Sure. Google location tracking "bad" and Apple data harvesting "good", but it's pretty hack to see articles popping up about how poor Android trackers are compared to AirTags. https://somegadgetguy.com/b/46Q
Ignoring the security nightmare AirTags were at launch, the assumed permissions Apple just takes for the Find My network, and the annoying (and scary looking) process Apple forces users through to OPT OUT of location tracking, it's shocking how well Google is doing only a couple weeks into this new finder network going live.
And if you're only contribution to this criticism is an insufferable:
"Well Akshully AirTags wur teh MOIST secure becuz enkripshun!"
Then you're just a mockable slob who doesn't understand anything about security. Especially if you think the biggest threat or harm of the AirTag was:
"What if someone directly attacks the most secure part of Apple's data centers to crack open their entire location network, and sifts through all that data to discover my exact location!?!?!"
If you're really that obtuse, allow me to explain that you're being a massive douche nozzle.
Security researchers weren't concerned about AirTag encryption. We were concerned about someone sticking a tag to a car and tracking people without their knowledge.
From the recent security study on Apple WiFi and BT policies, all their data is dumped into a big bucket that can be accessed relatively easily.
You only need to call a few APIs to get enough location data from Apple devices to track populations of people, potentially down to individuals if they're using hotspots.
Last year, CrowdStrike published a report on a new crypto-mining operation that was targeting exposed Kubernetes systems with a miner for the Dero cryptocurrency token.
The Cyber Partisans say they hacked the Belarusian State University.
The group claims it obtained documents and audio records from the university's internal network showing how its leadership dismissed staff and students who participated in anti-government protests.
The files show that the university declined to admit new students who participated in protests and left comments online against the dictatorship.
Analyst1 has published a report that looks at the history of a ransomware operation named RansomHouse.
Researchers say the platform has been used by threat actors with links to ransomware gangs such as White Rabbit, Mario ESXi, RagnarLocker, and Dark Angels (Dunghill Leak).
Stylized 3D illustration for an early-2000s article in the Dutch PC-Active magazine, about a mobile phone virus. This was before smartphones were introduced. 🙂