Eight years after a researcher warned WhatsApp that it was doable to extract consumer cellphone numbers en masse from the Meta-owned app, one other workforce of researchers discovered that they may nonetheless do precisely that utilizing the same approach. The problem stems from WhatsApp’s discovery characteristic, which permits somebody to enter an individual’s cellphone quantity to see in the event that they’re on the app. By doing this billions of instances—which WhatsApp didn’t forestall—researchers from the College of Vienna uncovered what they’re calling “probably the most in depth publicity of cellphone numbers” ever.
Vaping is a serious drawback in US excessive faculties. However is the answer to spy on college students within the rest room? An investigation by The 74, copublished with WIRED, discovered that faculties across the nation are turning to vape detectors in an effort to crack down on nicotine and hashish consumption on faculty grounds. A few of the vape detectors go far past detecting vapor by together with microphones which are surprisingly correct and revealing. Whereas few defend habit and drug use, even non-vapers say the added surveillance and the punishments that end result go too far.
Don’t look now, however that previous networking tools your organization hasn’t thought of in years might bounce out and chunk you. Tech large Cisco this week launched a brand new initiative, warning firms that AI instruments are making it more and more easy for attackers to seek out vulnerabilities in outdated and unpatched networking infrastructure. The message: Improve or else.
Should you’ve ever attended a convention, you in all probability fearful about getting sick within the cesspools which are a convention middle. However one hacker convention in New Zealand, Kawaiicon, invented a novel option to maintain attendees somewhat bit safer. By monitoring the CO2 ranges in every convention room, Kawaiicon’s organizers had been capable of create a real-time air-quality monitoring system, which might inform folks which rooms had been secure and which appeared … gross. The challenge brings new which means to antivirus monitoring.
And that’s not all. Every week, we spherical up the safety and privateness information we didn’t cowl in depth ourselves. Click on the headlines to learn the total tales. And keep secure on the market.
The US Border Patrol is working a predictive-intelligence program that screens tens of millions of American drivers far past the border, in keeping with an in depth investigation by the Related Press. A community of covert license-plate readers—typically hidden inside site visitors cones, barrels, and roadside tools—feeds knowledge into an algorithm that flags “suspicious” routes, fast turnarounds, and journey to and from border areas. Native police are then alerted, leading to site visitors stops for minor infractions like window-tint violations, air fresheners, or marginal dashing. AP reviewed police information exhibiting that drivers had been questioned, searched, and typically arrested regardless of no contraband being discovered.
Inner group chats obtained by means of public-records requests present Border Patrol brokers and Texas deputies sharing lodge information, rental automotive standing, residence addresses, and social media particulars of US residents in actual time whereas coordinating what officers name “whisper stops” to obscure federal involvement. The AP recognized plate-reader websites greater than 120 miles from the Mexican border within the Phoenix space, in addition to areas in metropolitan Detroit and close to the Michigan-Indiana line that seize site visitors headed towards Chicago and Gary. Border Patrol additionally faucets DEA plate-reader networks and has, at varied instances, accessed methods run by Rekor, Vigilant Options, and Flock Security.
CBP says this system is ruled by “stringent” insurance policies and constitutional safeguards, however authorized specialists advised AP that its scale raises new Fourth Modification issues. A UC Legislation San Francisco official mentioned the system quantities to a “dragnet” monitoring Individuals’ actions, associations, and each day routines.
Microsoft claims to have mitigated the most important distributed denial-of-service (DDoS) assault ever recorded in a cloud atmosphere—a 15.72 Tbps, 3.64-billion-pps barrage launched on October 24 in opposition to a single Azure endpoint in Australia. Microsoft says The assault “originated from the Aisuru botnet,” a Turbo-Mirai–class IoT community of compromised residence routers, cameras, and different client units. Greater than 500,000 IP addresses are mentioned to have participated, producing a large DDoS assault with little spoofing. Microsoft says its international Azure DDoS Safety community absorbed the site visitors with out service disruption. Microsoft described the assault because the “the most important DDoS ever noticed within the cloud,” emphasizing the only endpoint; nevertheless, Cloudflare additionally not too long ago reported a 22.2 Tbps flood, naming it the most important DDoS assault ever seen.
Researchers notice that Aisuru has not too long ago launched a number of assaults exceeding 20 Tbps and is increasing its capabilities to incorporate credential stuffing, AI-driven scraping, and HTTPS floods by way of residential proxies.
The US Securities and Alternate Fee has dropped its remaining claims in opposition to SolarWinds and its CISO, Tim Brown, ending a long-running case over the corporate’s 2020 supply-chain hack, by which Russian SVR operatives allegedly compromised SolarWinds’ Orion software program and triggered widespread breaches throughout authorities and business. The company’s lawsuit—filed in 2023 and centered on alleged fraud and internal-control failures—had already been principally dismantled by a federal decide in 2024. SolarWinds known as the total dismissal a vindication of its argument that its disclosures and conduct had been acceptable and mentioned it hopes the result eases issues amongst CISOs in regards to the case’s potential chilling impact.
Legislation enforcement information present that the FBI accessed messages from a personal Sign group utilized by New York immigration court-watch activists—a community that coordinates volunteers monitoring public hearings at three federal immigration courts. Based on a two-page FBI/NYPD “joint situational info report” dated August 28, 2025, brokers quoted chat messages, labeled the nonviolent court docket watchers as “anarchist violent extremist actors,” and circulated the evaluation nationwide. The report didn’t clarify how the FBI penetrated an encrypted Sign group, but it surely claimed the knowledge got here from a “delicate supply with glorious entry.”
The paperwork, first reported by the Guardian, had been unique obtained by the government-transparency group Property of the Folks. They describe activists discussing methods to enter courtrooms, movie officers, and collect figuring out particulars of federal personnel, however present no proof to help the FBI’s allegation {that a} member beforehand advocated violence. A separate set of information—additionally obtained by the group—reveals the bureau framed abnormal remark of public immigration hearings as a possible risk, at the same time as Immigration and Customs Enforcement has escalated courthouse arrests and set what advocates name “deportation traps.” Civil liberties specialists advised the paper that the surveillance mirrors earlier FBI campaigns concentrating on lawful dissent and dangers chilling protected political exercise.
