{"id":20224,"date":"2025-07-08T06:35:45","date_gmt":"2025-07-08T06:35:45","guid":{"rendered":"http:\/\/thisbiginfluence.com\/?p=20224"},"modified":"2025-07-08T06:35:45","modified_gmt":"2025-07-08T06:35:45","slug":"android-may-soon-warn-you-about-fake-cell-towers","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=20224","title":{"rendered":"Android May Soon Warn You About Fake Cell Towers"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<figure class=\"CneAudioEmbedFigure-bRoyFa cjLQOE\"\/>\n<p class=\"paywall\"><span class=\"lead-in-text-callout\">Lately,<\/span> North Korea has deployed <a href=\"https:\/\/www.wired.com\/story\/north-korea-stole-your-tech-job-ai-interviews\/\">thousands of so-called IT workers to infiltrate Western businesses<\/a>, receives a commission salaries, and ship a reimbursement to help the regime. Because the schemes have turn out to be extra profitable, they&#8217;ve grown <a href=\"https:\/\/www.wired.com\/story\/north-korean-it-worker-scams-exposed\/\">increasingly elaborate<\/a> and employed new techniques to evade detection.<\/p>\n<p class=\"paywall\">However this week, america Justice Division revealed one among its largest operations to sort out IT employees to this point. The DOJ says it has <a href=\"https:\/\/www.wired.com\/story\/identities-of-80-plus-americans-stolen-for-north-korean-it-worker-scams\/\">identified six Americans who allegedly helped enable<\/a> the schemes and has arrested one among them. Legislation enforcement officers searched 29 \u201claptop computer farms\u201d in 16 states and seized greater than 200 computer systems, in addition to internet domains and monetary accounts.<\/p>\n<p class=\"paywall\">In the meantime, a bunch of younger cybercriminals has been inflicting chaos around the globe, leaving grocery shops empty and briefly grounding some flights within the wake of their crippling cyberattacks. After a quiet interval in 2024, the <a href=\"https:\/\/www.wired.com\/story\/scattered-spider-most-imminent-threat\/\">Scattered Spider hackers have returned this year<\/a> and are ruthlessly focusing on retailers, insurers, and airways.<\/p>\n<p class=\"paywall\">Additionally this week, we\u2019ve detailed how <a href=\"https:\/\/www.wired.com\/story\/the-promise-and-peril-of-digital-security-in-the-age-of-dictatorship\/\">LGBTIQ+ organizations in El Salvador<\/a> are serving to activists chronicle assaults towards their group and higher defend themselves towards state surveillance.<\/p>\n<p class=\"paywall\">And there\u2019s extra. Every week, we spherical up the safety and privateness information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the complete tales. And keep secure on the market.<\/p>\n<p class=\"paywall\">Cell-site simulators, typically generally known as <a href=\"https:\/\/www.wired.com\/story\/2024-dnc-cell-site-simulator-phone-surveillance\/\">stingrays or IMSI catchers<\/a>, are a few of the most stealthy and highly effective surveillance instruments in operation immediately. The gadgets, which impersonate cell towers and intercept communications, can acquire name metadata, location info, and different site visitors about what you do in your gadgets. They\u2019ve more and more been used <a href=\"https:\/\/www.aclu.org\/news\/immigrants-rights\/ice-records-confirm-that-immigration-enforcement-agencies-are-using-invasive-cell-phone-surveillance-devices\">by law enforcement and immigration officials<\/a>.<\/p>\n<p class=\"paywall\">Nevertheless, in response to reporting from <a data-offer-url=\"https:\/\/www.androidauthority.com\/android-16-mobile-network-security-3571497\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.androidauthority.com\/android-16-mobile-network-security-3571497\/&quot;}\" href=\"https:\/\/www.androidauthority.com\/android-16-mobile-network-security-3571497\/\" rel=\"nofollow noopener\" target=\"_blank\">Android Authority<\/a> and <a href=\"https:\/\/arstechnica.com\/gadgets\/2025\/06\/future-android-phones-could-warn-you-about-data-stealing-fake-cell-towers\/\">Ars Technica<\/a>, upcoming {hardware} advances has led to Google upping its efforts to fight the potential snooping. Beginning in <a href=\"https:\/\/www.wired.com\/story\/android-16-features-release-date-how-to-download\/\">Android 16<\/a>, suitable gadgets will be capable of establish when networks request gadget identifiers, corresponding to gadget or SIM IDs, and problem alerts if you end up connecting to a non-encrypted cell community. Examples of alerts present warnings that \u201ccalls, messages, and knowledge are susceptible to interception\u201d when related to insecure networks. There may also be notifications while you transfer again to an encrypted community. An choice to activate these notifications seems on a cell community safety settings web page alongside the choice to keep away from 2G networks, which may assist block some IMSI catchers from connecting to your gadget. Nevertheless, whereas the settings will reportedly be out there in Android 16, it might take a while for Android gadgets to broadly use the required {hardware}.<\/p>\n<p class=\"paywall\">Forward of the presidential election final November, Iran-linked <a href=\"https:\/\/www.fbi.gov\/news\/press-releases\/joint-odni-fbi-and-cisa-statement-on-iranian-election-influence-efforts\">hackers attacked<\/a> Donald Trump\u2019s presidential marketing campaign and stole scores of emails in an obvious bid to affect the election outcomes. A few of the emails had been distributed to journalists and the <a data-offer-url=\"https:\/\/www.theguardian.com\/us-news\/2024\/sep\/19\/iran-sent-hacked-trump-documents-to-biden-campaign-fbi-says\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/us-news\/2024\/sep\/19\/iran-sent-hacked-trump-documents-to-biden-campaign-fbi-says&quot;}\" href=\"https:\/\/www.theguardian.com\/us-news\/2024\/sep\/19\/iran-sent-hacked-trump-documents-to-biden-campaign-fbi-says\" rel=\"nofollow noopener\" target=\"_blank\">Biden campaign<\/a>. This week, following the Israel-Iran battle and US intervention with <a href=\"https:\/\/www.wired.com\/story\/iran-fordow-nuclear-site-satellite-images-damage\/\">\u201cbunker-buster\u201d bombs<\/a>, the hackers behind the e-mail compromise reemerged, <a href=\"https:\/\/www.reuters.com\/legal\/government\/iran-linked-hackers-threaten-release-trump-aides-emails-2025-06-30\/\">telling Reuters<\/a> that they might disclose or promote extra of the stolen emails.<\/p>\n<p class=\"paywall\">The cybercriminals claimed they&#8217;d stolen 100 GB of emails, together with some from Susie Wiles, the White Home chief of employees. The cache of emails additionally allegedly consists of these from Lindsey Halligan, a Trump lawyer, adviser Roger Stone, and grownup movie star Stormy Daniels. The hackers, who&#8217;ve used the title Robert, advised Reuters they wished to \u201cbroadcast this matter.\u201d It&#8217;s unclear whether or not they&#8217;ll act upon the threats.<\/p>\n<p class=\"paywall\">In response, US officers claimed that the risk from the hackers was a \u201ccalculated smear marketing campaign\u201d by a overseas energy. \u201cA hostile overseas adversary is threatening to illegally exploit purportedly stolen and unverified materials in an effort to distract, discredit, and divide,\u201d Marci McCarthy, a spokesperson for the Cybersecurity and Infrastructure Safety Company, <a href=\"https:\/\/apnews.com\/article\/iran-cyberattacks-trump-hacking-8c5464b7e7c7dd8986830075e3e0baff\">said in a statement<\/a>.<\/p>\n<p class=\"paywall\">Over the previous few years, <a href=\"https:\/\/www.wired.com\/story\/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers\/\">Chinese hacker group Salt Typhoon<\/a> has been on a hacking rampage towards US telecoms networks, efficiently breaking into not less than 9 companies and getting access to Individuals\u2019 texts and calls. Brett Leatherman, the just lately appointed chief of the FBI\u2019s cyber division, <a data-offer-url=\"https:\/\/cyberscoop.com\/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/cyberscoop.com\/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks\/&quot;}\" href=\"https:\/\/cyberscoop.com\/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks\/\" rel=\"nofollow noopener\" target=\"_blank\">tells Cyberscoop<\/a> that the Chinese language hackers are actually \u201clargely contained\u201d and mendacity \u201cdormant\u201d within the networks. The teams haven&#8217;t been kicked out of networks, Leatherman stated, because the longer they&#8217;re within the methods there are extra methods they&#8217;ll discover to \u201ccreate factors of persistence.\u201d \u201cProper now, we\u2019re very centered on resilience and deterrence and offering vital help to victims,\u201d Leatherman stated.<\/p>\n<p class=\"paywall\">Deepfake platforms that permit folks to create nonconsensual, typically unlawful, dangerous pictures of girls with out garments on have boomed lately. Now a former whistleblower and leaked paperwork from one of many largest so-called <a href=\"https:\/\/www.wired.com\/story\/ai-deepfake-nudify-bots-telegram\/\">\u201cnudify\u201d apps<\/a>, Clothoff, claims the service has a multimillion-euro finances and is planning an aggressive growth the place it&#8217;ll create nonconsensual express pictures of celebrities and influencers, in response to reporting by <a data-offer-url=\"https:\/\/www.spiegel.de\/international\/zeitgeist\/using-ai-to-humiliate-women-the-men-behind-deepfake-pornography-a-0de338f9-9cec-4ae8-a5ef-9a356b0a5bd4\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.spiegel.de\/international\/zeitgeist\/using-ai-to-humiliate-women-the-men-behind-deepfake-pornography-a-0de338f9-9cec-4ae8-a5ef-9a356b0a5bd4&quot;}\" href=\"https:\/\/www.spiegel.de\/international\/zeitgeist\/using-ai-to-humiliate-women-the-men-behind-deepfake-pornography-a-0de338f9-9cec-4ae8-a5ef-9a356b0a5bd4\" rel=\"nofollow noopener\" target=\"_blank\">German publication Der Spiegel<\/a>. The alleged growth has a advertising finances of \u20ac150,000 (round $176,000) per nation to advertise the pictures of celebrities and influencers, in response to the report. It says greater than \u201cthree dozen folks\u201d work for Clothoff, and the publication recognized a few of the potential key operators of the platform. Paperwork uncovered on-line additionally revealed buyer e mail addresses. A spokesperson who claimed to characterize Clothoff denied there have been greater than 30 folks as a part of the central crew and <a data-offer-url=\"https:\/\/www.spiegel.de\/international\/zeitgeist\/using-ai-to-humiliate-women-the-men-behind-deepfake-pornography-a-0de338f9-9cec-4ae8-a5ef-9a356b0a5bd4\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.spiegel.de\/international\/zeitgeist\/using-ai-to-humiliate-women-the-men-behind-deepfake-pornography-a-0de338f9-9cec-4ae8-a5ef-9a356b0a5bd4&quot;}\" href=\"https:\/\/www.spiegel.de\/international\/zeitgeist\/using-ai-to-humiliate-women-the-men-behind-deepfake-pornography-a-0de338f9-9cec-4ae8-a5ef-9a356b0a5bd4\" rel=\"nofollow noopener\" target=\"_blank\">told Der Spiegel<\/a> it doesn&#8217;t have a multimillion-euro finances.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/android-may-soon-warn-you-about-fake-cell-towers\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lately, North Korea has deployed thousands of so-called IT workers to infiltrate Western businesses, receives a commission salaries, and ship a reimbursement to help the regime. Because the schemes have turn out to be extra profitable, they&#8217;ve grown increasingly elaborate and employed new techniques to evade detection. However this week, america Justice Division revealed one [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":20226,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[3718,3583,1184,13645,2475],"class_list":["post-20224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-android","tag-cell","tag-fake","tag-towers","tag-warn"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/20224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20224"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/20224\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/20226"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=20224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=20224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}