The latest government data breach came from (wait for it…) fishing licenses – Hot Air

The latest government data breach came from (wait for it…) fishing licenses
Hot Air
While it's painful to admit, incidents of data hacking which expose personal data entrusted to the government are so common these days as to barely merit a headline. There's been yet another breach this year and it's not one which is likely to make a

“data breach” – Google News

Congressman to FCC: Fix phone network flaw that allows eavesdropping

SS7 allows an attacker to use just a phone number to gain access to calls and texts to and from that phone—and can be used to undermine the security of WhatsApp and Telegram. (credit: Petr Kolář (modified by Ars))

A documented weakness in Signaling System 7 has been shown to allow widespread interception of phone calls and text messages (SS7 is the public switched telephone network signaling protocol used to set up and route phone calls; it also allows for things like phone number portability). This weakness in SS7 can even undermine the security of encrypted messaging systems such as WhatsApp and Telegram.

In an April segment of 60 Minutes, Democratic Congressman Ted Lieu of California allowed hackers to demonstrate how they could listen in on his calls. In light of the mass leak of congressional staffers’ contact information by hackers, Congressman Lieu is now urging the Federal Communications Commission to take action quickly to fix the problem with SS7. The hackers are purportedly tied to Russian intelligence.

The vulnerability in SS7 was revealed in a presentation at the RSA security conference in March. It exploits the use of SS7 by cellular networks to handle billing and phone location data for call routing. The vulnerability is open to anyone with access to SS7 signaling. This includes not just telecommunications companies that have “roaming” relationships with a phone’s primary carrier, but any state actor or hacker who has access to those companies’ networks. Using SS7, an attacker could create a proxy to route calls and text messages. He could intercept them and record them without the knowledge of the people on either end of the communications. An attacker could also spoof texts and calls from a number.

Read 3 remaining paragraphs | Comments

Technology Lab – Ars Technica

A Hacking Group Is Selling iPhone Spyware to Governments – WIRED


WIRED

A Hacking Group Is Selling iPhone Spyware to Governments
WIRED
Mansoor, who is based in the United Arab Emirates, has been targeted by lawful intercept surveillance software before, and Citizen Lab worked with him when his devices were compromised by FinFisher's FinSpy malware in 2011, and Hacking Team's …
Citizen Lab researchers discover attack on iPhone belonging to UAE activistNews@UofT
Spyware attack forces Apple's hand, iOS patch rushed outSiliconrepublic.com
The Million Dollar Dissident: NSO Group's iPhone Zero-Days used against a UAE Human Rights Defender – The …The Citizen Lab
New York Times –Apple Support –Lookout Blog –Webroot
all 641 news articles »

finspy – read more

Idaho hunting and fishing license info hit with data breach – KREM.com


KREM.com

Idaho hunting and fishing license info hit with data breach
KREM.com
BOISE, Idaho — Idaho Fish and Game announced Friday people who bought hunting and fishing licenses and tags before 2008 may have had their information stolen in a data breach. The online computer license sales system, Active Network, told Fish and …
Fish/Wildlife officials: No Oregon data breach, but online site now closed 'until further notice'OregonLive.com
Idaho Fish & Game warns customers after news that data breach compromised personal infoThe Spokesman Review (registration) (blog)
Fish and Game halts online tag sales after breachKTVB.com
Phys.Org –OPB News –Coeur d’Alene Press
all 94 news articles »

“data breach” – Google News