The "glue" protocol that sticks internet's networks together
A Dangerous Network: The Border Gateway Protocol has been the primary routing technology for the internet for at least three decades. Like other fundamental internet protocols developed in the 1980s, BGP was not originally designed with security in mind – and it shows.
WTF?! Chinese-made chips used in popular contactless cards contain hardware backdoors that are easy to exploit. These chips are compatible with the proprietary Mifare protocol developed by Philips spin-off NXP Semiconductors and are inherently "intrinsically broken," regardless of the card's brand.
Hacker posts 2.7 billion records from National Public Data
What just happened? A colossal data breach has surfaced, revealing nearly 2.7 billion personal information records purportedly encompassing every individual in Canada, the United Kingdom, and the United States. This breach stands out due to the vast amount of data exposed, potentially marking it as one of the largest in history.
In brief: Apple and CEO Tim Cook will likely be feeling quite smug following a report that Israeli company Cellebrite's widely used phone-unlocking tools are ineffective against up-to-date iPhones. On the other hand, Cellebrite's kit can break into the majority of Android phones.
WTF?! The cybercriminal group that infected Indonesia's Temporary National Data Center (PDNS) with a strain of malware has freely released the decryption key to the government and apologized. The hackers think that this act of generosity shouldn't go unrewarded, though, and are asking for public donations that can be deposited into a crypto account.