Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

The 23andMe User Data Leak May Be Far Worse Than Believed

To revist this article, visit My Profile, then View saved stories.To revist this article, visit My Profile, then View saved stories.Andrew CoutsWith the Israel-Hamas war intensifying by the day, many people are desperate for accurate information about the conflict. Getting it has proven difficult. This has been most apparent on Elon Musk’s X, formerly Twitter, where insiders say even the company’s primary fact-checking tool, Community Notes, has been a source of disinformation and is at risk of coordinated manipulation.Case in point: An explosion at a hospital in Gaza on Tuesday was followed by a wave of mis- and disinformation around the cause. In the hours following the explosion, Hamas blamed Israel, Israel blamed militants in Gaza, mainstream media outlets repeated both sides’ claims without confirmation either way, and people posing as open source intelligence experts rushed out dubious analyses. The result was a toxic mix of information that made it harder than ever to know what’s real.On Thursday, the United States Department of the Treasury proposed plans to treat foreign-based cryptocurrency “mixers”—services that obscure who owns which specific coins—as suspected money laundering operations, citing as justification crypto donations to Hamas and the Palestinian Islamic Jihad, a Gaza-based militant group with ties to Hamas that Israel blamed for the hospital explosion. While these types of entities do use mixers, experts say they do so far less than criminal groups linked to North Korea and Russia—likely the real targets of the Treasury’s proposed crackdown.In Myanmar, where a military junta has been in power for two years, people who speak out against deadly air strikes on social media are being systematically doxed on pro-junta Telegram channels. Some were later tracked down and arrested.Finally, the online ecosystem of AI-generated deepfake pornography is quickly spiraling out of control. The number of websites specializing in and hosting these faked, nonconsensual images and videos has greatly increased in recent years. With the rise of generative AI tools, creating these images is quick and dangerously easy. And finding them is trivial, researchers say. All you have to do is a quick Google or Bing Search, and this invasive content is a click away.That’s not all. Each week, we round up the security and privacy stories we didn’t cover in-depth ourselves. Click the headlines to read the full stories, and stay safe out there.The recent theft of user data from genetics testing giant 23andMe may be more expansive than previously thought. On October 6, the company confirmed a trove of user data had been stolen from its website, including names, years of birth, and general descriptions of genetic data. The data related to hundreds of thousands of users of Chinese descent and primarily targeted Ashkenazi Jews. This week, a hacker claiming to have stolen the data posted millions of more records for sale on the platform BreachForums, TechCrunch reports. This time, the hacker claimed, the records pertained to people from the United Kingdom, including “the wealthiest people living in the US and Western Europe on this list.” A 23andMe spokesperson tells The Verge that the company is “currently reviewing the data to determine if it is legitimate.”According to 23andMe, its systems were not breached. Instead, it said, the data theft was likely due to people reusing passwords on their 23andMe accounts that were exposed in past breaches and then used to access their accounts. If you need some motivation to stop recycling passwords, this is it.The US Department of Justice on Wednesday said it had uncovered a vast network of IT workers who were collecting paychecks from US-based companies then sending that money to North Korea. The freelance IT workers are accused of sending millions of dollars to Pyongyang, which used the funds to help build its ballistic missile program. While the workers allegedly pretended to live and work in the US, the DOJ says they often lived in China and Russia and took steps to obscure their real identities. According to an FBI official involved in the case, it’s “more than likely” that any freelance IT worker a US company hired was part of the plot.Searching online may have just gotten a little bit more dangerous. On Monday, a Colorado Supreme Court upheld police use of a so-called keyword search warrant. Using this type of warrant, law enforcement demands companies like Google hand over the identities of anyone who searched for specific information. This is the opposite of how traditional Search Warrants work, where cops identify a suspect and then use search warrants to obtain information about them.Keyword search warrants have long been criticized as “fishing expeditions” that violate the US Constitution’s Fourth Amendment rights against unreasonable searches and seizures, because it potentially hands police information about innocent people who searched for a specific term but were not involved in any related crime.Amit KatwalaParker HallMatt SimonJulian ChokkattuThe Colorado court’s ruling, issued in a case related to a deadly arson attack, does not weigh in on whether keyword search warrants are constitutional. Instead, it uses a “good faith” exemption for the police officers involved in the case, meaning they executed the warrant without reason to believe it violated constitutional rights because “until today, no court had established that individuals have a constitutionally protected privacy interest in their Google search history.” The Electronic Frontier Foundation, a nonprofit focused on technology and civil liberties that was involved in the case, called the ruling “weak and ultimately confusing.”The age of the password is rapidly coming to an end. We swear. This week, Meta-owned WhatsApp began giving Android users the chance to scrap their passwords for passkeys, which are meant to be more secure than whatever weak word or phrase you likely chose to authenticate your logins. A passkey replaces a password with two cryptographic keys, one that’s stored locally on your device and one stored by whatever platform you’re logging into. You then use your device’s biometric login systems—think fingerprint scanners or facial recognition—to access your account. Without a password to steal, users are ostensibly less at risk of phishing attacks, which remain common. Apple and Google both have passkeys baked into their operating systems, and WhatsApp’s support for the feature will arrive on Android in the following weeks. The company has yet to announce a rollout for iOS.📨 Make the most of chatbots with our AI Unlocked newsletterIn the war against Russia, some Ukrainians carry AK-47s. Andrey Liscovich carries a shopping listHow Neuralink keeps dead monkey photos secretThe bizarre cottage industry of YouTube obituary piratesCan FTX be revived—without Sam Bankman-Fried?Your internet browser does not belong to you🔌 Charge right into summer with the best travel adapters, power banks, and USB hubsDavid GilbertMatt BurgessAndy GreenbergLily Hay NewmanScott GilbertsonJustin LingLily Hay NewmanDavid GilbertMore From WIREDContact© 2023 Condé Nast. All rights reserved. Use of this site constitutes acceptance of our User Agreement and Privacy Policy and Cookie Statement and Your California Privacy Rights. WIRED may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Ad Choices



This post first appeared on VedVyas Articles, please read the originial post: here

Share the post

The 23andMe User Data Leak May Be Far Worse Than Believed

×

Subscribe to Vedvyas Articles

Get updates delivered right to your inbox!

Thank you for your subscription

×