<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Unlocking &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/unlocking/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Wed, 26 May 2021 01:23:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Who is the person behind the company that helped the FBI break the iPhone lock?</title>
		<link>https://en.spress.net/who-is-the-person-behind-the-company-that-helped-the-fbi-break-the-iphone-lock/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 26 May 2021 01:23:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Break]]></category>
		<category><![CDATA[Carphone Warehouse]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Dark]]></category>
		<category><![CDATA[Extract]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[helped]]></category>
		<category><![CDATA[Human right]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPO]]></category>
		<category><![CDATA[Israel s Ministry of Defense]]></category>
		<category><![CDATA[Israeli company]]></category>
		<category><![CDATA[Lock]]></category>
		<category><![CDATA[Ludwig Maximilian University]]></category>
		<category><![CDATA[Moxie Marlinspike]]></category>
		<category><![CDATA[Orange]]></category>
		<category><![CDATA[ORLANDO]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[San Bernardino]]></category>
		<category><![CDATA[Shootings]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[T Mobile]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[Unlocked]]></category>
		<category><![CDATA[Unlocking]]></category>
		<guid isPermaLink="false">https://en.spress.net/who-is-the-person-behind-the-company-that-helped-the-fbi-break-the-iphone-lock/</guid>

					<description><![CDATA[Cellebrite, the company loved by the British police, has stepped out of the shadows to prepare for an IPO. Yossi Carmil, one of the founders of iPhone jailbreak service provider Cellebrite. Photo: (Cellebrite) Kayleigh Haywood, a 15-year-old girl from Measham, Leicestershire, met her killer via Facebook. When the girl&#8217;s body was discovered, police used a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Cellebrite, the company loved by the British police, has stepped out of the shadows to prepare for an IPO.</strong><br />
<span id="more-18241"></span> Yossi Carmil, one of the founders of iPhone jailbreak service provider Cellebrite. Photo: (Cellebrite)</p>
<p> Kayleigh Haywood, a 15-year-old girl from Measham, Leicestershire, met her killer via Facebook. When the girl&#8217;s body was discovered, police used a special phone to unlock her device &#8211; which was locked and severely damaged &#8211; to extract information. The evidence obtained helps the police find the culprit, which is the neighbor Stepen Beardman. It also exonerated a suspect. Previously, this technology helped the FBI unlock the iPhone of the San Bernardino shooter after Apple refused to cooperate, as well as collect evidence after the shooting at a gay nightclub in Orlando. Florida (USA). Of course, there will be objections to a company that helps the government hack their phones. That makes Cellebrite, the Israeli company behind the jailbreak device, a target of attacks by human rights groups around the globe, who fear it could be used for wrongdoing. Yossi Carmil, one of the founders and CEOs of Cellebrite, says Cellebrite&#8217;s &#8220;moral compass&#8221; remains intact. He describes himself as &#8220;good people who support heroes in their work&#8221;, which is saving lives, maintaining peace in the community. Cellebrite was originally a company that provides backup, transfer and restore smartphone data, partnering with carriers such as Orange, T-Mobile, Carphone Warehouse. About 10% of their business comes from private companies that need to extract data from employees&#8217; phones for HR reasons, intellectual property theft or fraud investigations. Mr. Carmil, 54, has close ties to the military and police. He spent four years in the army, where he was a combat soldier and special forces officer. He called it a &#8220;proud&#8221; period. He used to work for the Israeli Defense Ministry before moving to Europe to live for 10 years, working at Bosch and Siemens. He spent most of this time in Germany, where he earned an MBA from Ludwig Maximilian University. He returned to his hometown of Israel after the death of his sister, later married and had three children. His 19-year-old eldest son Carmil is also serving in the army, currently stationed at the border between Israel and Gaza. Breaking encryption applications, violating user privacy, making Carmil&#8217;s image worse in the eyes of technology leaders. Moxie Marlinspike, CEO of the secure messaging app Signal, once published an article detailing a vulnerability that could change the content of messages when Cellebrite extracts them, damaging important evidence. However, Mr. Carmil said that exploitation of that vulnerability never happened in practice. For Mr. Carmil, the UK is an important market with about 50 law enforcement agencies using their technology. In addition to 17 sales and marketing staff in Europe, Cellebrite will hire more researchers and developers. In total, the company has about 300 employees, some of which have been brought in from other intelligence organizations and technology firms. When asked how to ensure their technology is not used against innocent people or human rights, Mr Carmil said &#8220;it is my responsibility not to let the tools of power fall into the wrong hands&#8221;. Cellebrite has a legal department that writes policy and a compliance officer who reports directly to the CEO. Prior to the initial public offering, Cellebrite also established an independent ethics committee to prosecute Cellebrite for violations. Mr. Carmil said the company controls every license it sells remotely and can disable and blacklist any license, even when there is little doubt. Cellebrite is banned from selling technology to Iraq, Lebanon, and Palestine. Recently, they decided to stop selling to Russia, Belarus and China. Often known as a shady company, silenced by secret contracts, Mr. Carmil wants more transparency ahead of the IPO. <strong> Du Lam </strong> (According to Telegraph)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18241</post-id>	</item>
		<item>
		<title>The DarkSide hacker group received $90 million worth of bitcoins from the victim before disappearing</title>
		<link>https://en.spress.net/the-darkside-hacker-group-received-90-million-worth-of-bitcoins-from-the-victim-before-disappearing/</link>
		
		<dc:creator><![CDATA[Thu Thắm]]></dc:creator>
		<pubDate>Sun, 23 May 2021 18:52:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bitcoins]]></category>
		<category><![CDATA[Close the door]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[DarkSide]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Disappear]]></category>
		<category><![CDATA[disappearing]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[ELLIPTIC]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel 471]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pull down]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[received]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Tom Robinson]]></category>
		<category><![CDATA[Unlocking]]></category>
		<category><![CDATA[Value]]></category>
		<category><![CDATA[Victim]]></category>
		<category><![CDATA[victims]]></category>
		<category><![CDATA[worth]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-darkside-hacker-group-received-90-million-worth-of-bitcoins-from-the-victim-before-disappearing/</guid>

					<description><![CDATA[DarkSide, the hacker organization behind the Colonial Pipeline&#8217;s network crash, received $90 million worth of bitcoins from victims before shutting down its operations last week. DarkSide is a famous hacker organization that caused the collapse of the largest fuel pipeline system in the US operated by Colonila Pipeline company. After this incident, they disappeared, but [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>DarkSide, the hacker organization behind the Colonial Pipeline&#8217;s network crash, received $90 million worth of bitcoins from victims before shutting down its operations last week.</strong><br />
<span id="more-17648"></span> DarkSide is a famous hacker organization that caused the collapse of the largest fuel pipeline system in the US operated by Colonila Pipeline company. After this incident, they disappeared, but before that they were able to extort and receive from many victims $ 90 million worth of bitcoins.</p>
<p> This hacker organization has received ransom from many victims. This shows that data ransom attacks have become a lucrative business for cybercriminals. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_365_38931872/03d1f6cded8f04d15d9e.jpg" width="625" height="375"> <em> Bitcoin is increasingly preferred by criminal organizations </em> Earlier this month, Colonial Pipeline suffered a severe attack that forced the company to shut down nearly all of its fuel system supplying the southeastern states of the United States. The FBI confirmed the crime was DarkSide, a cybercrime organization believed to be located in Eastern Europe. Last week, it was reported that Colonial had agreed to pay $ 5 million to DarkSide (in bitcoin) for the data recovery password. Recently, the CEO of the company confirmed this information. DarkSide operates like a business. This group develops malicious code to crack and steal the target&#8217;s data, then trains partners, the partners continue to train the hackers. When hackers use this malicious code to carry out successful missions, DarkSide will receive a percentage of those successful attacks. In March 2021, when it announced a new software that can crack data faster than before, DarkSide even released a press release and invited reporters to interview. Hackers often demand ransom in virtual currency. London-based blockchain analytics firm Elliptic has identified a bitcoin wallet that DarkSide uses to receive ransoms from victims. On May 14, London-based blockchain analytics firm Elliptic said it had identified a bitcoin wallet used by DarkSide to collect ransoms from victims. That same day, Intel 471 security researchers said DarkSide closed after losing access to its servers and when the organization&#8217;s virtual currency wallets were empty. According to Elliptic, DarkSide and other affiliates of this organization have collected at least $90 million in bitcoin ransoms, and they receive funds through 47 different digital wallets. “To our knowledge, this analysis includes all payments to DarkSide,” said Tom Robinson, Elliptic co-founder and chief scientist. However, there may be other undetected transactions, so this $90 million figure should be considered the lowest limit.” Also according to Elliptic&#8217;s research, DarkSide&#8217;s bitcoin wallet was holding $5.3 million in cryptocurrency before it was all withdrawn last week. There are some rumors that these bitcoins have been seized by the US government. Of the $90 million ransom, $15.5 million went to the developers of DarkSide and $74.7 million to affiliates. Much of that is being sent to cryptocurrency exchanges and thereby converted into fiat. Bitcoin is increasingly preferred by criminal organizations as crypto traders do not reveal their identities. However, because the digital ledger that underpins bitcoin is public, researchers can keep track of where these funds are going.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17648</post-id>	</item>
		<item>
		<title>Hacked AirTags can lead users to malicious websites</title>
		<link>https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</link>
		
		<dc:creator><![CDATA[Thục Anh (TH)]]></dc:creator>
		<pubDate>Thu, 13 May 2021 13:19:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[AirTags]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Jailbreak]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost Mode]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Microcontrollers]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Thomas Roth]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Unlocking]]></category>
		<category><![CDATA[Use]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Video sharing]]></category>
		<category><![CDATA[Wallet]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</guid>

					<description><![CDATA[A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device. Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230; With Lost Mode enabled, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device.</strong><br />
<span id="more-13793"></span> Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230;</p>
<p> With Lost Mode enabled, AirTag will send out a signal to one of the billions of Apple devices around the globe, then send a notification about the user&#8217;s iPhone to they visit Apple&#8217;s location site (found.apple.com) so that users know the AirTag&#8217;s location. Researcher Thomas Roth recently shared a video of his work on AirTag&#8217;s performance and progress. Specifically, when the owner of AirTag turns on the loss of device notification, if an iPhone is near, the iPhone will be prompted to visit the page &#8220;found.apple.com&#8221;. However, with the affected AirTag, the iPhone displayed the researcher&#8217;s website. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_236_38813981/c3d01e8300c1e99fb0d0.jpg" width="625" height="351"> <em> AirTag is a newly launched accessory from Apple</em> Thomas Roth said he hacked into AirTag&#8217;s microcontroller, then &#8220;flashed&#8221; the component again to modify the device&#8217;s performance. It took hours to run and caused two AirTags to fail, before succeeding. However, to perform the hack shown by Thomas Roth is not easy, as hackers need to intervene directly in the AirTag without the user&#8217;s discovery. But this is proof that AirTag has been hacked and can intervene, similar to the form of &#8220;jailbreak&#8221; on the iPhone, which means that a device as compact as AirTag also poses a potential security risk. security, requires Apple to have solutions to enhance security on its device.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13793</post-id>	</item>
	</channel>
</rss>