Welcome to the latest copy of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we analyze the wild world of security.

A few months ago, I wrote about how the Indian government absolved fears of mass surveillance in acknowledgment to apropos that its proposed facial acceptance system lacks able oversight.

But as the country’s basic was gripped by common violence last month, it appears that law administration agencies active the tech to identify more than 1,100 individuals who were allegedly complex in riots and agitated protests.

“We are using face acceptance software to analyze people behind the violence,” India’s home abbot Amit Shah said. “We have also fed Aadhaar (personal character numbers based on an individual’s biometric and demographic data) and active authorization data into this software, which has articular 1,100 people. Out of these, 300 people came from [the north Indian state of] Uttar Pradesh to carry out violence.”

webrokThis is not the first time the tech has been adopted in India, though. It’s been active by police forces during parades, and once at a political rally beforehand this year to screen crowds. The Delhi police force uses facial acceptance software called AI Vision to analyze suspects in real-time.

What’s more, police in Uttar Pradesh used the technology — called Police Artificial Intelligence System (PAIS) developed by Indian startup Staqu — during protests adjoin a arguable citizenship law that critics say marginalizes Muslims.

Although this acceptance is huge, here’s the problem: From a legal point of view, India currently lacks absolute regulations that spell out amenable uses of such technology. Even worse is the lack of accord that stems from administration Aadhaar data with law enforcement.

As the government works appear creating a civic database to match images captured from CCTV cameras with absolute databases, the need for proper blank is a must to assure alone aloofness and anticipate innocent people from being arrested.


Do you have a afire cybersecurity question, or a aloofness botheration you need help with? Drop them in an email to me, and I’ll altercate it in the next newsletter! Now, onto more aegis news.

What’s trending in security?

It was only time before hackers abstruse how to exploit the Coronavirus pandemic to administer malware. In the past two weeks, more bad apps were booted from Apple and Google’s app stores, and T-Mobile, Virgin Media, Uber, Walgreens and bearding social media app Whisper suffered data leaks.

  • Be safe online and offline. As coronavirus becomes a pandemic, baddies are taking advantage of the bearings by overextension malware bearded as a “Coronavirus map” that activates an advice actor called “AZORult.” [TNW via Reason Cybersecurity]
  • Your VPN and adblocker apps could be aperture your internet cartage casual through the phone, abode app analytics firm Sensor Tower. But the aggregation said it “only collects anonymized usage and analytics data.” [Buzzfeed News]
  • The crypto wars are back again: US assembly are blame advanced with the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act (aka EARN IT) that aims to accomplish standards to assure accouchement from sexual corruption online, but at the cost of data privacy. Match Group, which owns dating apps like Match, Tinder, OkCupid, and Hinge, said it will abutment the act. [CNET / Match Group]
  • More cases of bad apps: Banjo, an AI-powered surveillance insights firm, used a shadow aggregation to push benign-looking Android and iOS apps that secretly aching users’ social media accounts. In a agnate case, Clean Master, an Android aegis app with 1 billion downloads, was pulled from the Google Play Store after it was found recording users web browsing activities. Avast was caught not long ago affairs the same thing. What’s more, attackers are making user of hidden apps to get malware on mobile devices. [Motherboard / Forbes / TechRepublic]
  • Do you own a Samsung phone and have a Samsung account? It’s axis on binding 2FA for all new logins after advice a “small” data breach that afflicted a scattering of customers. It’s, however, SMS based. At this point, there is no excuse for not administration 2FA for every annual you value. [Forbes]
  • LGBTQ dating app Grindr has been sold by its Chinese owner Kunlun to broker firm San Vicente Acquisition for $608.5 actor after a US government board bidding civic aegis apropos that Kunlun’s buying of Grindr was a civic aegis risk. [The Financial Times]
  • Bad passwords are a thing within the CIA too. And the countersign for its clandestine hacking tools? “123ABCdef” [The Register]


  • Google location data turned an innocent biker into a break-in doubtable just because he had passed the victim’s house three times within an hour. [NBC News]
  • Researchers detail how Android apps can steal ancient 2FA codes from Google Authenticator by taking screenshots — a flaw that was first appear in 2014. ThreatFabric apparent “Cerberus” to be the first-ever Android malware that was base this abode to steal 2FA codes from the authenticator app. [ThreatFabric / Nightwatch Cybersecurity]
  • Consumer babysitter Which? has afflicted that two in five Android accessories are no longer accepting vital aegis updates from Google, putting them at greater risk of malware or other aegis flaws. [Which?]
  • Freshly appear analysis baldheaded assorted flaws in Intel and AMD CPUs that could expose acute data, inject approximate code (called Load Value Injection) and accommodation the aegis features. While AMD downplayed the threat, Intel appear a patch to abode the LVI vulnerability.  [Positive Technologies / The Hacker News / Intel]
  • As malware authors race to advance more catlike tools, Patrick Wardle, a former hacker for the Civic Aegis Agency, approved how easy it is to steal and then re-purpose a rival’s code. [Ars Technica]


  • A assimilation tester wanted to test the defenses of a South Dakota correctional adeptness in 2014 and his mom volunteered for the job. She not only managed to fake her way in, but also acquainted awful USB sticks into prison computers, giving him remote access to the systems. [WIRED]
  • Here’s a new tool that lets you open any email attachments after any fear of malware. What’s more, it’s open-source. [Dangerzone]
  • Researchers found problems in how Toyota, Hyundai, and Kia handle encryption in car immobilizers, acceptance an antagonist to accidentally start the engine and then drive away. [WIRED]
  • An old story, but still accordant given the spate of ransomware attacks. “Like a man going through community with cocaine trickling out of his pants leg”, Bloomberg’s Drake Bennett managed to demolition his editor with ransomware he found on the dark web. [Bloomberg]
  • Microsoft along with ally across 35 countries took down Necurs, one of the most abounding spam and malware botnets known to date that’s believed to have adulterated more than nine actor computers worldwide. [Microsoft]
  • The past two weeks in data breaches and leaks: Clearview AI (yes, that controversial facial acceptance startup), T-Mobile, Uber, Virgin Media, Visser, Walgreens, and Whisper.

Data Point

Did you know hacking victims are apprehension cyberattacks faster? We apparently have GDPR to thank for that. According to FireEye Mandiant M-Trends 2020 Report, organizations have gotten better at award and absolute attackers faster.

The global median dwell time, which is afflicted as the number of days an antagonist is present in a victim arrangement before they are detected, has gone down from 416 days in 2011 to 56 days in 2019. In the European Union, the median dwell time fell from 177 days in 2018 to just 54 days — a 77% decrease. Also of note: more victims are being notified by an alien party, rather than the alignment anecdotic the aegis adventure on its own.

GDPR regulations authorization that afflicted organizations report the breach to the accordant data aegis ascendancy within 72 hours of the adventure coming to light.
webrokTakeaway: Data breaches are abominably acceptable a part of life in the 21st century. It only means that companies need to take aegis actively and invest more in deepening their cybersecurity defenses.

“Security capability validation using purple team and red team contest is one of the best ways for organizations to appraise and test their security,” FireEye said. “By going up adjoin real-world attackers, aegis teams can assess their own adeptness to detect and acknowledge to an active antagonist scenario. Acknowledgment address assessments and adventure acknowledgment tabletop contest also help advance preparedness.”

That’s it. See you all in a couple of days. Stay safe!


Read next: Your next Amazon Prime commitment might take up to a month

Corona coverage

Read our daily advantage on how the tech industry is responding to the coronavirus and subscribe to our weekly newsletter Coronavirus in Context.