefed on the matter.
US investigators uncovered the al Qaeda connection after the FBI broke through the encryption protecting the Saudi attacker's iPhones, the officials said. Attorney General William Barr and the FBI are expected to announce the finding Monday in a news conference.
Mohammed Alshamrani, a member of the Royal Saudi Air Force who had been training at Naval Air Station Pensacola, was killed by law enforcement during the attack.
A breakthrough on the shooter's phone encryption for now temporarily disarms a standoff between the Justice Department and Apple over national security and the limits of encryption and privacy. The government has complained in recent years that stronger encryption, without the ability of law enforcement to get court-ordered access to data, endangers the public.
If Alshamrani was directed or trained by al Qaeda, it would mark the first time since 9/11 that a foreign terrorist organization had done so in a deadly attack in the US, according to New America, a think tank.
The Justice Department has previously called the attack an act of terrorism that was motivated by "jihadist ideology." Alshamrani had made anti-American, anti-Israel and jihadi posts on social media, including one on the September 11 anniversary, that stated "the countdown has begun," and another two hours before the attack that referenced the words of an al Qaeda cleric.
๐๐ผ Read more:
https://edition.cnn.com/2020/05/18/politics/pensacola-shooting-al-qaeda/index.html
#usa #fbi #iphone #apple #pensacola #shooting #qaeda
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
CNN
FBI finds al Qaeda link after breaking encryption on Pensacola attacker's iPhone | CNN Politics
The Saudi military trainee who killed three US sailors and wounded several others in a terror attack last year on a military base in Pensacola, Florida, was a longtime associate of al Qaeda who had communicated with operatives from the group as recently asโฆ
Now Google wants you to control devices with your hoodie
Everything can be smarter, and fashion is no exception.
In the quest to make computers ever-more pervasive, and invisible, Google's AI research team has now unveiled a new way to weave technology directly into our garments. The so-called "e-textile" concept could let users control electronic devices through a flick or a twist of their hoodie strings.
The team's work focused on cords, specifically because strings are a popular fashion staple but also constitute an intuitive way to control consumer devices. The smart cord developed by the researchers can recognize six types of operation: twisting, flicking, sliding, pinching, grabbing and patting. There is a bonus: because users can perform some of these gestures, such as flicking, at different speeds and in different directions, there is actually an even greater variety of actions that the technology can respond to.
๐๐ผ Enabling E-Textile Microinteractions: Gestures and Light through Helical Structures:
https://ai.googleblog.com/2020/05/enabling-e-textile-microinteractions.html
๐๐ผ Read more:
https://www.zdnet.com/article/now-google-wants-you-to-control-devices-with-your-hoodie/
#google #DeleteGoogle #smart #devices #fashion #hoodie #etextile #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Everything can be smarter, and fashion is no exception.
In the quest to make computers ever-more pervasive, and invisible, Google's AI research team has now unveiled a new way to weave technology directly into our garments. The so-called "e-textile" concept could let users control electronic devices through a flick or a twist of their hoodie strings.
The team's work focused on cords, specifically because strings are a popular fashion staple but also constitute an intuitive way to control consumer devices. The smart cord developed by the researchers can recognize six types of operation: twisting, flicking, sliding, pinching, grabbing and patting. There is a bonus: because users can perform some of these gestures, such as flicking, at different speeds and in different directions, there is actually an even greater variety of actions that the technology can respond to.
๐๐ผ Enabling E-Textile Microinteractions: Gestures and Light through Helical Structures:
https://ai.googleblog.com/2020/05/enabling-e-textile-microinteractions.html
๐๐ผ Read more:
https://www.zdnet.com/article/now-google-wants-you-to-control-devices-with-your-hoodie/
#google #DeleteGoogle #smart #devices #fashion #hoodie #etextile #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
blog.research.google
Enabling E-Textile Microinteractions: Gestures and Light through Helical Structures
Ukraine Nabs Suspect in 773M Password โMegabreachโ
In January 2019, dozens of media outlets raised the alarm about a new โmegabreachโ involving the release of some 773 million stolen usernames and passwords that was breathlessly labeled โthe largest collection of stolen data in history.โ A subsequent review by KrebsOnSecurity quickly determined the data was years old and merely a compilation of credentials pilfered from mostly public data breaches. Earlier today, authorities in Ukraine said theyโd apprehended a suspect in the case.
The Security Service of Ukraine (SBU) on Tuesday announced the detention of a hacker known as Sanix (a.k.a. โSanixerโ) from the Ivano-Frankivsk region of the country. The SBU said they found on Sanixโs computer records showing he sold databases with โlogins and passwords to e-mail boxes, PIN codes for bank cards, e-wallets of cryptocurrencies, PayPal accounts, and information about computers hacked for further use in botnets and for organizing distributed denial-of-service (DDoS) attacks.โ
Sanix became famous last year for posting to hacker forums that he was selling the 87GB password dump, labeled โCollection #1.โ Shortly after his sale was first detailed by Troy Hunt, who operates the HaveIBeenPwned breach notification service, KrebsOnSecurity contacted Sanix to find out what all the fuss was about. From that story: https://krebsonsecurity.com/2019/01/773m-password-megabreach-is-years-old/
๐๐ผ Read more:
https://krebsonsecurity.com/2020/05/ukraine-nabs-suspect-in-773m-password-megabreach/
#password #breach #ukraine
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
In January 2019, dozens of media outlets raised the alarm about a new โmegabreachโ involving the release of some 773 million stolen usernames and passwords that was breathlessly labeled โthe largest collection of stolen data in history.โ A subsequent review by KrebsOnSecurity quickly determined the data was years old and merely a compilation of credentials pilfered from mostly public data breaches. Earlier today, authorities in Ukraine said theyโd apprehended a suspect in the case.
The Security Service of Ukraine (SBU) on Tuesday announced the detention of a hacker known as Sanix (a.k.a. โSanixerโ) from the Ivano-Frankivsk region of the country. The SBU said they found on Sanixโs computer records showing he sold databases with โlogins and passwords to e-mail boxes, PIN codes for bank cards, e-wallets of cryptocurrencies, PayPal accounts, and information about computers hacked for further use in botnets and for organizing distributed denial-of-service (DDoS) attacks.โ
Sanix became famous last year for posting to hacker forums that he was selling the 87GB password dump, labeled โCollection #1.โ Shortly after his sale was first detailed by Troy Hunt, who operates the HaveIBeenPwned breach notification service, KrebsOnSecurity contacted Sanix to find out what all the fuss was about. From that story: https://krebsonsecurity.com/2019/01/773m-password-megabreach-is-years-old/
๐๐ผ Read more:
https://krebsonsecurity.com/2020/05/ukraine-nabs-suspect-in-773m-password-megabreach/
#password #breach #ukraine
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Krebs on Security
773M Password โMegabreachโ is Years Old
My inbox and Twitter messages positively lit up today with people forwarding stories from Wired and other publications about a supposedly new trove of nearly 773 million unique email addresses and 21 million unique passwords that were posted to aโฆ
Contact tracing in Europe, cell-tower vandalism in the US, and a look at the Dark Web.
Contact tracing and privacy in France.
France is proceeding with its centralized approach to COVID-19 contact tracing, ZDNet reports. Authorities maintain that this is being done with due regard for preserving users' privacy. The government is particularly interested in the utility the system, StopCOVID, might have in containing a recurrence of the virus. Earlier this month Medium offered a summary of the app's development, including its goals and prospects.
COVID-19 virus scams and other pandemic curiosa on the Dark Web.
Researchers at Trustwave's SpiderLabs describe the various pandemic-related scams they're finding on the Dark Web, and note some of the underworld reaction to them. They do note that the criminals follow the news (like everyone else), swap advice about staying healthy, express concerns about the consequences of the pandemic for their own enterprises, etc.โin short an inverted version of the kind of chatter one sees in legitimate channels.
But the more interesting material reveals the deliberations and plans that directly shape the criminal enterprises themselves. For example, there's chatter about demand for masks, and whether that presents an opportunity for various forms of illicit trade. Masks and other medical supplies are being offered for sale in online souks that normally hawk contraband. Those same markets also offer patently bogus nostrums, most prominently COVID-19 vaccines, which of course don't exist. Accompanying the offers are an array of bogus stories alluding to widespread cover-ups and misinformation by various authorities.
The underground markets are themselves feeling some of the pain legitimate markets are experiencing. They warn their customers that they may expect service disruptions, and they shed virtual crocodile tears over the health risks vulnerable customers (like drug abusers) face during the pandemic. And some of the subsectors of the criminal-to-criminal market seem to be feeling considerable pain. Carding in particular appears to be experiencing a rough patch. Why this is happening is unclear, and seems to call for explanation. Perhaps with the general slowing of economic activity there's been a reduction in available inventory, and with the relative scarcity of new stolen numbers, carders are recycling their wares in the souks. Criminals who have access to new stolen cards are reserving them for their own use.
๐๐ผ Read more:
https://thecyberwire.com/stories/86aed89f49e94372a3e7bb56962bc664/contact-tracing-in-europe-cell-tower-vandalism-in-the-us-and-a-look-at-the-dark-web
#coronavirus #traking #tracing #eu #france #celltower #vandalism #usa #darkweb
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Contact tracing and privacy in France.
France is proceeding with its centralized approach to COVID-19 contact tracing, ZDNet reports. Authorities maintain that this is being done with due regard for preserving users' privacy. The government is particularly interested in the utility the system, StopCOVID, might have in containing a recurrence of the virus. Earlier this month Medium offered a summary of the app's development, including its goals and prospects.
COVID-19 virus scams and other pandemic curiosa on the Dark Web.
Researchers at Trustwave's SpiderLabs describe the various pandemic-related scams they're finding on the Dark Web, and note some of the underworld reaction to them. They do note that the criminals follow the news (like everyone else), swap advice about staying healthy, express concerns about the consequences of the pandemic for their own enterprises, etc.โin short an inverted version of the kind of chatter one sees in legitimate channels.
But the more interesting material reveals the deliberations and plans that directly shape the criminal enterprises themselves. For example, there's chatter about demand for masks, and whether that presents an opportunity for various forms of illicit trade. Masks and other medical supplies are being offered for sale in online souks that normally hawk contraband. Those same markets also offer patently bogus nostrums, most prominently COVID-19 vaccines, which of course don't exist. Accompanying the offers are an array of bogus stories alluding to widespread cover-ups and misinformation by various authorities.
The underground markets are themselves feeling some of the pain legitimate markets are experiencing. They warn their customers that they may expect service disruptions, and they shed virtual crocodile tears over the health risks vulnerable customers (like drug abusers) face during the pandemic. And some of the subsectors of the criminal-to-criminal market seem to be feeling considerable pain. Carding in particular appears to be experiencing a rough patch. Why this is happening is unclear, and seems to call for explanation. Perhaps with the general slowing of economic activity there's been a reduction in available inventory, and with the relative scarcity of new stolen numbers, carders are recycling their wares in the souks. Criminals who have access to new stolen cards are reserving them for their own use.
๐๐ผ Read more:
https://thecyberwire.com/stories/86aed89f49e94372a3e7bb56962bc664/contact-tracing-in-europe-cell-tower-vandalism-in-the-us-and-a-look-at-the-dark-web
#coronavirus #traking #tracing #eu #france #celltower #vandalism #usa #darkweb
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
The CyberWire
Contact tracing in Europe, cell-tower vandalism in the US, and a look at the Dark Web.
Contact tracing and privacy in France. COVID-19 virus scams on the dark web. Phishing for the unemployed. Consequences of misinformation: 5G vandalism.
Goodbye Big Five
Reporter Kashmir Hill spent six weeks blocking Amazon, Facebook, Google, Microsoft, and Apple from getting her money, data, and attention, using a custom-built VPN. Hereโs what happened.
I am on a mission to live without the tech giantsโto discover whether such a thing is even possible. Not just through sheer willpower but technologically, with the use of a custom-built tool that would literally prevent my devices from accessing these companies, and them from accessing me and my data.
๐๐ผ ๐บ Week 1: Amazon
https://t.me/NoGoolag/764
๐๐ผ ๐บ Week 2: Facebook
https://t.me/NoGoolag/766
๐๐ผ ๐บ Week 3: Google
https://t.me/NoGoolag/767
๐๐ผ ๐บ Week 4: Microsoft
https://t.me/NoGoolag/794
๐๐ผ ๐บ Week 5: Apple
https://t.me/NoGoolag/795
๐๐ผ ๐บ Week 6: Blocking them all
https://t.me/NoGoolag/812
#BigFive #delete #facebook #google #microsoft #apple #amazon #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Reporter Kashmir Hill spent six weeks blocking Amazon, Facebook, Google, Microsoft, and Apple from getting her money, data, and attention, using a custom-built VPN. Hereโs what happened.
I am on a mission to live without the tech giantsโto discover whether such a thing is even possible. Not just through sheer willpower but technologically, with the use of a custom-built tool that would literally prevent my devices from accessing these companies, and them from accessing me and my data.
๐๐ผ ๐บ Week 1: Amazon
https://t.me/NoGoolag/764
๐๐ผ ๐บ Week 2: Facebook
https://t.me/NoGoolag/766
๐๐ผ ๐บ Week 3: Google
https://t.me/NoGoolag/767
๐๐ผ ๐บ Week 4: Microsoft
https://t.me/NoGoolag/794
๐๐ผ ๐บ Week 5: Apple
https://t.me/NoGoolag/795
๐๐ผ ๐บ Week 6: Blocking them all
https://t.me/NoGoolag/812
#BigFive #delete #facebook #google #microsoft #apple #amazon #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Telegram
NoGoolag
๐บ Goodbye Big Five (Week 1: Amazon)
Reporter Kashmir Hill spent six weeks blocking Amazon, Facebook, Google, Microsoft, and Apple from getting her money, data, and attention, using a custom-built VPN. Hereโs what happened.
I am on a mission to live withoutโฆ
Reporter Kashmir Hill spent six weeks blocking Amazon, Facebook, Google, Microsoft, and Apple from getting her money, data, and attention, using a custom-built VPN. Hereโs what happened.
I am on a mission to live withoutโฆ
ADT worker accused of using app to spy on hundreds of people, including children, over 7 years
Two Texas women are suing ADT Security Services in a pair of federal lawsuits over a breach that allowed an employee for the security giant to allegedly view footage from indoor security cameras installed in hundreds of homes over several years.
The proposed class-action lawsuits were filed in U.S. District Court in Fort Lauderdale, Fla., on behalf of hundreds of ADT clients possibly victimized the employee, identified as Telesforo Aviles, who allegedly had access to more than 200 ADT Pulse accounts over a seven-year period.
"This privacy breach occurred because ADT did not follow the most basic security procedures," a news release from the Dallas-based Fears Nachawati Law Firm said.
The loophole was discovered when a customer found an unauthorized email among the addresses given permission to access their security system. The Boca Raton, Fla.,-based company notified customers of the security lapse and tried paying them off in exchange for their silence, the lawsuits said.
๐๐ผ Read more:
https://www.foxnews.com/us/adt-worker-accused-of-using-app-to-spy-on-hundreds-of-people-including-children-over-7-years
#adt #spy #app #breach #privacy
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Two Texas women are suing ADT Security Services in a pair of federal lawsuits over a breach that allowed an employee for the security giant to allegedly view footage from indoor security cameras installed in hundreds of homes over several years.
The proposed class-action lawsuits were filed in U.S. District Court in Fort Lauderdale, Fla., on behalf of hundreds of ADT clients possibly victimized the employee, identified as Telesforo Aviles, who allegedly had access to more than 200 ADT Pulse accounts over a seven-year period.
"This privacy breach occurred because ADT did not follow the most basic security procedures," a news release from the Dallas-based Fears Nachawati Law Firm said.
The loophole was discovered when a customer found an unauthorized email among the addresses given permission to access their security system. The Boca Raton, Fla.,-based company notified customers of the security lapse and tried paying them off in exchange for their silence, the lawsuits said.
๐๐ผ Read more:
https://www.foxnews.com/us/adt-worker-accused-of-using-app-to-spy-on-hundreds-of-people-including-children-over-7-years
#adt #spy #app #breach #privacy
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Fox News
ADT worker accused of using app to spy on hundreds of people, including children, over 7 years
Two Texas women are suing ADT Security Services in a pair of federal lawsuits over a breach that allowed an employee for the security giant to allegedly view footage from indoor security cameras installed in hundreds of homes over several years.
Because privacy matters โผ๏ธ
Secure Messaging Apps Comparison:
https://www.securemessagingapps.com/
#security #privacy #messaging #apps #comparison
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Secure Messaging Apps Comparison:
https://www.securemessagingapps.com/
#security #privacy #messaging #apps #comparison
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Open Source Guides
Open source software is made by people just like you. Learn how to launch and grow your project.
Open Source Guides are a collection of resources for individuals, communities, and companies who want to learn how to run and contribute to an open source project.
๐๐ผ Read more:
https://opensource.guide/
https://github.com/github/opensource.guide#readme
#OpenSource #software #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Open source software is made by people just like you. Learn how to launch and grow your project.
Open Source Guides are a collection of resources for individuals, communities, and companies who want to learn how to run and contribute to an open source project.
๐๐ผ Read more:
https://opensource.guide/
https://github.com/github/opensource.guide#readme
#OpenSource #software #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Open Source Guides
Learn how to launch and grow your project.
โApp Watchโ Allows Operators to Monitor and Ban Piracy Apps on Android Set-Top Boxes
Irdeto is mostly known for its 'Denuvo' anti-piracy tool, which protects many high profile games. However, the digital security company operates a broad suite of anti-piracy tools. This includes "App Watch," a service that allows content providers to monitor and restrict the use of pirate apps on their Android-based set-top boxes.
Many content providers and networks have their own set-top boxes that can be connected to any modern TV.
These devices are often running on Android and sometimes allow users to install third-party apps, via Googleโs Play store, for example.
This opens the door to a wide range of other apps which can be problematic, especially when they offer a gateway to pirated content that directly competes with the operatorโs service.
To address this potential threat, digital security company Irdeto is offering an โApp Watchโ service. This is part of the companyโs broad range of piracy tools and services which also includes the game anti-tamper software Denuvo, which recently expanded with an anti-cheat service.
App Watch is targeted at providers of streaming services who have their own set-top boxes. Itโs meant to safeguard these companies against abuse and prevent consumers from using their boxes as piracy tools.
โThe problem with giving consumers choice is that they may get distracted from your services, on your platform,โ Irdeto writes, pointing out the worst-case scenario.
๐๐ผ Read more:
https://torrentfreak.com/app-watch-allows-operators-to-monitor-and-ban-piracy-apps-on-android-set-top-boxes-200523/
#AppWatch #piracy #apps #android #SetTopBox #safeguard
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Irdeto is mostly known for its 'Denuvo' anti-piracy tool, which protects many high profile games. However, the digital security company operates a broad suite of anti-piracy tools. This includes "App Watch," a service that allows content providers to monitor and restrict the use of pirate apps on their Android-based set-top boxes.
Many content providers and networks have their own set-top boxes that can be connected to any modern TV.
These devices are often running on Android and sometimes allow users to install third-party apps, via Googleโs Play store, for example.
This opens the door to a wide range of other apps which can be problematic, especially when they offer a gateway to pirated content that directly competes with the operatorโs service.
To address this potential threat, digital security company Irdeto is offering an โApp Watchโ service. This is part of the companyโs broad range of piracy tools and services which also includes the game anti-tamper software Denuvo, which recently expanded with an anti-cheat service.
App Watch is targeted at providers of streaming services who have their own set-top boxes. Itโs meant to safeguard these companies against abuse and prevent consumers from using their boxes as piracy tools.
โThe problem with giving consumers choice is that they may get distracted from your services, on your platform,โ Irdeto writes, pointing out the worst-case scenario.
๐๐ผ Read more:
https://torrentfreak.com/app-watch-allows-operators-to-monitor-and-ban-piracy-apps-on-android-set-top-boxes-200523/
#AppWatch #piracy #apps #android #SetTopBox #safeguard
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Torrentfreak
'App Watch' Allows Operators to Monitor and Ban Piracy Apps on Android Set-Top Boxes * TorrentFreak
Iredto's 'App Watch' service enables content providers to monitor and restrict the use of pirate apps on Android-based set-top boxes.
The entire database is being sold for $30,000 on a hacker forum.
Last month a hacker was selling 267 million Facebook user data on a dark web marketplace. Now, a hacker or call them a threat actor is claiming to have access to a database with 500 million Facebook user data from 82 countries.
Whatโs worse is that the data is currently being sold on an infamous hacking forum, Hackread.com has learned.
As seen on the forum, the hacker has been offering the treasure trove of data since May 15th, 2020 and includes personal information such as,
Names
Gender
location
City name
Surnames
Actual job
Marital status
Mobile number
Email addresses
Facebook profile links
Furthermore, the hacker has divided the price of the data into three parts, for instance, $1500 per million, $450 per 100,000, and $30,000 for 500 million for the entire database. The listing also states that the information in the database was stolen between November 2019 to May 2020.
๐๐ผ Read more:
https://www.hackread.com/hacker-selling-500-million-facebook-user-data/
https://www.hackread.com/hacker-forum-sell-267-million-facebook-records/
#hacker #hacked #breach #facebook #DeleteFacebook
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Last month a hacker was selling 267 million Facebook user data on a dark web marketplace. Now, a hacker or call them a threat actor is claiming to have access to a database with 500 million Facebook user data from 82 countries.
Whatโs worse is that the data is currently being sold on an infamous hacking forum, Hackread.com has learned.
As seen on the forum, the hacker has been offering the treasure trove of data since May 15th, 2020 and includes personal information such as,
Names
Gender
location
City name
Surnames
Actual job
Marital status
Mobile number
Email addresses
Facebook profile links
Furthermore, the hacker has divided the price of the data into three parts, for instance, $1500 per million, $450 per 100,000, and $30,000 for 500 million for the entire database. The listing also states that the information in the database was stolen between November 2019 to May 2020.
๐๐ผ Read more:
https://www.hackread.com/hacker-selling-500-million-facebook-user-data/
https://www.hackread.com/hacker-forum-sell-267-million-facebook-records/
#hacker #hacked #breach #facebook #DeleteFacebook
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Hackread - Latest Cybersecurity News, Press Releases & Technology Today
Exclusive: Hacker selling 500 million Facebook user data from 82 countries
Like us on Facebook @ /HackRead
โผ๏ธ Last call for your questions to StartPage.comโผ๏ธ
Deadline for questions to StartPage.com runs until 1 June!
Please keep in mind: Ask your questions in a consistently constructive manner! With hostility or the like we will not get anywhere. Either way, the deadline will expire on 1.6.2020. Unfortunately we cannot accept any further questions after that date.
We hope for a lively participation in this exciting topic !!
๐๐ผ Please ask your questions in one of the following TG-Groups:
@BlackBoxโช๏ธSecurity
@NoGoolag
@Tarnkappe_info or @ the Tarnkappe-Forum
โ๏ธplease mark your questions with #startpage
Read more ๐ฉ๐ช:
https://tarnkappe.info/die-suchmaschine-startpage-com-im-interview-bitte-fragen-einreichen/
Background info ๐๐ผ
Startpage sold to System1 ๐
๐ก https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/
๐ก https://www.kuketz-blog.de/ist-die-suchmaschine-startpage-noch-empfehlenswert/
๐ก https://tarnkappe.info/startpage-verkauft-firmen-anteile-an-system1-llc/
๐บ https://www.youtube.com/watch?v=aAwtQvt1P_c
#startpage #interview #system1
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Deadline for questions to StartPage.com runs until 1 June!
Please keep in mind: Ask your questions in a consistently constructive manner! With hostility or the like we will not get anywhere. Either way, the deadline will expire on 1.6.2020. Unfortunately we cannot accept any further questions after that date.
We hope for a lively participation in this exciting topic !!
๐๐ผ Please ask your questions in one of the following TG-Groups:
@BlackBoxโช๏ธSecurity
@NoGoolag
@Tarnkappe_info or @ the Tarnkappe-Forum
โ๏ธplease mark your questions with #startpage
Read more ๐ฉ๐ช:
https://tarnkappe.info/die-suchmaschine-startpage-com-im-interview-bitte-fragen-einreichen/
Background info ๐๐ผ
Startpage sold to System1 ๐
๐ก https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/
๐ก https://www.kuketz-blog.de/ist-die-suchmaschine-startpage-noch-empfehlenswert/
๐ก https://tarnkappe.info/startpage-verkauft-firmen-anteile-an-system1-llc/
๐บ https://www.youtube.com/watch?v=aAwtQvt1P_c
#startpage #interview #system1
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Gates Foundation Buys Up Amazon, Apple, Twitter Stock; Trims Berkshire Hathaway Stake
The Bill & Melinda Gates Foundation Trust has built up new positions in tech giants Amazon.com Inc. (AMZN), Apple Inc. (AAPL) and Twitter (TWTR) in the first quarter of the year, while trimming its investment in Warren Buffettโs Berkshire Hathaway.
In the first three months of the year, the Gates Foundation Trust bought up 501,044 in Apple shares, according to a SEC filing. The iPhone makerโs stock, which dropped 15% in the first quarter, has since been on a recovery path, appreciating some 25% to trade at $318.89 as of Fridayโs close. Given the recent rally, the $318.93 average price target by analysts indicates shares are fully priced (See Apple stock analysis on TipRanks).
Microsoft founder Bill Gates and his wife established the worldโs largest private foundation back in 2000. The foundation holds over $40 billion in assets.
The trust also built up new positions in Twitter, which has soared 48% in the past two months, by purchasing 272,420 shares. In e-commerce giant Amazon it acquired 60,460 shares. It also bought 552,383 shares of Alibaba.
๐๐ผ Read more:
https://www.smarteranalyst.com/yahoo/gates-foundation-buys-up-amazon-apple-twitter-stock-trims-berkshire-hathaway-stake/
#BillGates #GatesFoundation #amazon #apple #twitter #berkshire #hathaway #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
The Bill & Melinda Gates Foundation Trust has built up new positions in tech giants Amazon.com Inc. (AMZN), Apple Inc. (AAPL) and Twitter (TWTR) in the first quarter of the year, while trimming its investment in Warren Buffettโs Berkshire Hathaway.
In the first three months of the year, the Gates Foundation Trust bought up 501,044 in Apple shares, according to a SEC filing. The iPhone makerโs stock, which dropped 15% in the first quarter, has since been on a recovery path, appreciating some 25% to trade at $318.89 as of Fridayโs close. Given the recent rally, the $318.93 average price target by analysts indicates shares are fully priced (See Apple stock analysis on TipRanks).
Microsoft founder Bill Gates and his wife established the worldโs largest private foundation back in 2000. The foundation holds over $40 billion in assets.
The trust also built up new positions in Twitter, which has soared 48% in the past two months, by purchasing 272,420 shares. In e-commerce giant Amazon it acquired 60,460 shares. It also bought 552,383 shares of Alibaba.
๐๐ผ Read more:
https://www.smarteranalyst.com/yahoo/gates-foundation-buys-up-amazon-apple-twitter-stock-trims-berkshire-hathaway-stake/
#BillGates #GatesFoundation #amazon #apple #twitter #berkshire #hathaway #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
TipRanks Financial
Gates Foundation Buys Up Amazon, Apple, Twitter Stock; Trims Berkshire Hathaway Stake - TipRanks.com
The Bill Melinda Gates Foundation Trust has built up new positions in tech giants Amazon.com Inc. (AMZN), Apple Inc. (AAPL) and Twitter (TWTR) in the first qu...
Facebook's new App Catchup is designed to make calls easier - For each contact it shows whether the person has time to make a call.
Facebook is testing a new app in the USA that only offers audio calls. Catchup was developed by Facebook's New Product Experimentation Team, NPE for short. The team regularly tests experimental apps. With Catchup, group and individual calls can be started with just a few clicks.
https://techcrunch.com/2020/05/26/facebook-launches-catchup-an-audio-only-group-calling-app-that-shows-whos-ready-to-chat-now
https://t3n.de/news/app-experiment-facebook-catchup-1284532/
#DeleteFacebook #Catchup #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Facebook is testing a new app in the USA that only offers audio calls. Catchup was developed by Facebook's New Product Experimentation Team, NPE for short. The team regularly tests experimental apps. With Catchup, group and individual calls can be started with just a few clicks.
https://techcrunch.com/2020/05/26/facebook-launches-catchup-an-audio-only-group-calling-app-that-shows-whos-ready-to-chat-now
https://t3n.de/news/app-experiment-facebook-catchup-1284532/
#DeleteFacebook #Catchup #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN