All this would represent a serious threat to national security. Except that, strangely, Apple clearly denies that it happened. “We are strongly disagreed with the statements of a targeted attack against our users,” wrote the head of Apple’s security engineering, Ivan Krstić, in a declaration at Wired. Apple patched the problem that Iiverify highlighted in his report, which caused the iPhone crash in some cases when a sender of the message changed its nickname and avatar. But call these anomalous arrests the result of a “conventional bug”, not evidence of a targeted exploitation. (That general denial is certainly not the usual Apple response to the confirmed iPhone hacking. The company has, for example, sued the hacking company NSO Group for its targeting for Apple customers.)
The result is that what could have been a fire to four alarms in the world of counterintelligence is reduced-for now-and a very worrying enigma.
According to reports, a 22 -year -old former intern at the Heritage Foundation without national security experience has been appointed to a key role of the National Security Department that supervises an important program designed to combat internal terrorism.
Second advocate, Thomas Escate took over the leadership of the Center for Programs and Partnerships (CP3) last month, a DHS office in charge of national funding to prevent politically motivated violence, including school shootings and other forms of domestic terrorism.
Escate, graduated at 2024 from the University of Texas in San Antonio, replaced the former director of the CP3, Bill Branff, a veteran of the army with 20 years of national security experience that resigned in March following the cuts of the staff ordered by the Trump administration.
According to the most recent report of the CP3 at the congress, the office has financed over 1,100 initiatives aimed at interrupting violent extremism. In recent months, the United States have seen a series of targeted high -profile attacks, including an automotive bombardment in California and the shooting of two AIDS of the Israeli embassy in Washington, DC. Its 18 million dollar subsidy program, designed to support local prevention efforts, is now under the supervision of escapes.
The names of the hacker groups have long been an inevitable absurdity in the IT security sector. Every intelligence company on threats, in a scientifically defensible attempt not to assume that they are monitoring the same hackers as another company, presents its code name for any group they observe. The result is a somewhat shocked profusion of overlapping denomination systems based on elements, time and zoology: “Fancy Bear” is “Forest Blizzard” is “APT28” is “Strike”. Now, several important intelligence players on threats, including Google, Microsoft, Crowdstrike and Palo Alto Networks, have finally shared enough of their internal research to agree on a glossary who confirms that they refer to the same entities. The companies have done Not, However, accept to consolidate their name systems in a single taxonomy. So this agreement does not mean the end of the phrases in safety reports such as “the group of sandworm group of the Hacker group, also known as Telebots, Orso Voodoo, Hades, Iron Viking, Electrum or Snow Storm.” It only means that we computer security journalists can write that phrase with a little more trust.
Chris Wade, the founder and CTO of the reverse engineering company of the Corellium mobile device, had a wild period in recent decades: in 2005, he was sentenced with the criminal accusation of allowing spammer by providing them with them for prosecutor and agreed to work under the lid for the application of the law avoiding prison. Then, in 2020, he mysteriously received a forgiveness from President Donald Trump. He also solved an important cause of Apple’s copyright. Now his company, which creates virtual images of Android and iOS devices so that customers can find a way to break out, is acquired by the cell phone hacking company, an important contractor of the law, for $ 200 million, a significant pay day for a hacker who has found himself on both sides.
Discover more from Gautam Kalal
Subscribe to get the latest posts sent to your email.
Be First to Comment