April 22, 2025
Blockchain

Chrome Vulnerability, Internet Restrictions and Other Cybersecurity Incidents

  • July 9, 2022
  • 0

We brought together the most important news of the week from the world of cyber security. Experts have calculated that government restrictions on the Internet in 2022 cost

Chrome Vulnerability, Internet Restrictions and Other Cybersecurity Incidents

Chrome Vulnerability, Internet Restrictions and Other Cybersecurity Incidents
Chrome Vulnerability, Internet Restrictions and Other Cybersecurity Incidents

We brought together the most important news of the week from the world of cyber security.

  • Experts have calculated that government restrictions on the Internet in 2022 cost the economy $10 billion.
  • Apple announced Lockdown Mode to protect users from spyware.
  • Chrome developers have released an unscheduled update that fixes a 0-day vulnerability.

Report: Internet restrictions cost global economy $10 billion in 2022

Top10VPN researchers have calculated that various online restrictions by governments cost the global economy $10.1 billion in 2022.

The most serious cases of Internet restrictions were recorded in the Russian Federation. They are associated with blocking almost all of the world’s most popular social networks. The cuts cost $8.78 billion.

Data: Top10VPN.

In total, analysts recorded 54 cases of Internet restrictions in 16 countries this year. In total, since 2019, various Internet outages have cost the economy more than $27 billion.

Apple provides additional protection for users against spyware

Apple has announced the introduction of a new Lockdown Mode feature designed to protect users from the spread of spyware.

It will be implemented in the fall on iOS 16, iPadOS 16, and macOS Ventura. First of all, it is aimed at users who could be potential targets of various spyware, such as journalists and human rights activists.

When running in Lockdown Mode, most file types are blocked, except images in messages, and link previews are disabled.

Additionally, Apple will provide a $10 million grant to support cybersecurity initiatives focused on spyware research.

Former Facebook employee announces the existence of a protocol that allows employees to recover data deleted by users

Former Facebook content reviewer Brennan Lawson said she was fired for raising the alarm about the company’s protocol to allow employees to recover user-deleted data. Bloomberg writes about it.

According to him, social networkers can “bypass Facebook’s privacy protocols” by getting information from Messenger that “users choose to delete”. Lawson said this violated EU digital data privacy rules and the Federal Trade Commission’s requirement that Facebook accurately inform users about its data retention policies.

He added that the protocol is mainly used to provide information to law enforcement.

Chrome releases an unscheduled update that fixes the 0-day vulnerability

Google developers have released an update for the Chrome browser. Fixes a zero-day vulnerability already exploited by attackers.

Roskomnadzor blocks Swisscows’ secure mail service

Russia has restricted access to the secure mail service from Swisscows. Roskomnadzor claimed that false messages about mining were sent through it.

Swisscows is known as a search engine that does not store user search queries. In 2022, the company launched its own privacy-focused VPN and email service.

AstraLocker ransomware has stopped working. Operators have released decryption tools

AstraLocker ransomware operators announced that they are no longer working and have released decryption tools. Reported by Bleeping Computer.

“The fun always ends sooner or later,” one of the malware’s operators told reporters. He added that he would stop making ransomware and move on to crypto theft.

Also on ForkLog:

What to read on the weekend?

We’re talking about how social grading works in China – a system that scares human rights activists like they’ve stepped out of the pages of dystopian novels.

Read ForkLog bitcoin news in our Telegram – cryptocurrency news, courses and analysis.

Source: Fork Log

Leave a Reply

Your email address will not be published. Required fields are marked *