menu
techminis

A naukri.com initiative

google-web-stories
source image

Wired

3d

read

195

img
dot

Image Credit: Wired

Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online

  • After senior Trump administration members mistakenly included The Atlantic editor Jeffrey Goldberg in a secret group chat about bombing Houthi targets in Yemen, encrypted messaging app Signal found itself at the center of a storm this week.
  • The incident labeled 'SignalGate' highlighted errors in handling sensitive information rather than flaws in the Signal app's security. Signal actually experienced a surge in US downloads following the news.
  • Amidst revelations from the Houthi group chat, national security adviser Mike Waltz left his Venmo account accessible to the public, exposing his connections, which could pose risks from foreign spies and hackers.
  • Der Spiegel reported that sensitive personal information of top Trump administration security officials, including passwords, phone numbers, and email addresses, was easily accessible online, potentially compromising their security.
  • The earthquake in Myanmar revealed how internet restrictions under the military junta hindered the dissemination of information about the disaster, hampering recovery and humanitarian efforts.
  • Alleged Snowflake hacker Connor Moucka agreed to be extradited to the US to face charges related to a massive data exfiltration incident involving the cloud storage company.
  • London is set to deploy its first permanent face recognition cameras, raising concerns among privacy advocates about the expansion of surveillance in the city.
  • Increased use of face recognition technology by UK police forces and the permanent installation of such cameras in London spark debates over privacy and potential widespread surveillance.
  • The handling of sensitive information and the risks posed by online exposure are key themes in recent security incidents involving high-level officials and technology.
  • Cybersecurity threats, privacy concerns, and the impact of surveillance technologies feature prominently in the evolving landscape of digital security.

Read Full Article

like

11 Likes

For uninterrupted reading, download the app