<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security News April 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 16:43:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677242</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 May 2020 05:38:45 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677242</guid>
		<description><![CDATA[NSO Employee Abused Phone Hacking Tech to Target a Love Interest
https://www.vice.com/en_us/article/bvgwzw/nso-group-employee-abused-pegasus-target-love-interest

The previously unreported news is a serious abuse of NSO&#039;s products, which are typically used by governments and authoritarian regimes.

An employee of controversial surveillance vendor NSO Group abused access to the company&#039;s powerful hacking technology to target a love interest, Motherboard has learned.]]></description>
		<content:encoded><![CDATA[<p>NSO Employee Abused Phone Hacking Tech to Target a Love Interest<br />
<a href="https://www.vice.com/en_us/article/bvgwzw/nso-group-employee-abused-pegasus-target-love-interest" rel="nofollow">https://www.vice.com/en_us/article/bvgwzw/nso-group-employee-abused-pegasus-target-love-interest</a></p>
<p>The previously unreported news is a serious abuse of NSO&#8217;s products, which are typically used by governments and authoritarian regimes.</p>
<p>An employee of controversial surveillance vendor NSO Group abused access to the company&#8217;s powerful hacking technology to target a love interest, Motherboard has learned.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677167</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 03 May 2020 10:51:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677167</guid>
		<description><![CDATA[RESEARCHERS BREAK FPGA ENCRYPTION USING FPGA ENCRYPTION
https://hackaday.com/2020/04/23/researchers-break-fpga-encryption-using-fpga-encryption]]></description>
		<content:encoded><![CDATA[<p>RESEARCHERS BREAK FPGA ENCRYPTION USING FPGA ENCRYPTION<br />
<a href="https://hackaday.com/2020/04/23/researchers-break-fpga-encryption-using-fpga-encryption" rel="nofollow">https://hackaday.com/2020/04/23/researchers-break-fpga-encryption-using-fpga-encryption</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677127</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 03 May 2020 06:56:29 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677127</guid>
		<description><![CDATA[Senator questions Clearview AI over coronavirus tracking plans
https://www.cnet.com/news/senator-questions-clearview-ai-over-coronavirus-tracking-plans/

Sen. Edward Markey says COVID-19 contact tracing can&#039;t be &quot;used as cover by companies like Clearview to build shadowy surveillance networks.&quot;]]></description>
		<content:encoded><![CDATA[<p>Senator questions Clearview AI over coronavirus tracking plans<br />
<a href="https://www.cnet.com/news/senator-questions-clearview-ai-over-coronavirus-tracking-plans/" rel="nofollow">https://www.cnet.com/news/senator-questions-clearview-ai-over-coronavirus-tracking-plans/</a></p>
<p>Sen. Edward Markey says COVID-19 contact tracing can&#8217;t be &#8220;used as cover by companies like Clearview to build shadowy surveillance networks.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677126</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 03 May 2020 06:55:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677126</guid>
		<description><![CDATA[China is installing surveillance cameras outside people&#039;s front doors ... and sometimes inside their homes
By Nectar Gan, CNN Business
Updated 1142 GMT (1942 HKT) April 28, 2020
https://www.cnn.com/2020/04/27/asia/cctv-cameras-china-hnk-intl/index.html

&quot;(Having a camera outside your door is) an incredible erosion of privacy,&quot; said Lahiffe. &quot;It just seems to be a massive data grab. And I don&#039;t know how much of it is actually legal.&quot;

Although there is no official announcement stating that cameras must be fixed outside the homes of people under quarantine, it has been happening in some cities across China since at least February]]></description>
		<content:encoded><![CDATA[<p>China is installing surveillance cameras outside people&#8217;s front doors &#8230; and sometimes inside their homes<br />
By Nectar Gan, CNN Business<br />
Updated 1142 GMT (1942 HKT) April 28, 2020<br />
<a href="https://www.cnn.com/2020/04/27/asia/cctv-cameras-china-hnk-intl/index.html" rel="nofollow">https://www.cnn.com/2020/04/27/asia/cctv-cameras-china-hnk-intl/index.html</a></p>
<p>&#8220;(Having a camera outside your door is) an incredible erosion of privacy,&#8221; said Lahiffe. &#8220;It just seems to be a massive data grab. And I don&#8217;t know how much of it is actually legal.&#8221;</p>
<p>Although there is no official announcement stating that cameras must be fixed outside the homes of people under quarantine, it has been happening in some cities across China since at least February</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677125</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 03 May 2020 06:52:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677125</guid>
		<description><![CDATA[Trump bans acquisition of foreign power grid equipment, citing hacking threats
https://www.zdnet.com/article/trump-bans-acquisition-of-foreign-power-grid-equipment-citing-hacking-threats/

White House says foreign-made equipment &quot;augments the ability of foreign adversaries to create and exploit vulnerabilities&quot; in the US power grid.

President Donald Trump signed today an executive order barring US power grid entities from buying and installing electrical equipment that has been manufactured outside the US.

Trump said that &quot;foreign adversaries are increasingly creating and exploiting vulnerabilities in the United States bulk-power system.&quot;]]></description>
		<content:encoded><![CDATA[<p>Trump bans acquisition of foreign power grid equipment, citing hacking threats<br />
<a href="https://www.zdnet.com/article/trump-bans-acquisition-of-foreign-power-grid-equipment-citing-hacking-threats/" rel="nofollow">https://www.zdnet.com/article/trump-bans-acquisition-of-foreign-power-grid-equipment-citing-hacking-threats/</a></p>
<p>White House says foreign-made equipment &#8220;augments the ability of foreign adversaries to create and exploit vulnerabilities&#8221; in the US power grid.</p>
<p>President Donald Trump signed today an executive order barring US power grid entities from buying and installing electrical equipment that has been manufactured outside the US.</p>
<p>Trump said that &#8220;foreign adversaries are increasingly creating and exploiting vulnerabilities in the United States bulk-power system.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677120</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 03 May 2020 06:08:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677120</guid>
		<description><![CDATA[Exclusive: Warning Over Chinese Mobile Giant Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use
https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/

“It’s a backdoor with phone functionality,” quips Gabi Cirlig about his new Xiaomi phone. He’s only half-joking.

Cirlig is speaking with Forbes after discovering that his Redmi Note 8 smartphone was watching much of what he was doing on the phone. That data was then being sent to remote servers hosted by another Chinese tech giant, Alibaba, which were ostensibly rented by Xiaomi. 

The seasoned cybersecurity researcher found a worrying amount of his behavior was being tracked, whilst various kinds of device data were also being harvested, leaving Cirlig spooked that his identity and his private life was being exposed to the Chinese company.

Meanwhile, at Forbes’ request, cybersecurity researcher Andrew Tierney investigated further. He also found browsers shipped by Xiaomi on Google Play—Mi Browser Pro and the Mint Browser—were collecting the same data. Together, they have more than 15 million downloads, according to Google Play statistics.
In response to the findings, Xiaomi said, “The research claims are untrue,” and “Privacy and security is of top concern,” adding that it “strictly follows and is fully compliant with local laws and regulations on user data privacy matters.” But a spokesperson confirmed it was collecting browsing data, claiming the information was anonymized so wasn’t tied to any identity. They said that users had consented to such tracking. 

It’s the second time in two months that a huge Chinese tech company has been seen watching over users’ phone habits. A security app with a “private” browser made by Cheetah Mobile, a public company listed on the New York Stock Exchange, was seen collecting information on Web use, Wi-Fi access point names and more granular data like how a user scrolled on visited Web pages. Cheetah argued it needed to collect the information to protect users and improve their experience.]]></description>
		<content:encoded><![CDATA[<p>Exclusive: Warning Over Chinese Mobile Giant Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use<br />
<a href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/" rel="nofollow">https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/</a></p>
<p>“It’s a backdoor with phone functionality,” quips Gabi Cirlig about his new Xiaomi phone. He’s only half-joking.</p>
<p>Cirlig is speaking with Forbes after discovering that his Redmi Note 8 smartphone was watching much of what he was doing on the phone. That data was then being sent to remote servers hosted by another Chinese tech giant, Alibaba, which were ostensibly rented by Xiaomi. </p>
<p>The seasoned cybersecurity researcher found a worrying amount of his behavior was being tracked, whilst various kinds of device data were also being harvested, leaving Cirlig spooked that his identity and his private life was being exposed to the Chinese company.</p>
<p>Meanwhile, at Forbes’ request, cybersecurity researcher Andrew Tierney investigated further. He also found browsers shipped by Xiaomi on Google Play—Mi Browser Pro and the Mint Browser—were collecting the same data. Together, they have more than 15 million downloads, according to Google Play statistics.<br />
In response to the findings, Xiaomi said, “The research claims are untrue,” and “Privacy and security is of top concern,” adding that it “strictly follows and is fully compliant with local laws and regulations on user data privacy matters.” But a spokesperson confirmed it was collecting browsing data, claiming the information was anonymized so wasn’t tied to any identity. They said that users had consented to such tracking. </p>
<p>It’s the second time in two months that a huge Chinese tech company has been seen watching over users’ phone habits. A security app with a “private” browser made by Cheetah Mobile, a public company listed on the New York Stock Exchange, was seen collecting information on Web use, Wi-Fi access point names and more granular data like how a user scrolled on visited Web pages. Cheetah argued it needed to collect the information to protect users and improve their experience.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677106</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 May 2020 22:34:04 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677106</guid>
		<description><![CDATA[CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag
https://insinuator.net/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/]]></description>
		<content:encoded><![CDATA[<p>CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag<br />
<a href="https://insinuator.net/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/" rel="nofollow">https://insinuator.net/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677056</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 May 2020 20:04:19 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677056</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/shade-ransomware-shuts-down-releases-750k-decryption-keys/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/shade-ransomware-shuts-down-releases-750k-decryption-keys/" rel="nofollow">https://www.bleepingcomputer.com/news/security/shade-ransomware-shuts-down-releases-750k-decryption-keys/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1677054</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 May 2020 19:54:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1677054</guid>
		<description><![CDATA[https://www.tomshardware.com/news/steal-data-through-fan-vibrations-cybersecurity]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tomshardware.com/news/steal-data-through-fan-vibrations-cybersecurity" rel="nofollow">https://www.tomshardware.com/news/steal-data-through-fan-vibrations-cybersecurity</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/04/01/cyber-security-news-april-2020/comment-page-5/#comment-1676894</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 30 Apr 2020 09:11:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185994#comment-1676894</guid>
		<description><![CDATA[Android Phone Makers Improve Patching Practices
https://www.securityweek.com/android-phone-makers-improve-patching-practices

Android smartphone manufacturers have significantly improved their patching hygiene over the past couple of years, a new report from Security Research Labs reveals.

“We found that on average, for official firmwares released in 2019 missed only about half as many patches as comparable firmwares released in 2018,” the security firm says.

Monthly security updates are being integrated into firmware builds 15% faster than in 2018. Last year, 90% of unique firmware builds for major Android vendors arrived within 38 days of Google’s security patches.]]></description>
		<content:encoded><![CDATA[<p>Android Phone Makers Improve Patching Practices<br />
<a href="https://www.securityweek.com/android-phone-makers-improve-patching-practices" rel="nofollow">https://www.securityweek.com/android-phone-makers-improve-patching-practices</a></p>
<p>Android smartphone manufacturers have significantly improved their patching hygiene over the past couple of years, a new report from Security Research Labs reveals.</p>
<p>“We found that on average, for official firmwares released in 2019 missed only about half as many patches as comparable firmwares released in 2018,” the security firm says.</p>
<p>Monthly security updates are being integrated into firmware builds 15% faster than in 2018. Last year, 90% of unique firmware builds for major Android vendors arrived within 38 days of Google’s security patches.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
