<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber security &#8211; Cincy Link</title>
	<atom:link href="https://cincylink.com/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://cincylink.com</link>
	<description>Explore Cincy</description>
	<lastBuildDate>Fri, 07 Jul 2023 04:18:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://cincylink.com/pub/content/uploads/sites/27/2020/03/apple-touch-icon-precomposed-100x100.png</url>
	<title>cyber security &#8211; Cincy Link</title>
	<link>https://cincylink.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Maryland student&#8217;s book encourages girls to take computer science</title>
		<link>https://cincylink.com/2023/07/07/maryland-students-book-encourages-girls-to-take-computer-science/</link>
					<comments>https://cincylink.com/2023/07/07/maryland-students-book-encourages-girls-to-take-computer-science/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 07 Jul 2023 04:18:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[computer science]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity club]]></category>
		<category><![CDATA[Grace Brehm]]></category>
		<category><![CDATA[high school]]></category>
		<category><![CDATA[Loyola Blakefield]]></category>
		<category><![CDATA[mdnd]]></category>
		<category><![CDATA[Notre Dame Preparatory School]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[STEM education]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Towson]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=166870</guid>

					<description><![CDATA[11 NEWS HAS HER STORY. BREANA: FROM A YOUNG AGE, GRACE HAS HAD A KNACK FOR TECHNOLOGY AND COMPUTER SCIENCE. &#62;&#62; I THINK IT WAS MOSTLY MY DAD BEING AN ENGINEER AND HE WAS ALWAYS TALKING TO US ABOUT CIRCUITS AND I WAS ALWAYS WONDERING HOW THINGS WORK BREANA: GRACE TOOK THE INTEREST TO HIGH &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<p>
											11 NEWS HAS HER STORY. BREANA: FROM A YOUNG AGE, GRACE HAS HAD A KNACK FOR TECHNOLOGY AND COMPUTER SCIENCE. &gt;&gt; I THINK IT WAS MOSTLY MY DAD BEING AN ENGINEER AND HE WAS ALWAYS TALKING TO US ABOUT CIRCUITS AND I WAS ALWAYS WONDERING HOW THINGS WORK BREANA: GRACE TOOK THE INTEREST TO HIGH SCHOOL, JOINED THE CYBERSECURITY CLUB AT THE ALL-GIRLS NOTRE DAME PREPARATORY SCHOOL HER FRESHMAN AND SOPHOMORE YEAR, BUT SHE WAS DISAPPOINTED IN THE TURNOUT. &gt;&gt; EVEN THOUGH THERE ARE 600 STUDENTS, THAT CAN JOIN THE CLUB, ONLY ABOUT 10 OR 15 STUDENTS ARE ACTUALLY IN THE CLUB BREANA: JUST DOWN THE ROAD AT THE ALL BOYS LOYOLA LAKEFIELD SHE SAYS THE CYBERSECURITY CLUB IS ONE OF THE SCHOOL’S BIGGEST ACTIVITIES. &gt;&gt; IT HAS MORE THAN 100 STUDENTS INVOLVED, WHICH WAS A REALLY BIG CHANGE. BREANA: SO GRACE JOINED LAKEFIELD CLUB, BECAME THE ONLY GIRL ON THE TEAM. SHE MADE IT HER MISSION TO FIND OUT WHY MORE GIRLS WERE NOT INTERESTED IN CAN PETER SCIENCE. &gt;&gt; THERE JUST ARE NOT A LOT OF RESOURCES THAT ARE AIMED TOWARDS WOMEN. LIKE TEXTBOOKS USUALLY ARE MORE STEREOTYPICAL MALE COLORS AND THERE’S NOT A LOT OF FEMALE ROLE MODELS IN THE FIELD WHICH IS UNFORTUNATE. BREANA: SO SHE SET OUT TO CHANGE THAT. SHE WROTE AND PUBLISHED THIS BOOK, AN INTRODUCTION TO COMPUTER SCIENCE FOR YOUNG PEOPLE. SHARING SOME BASICS ABOUT THE FIELD. &gt;&gt; ON THE COVER OF THE BOOK, I CHOSE COLORS THAT ARE BOTH STEREOTYPICALLY MALE AND FEMALE, SO RED I ALSO INCLUDE STORIES OF SOME REALLY IMPORTANT FEMALE LEADERS. IT IS DEFINITELY GOING TO INSPIRE A LOT OF PEOPLE AND HOPEFULLY, GIRLS, TO JOIN THE FIELD AND HOPEFULLY, THEY WILL SEE ME AND THINK THAT THEY CAN DO SOMETHING AND THAT THEY CAN MAKE A CHANGE. BREANA: LETTING GIRLS OF ALL
									</p>
<div>
<div class="mobile">
											<!-- blocks/ad.twig --></p>
<p><!-- blocks/ad.twig --></p>
<p><!-- article/blocks/headline --></p>
<section class="article-headline">
<p>Teenager writes book to encourage girls to take part in computer science</p>
<div class="article-social-branding share-content horizontal">
<p><!-- blocks/share-content/share-widget --></p>
<p><!-- /blocks/share-content/share-widget --></p>
<div class="article-branding">
												<img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2022/07/Maryland-students-book-encourages-girls-to-take-computer-science.png" class="lazyload lazyload-in-view branding" alt="WBAL"/></p>
<p>
					Updated: 11:55 PM EDT Jul 27, 2022
				</p>
</p></div>
</p></div>
</section>
<p><!-- /article/blocks/headline --><!-- article/blocks/byline --><br />
<!-- /article/blocks/byline --></p></div>
<p>
					A Maryland teenager wants to inspire more girls to study computer science.Grace Brehm, 17, has had a knack for technology and computer science from a young age. She even wrote a book that was released in early July to educate more teens about the field."I think it was just mostly my dad being an engineer, and he was always talking to us about, like, circuits and I was always wondering how things work," Brehm said.She took that interest with her to Notre Dame Preparatory School and joined the cybersecurity club in her freshman and sophomore years, but she was disappointed in the turnout."Unfortunately, there wasn't a lot of interest in the club at my school even though there are, like, 600 students that can join the club — only about 10 or 15 students are actually in the club," Brehm said.Just down the road at the all-boys Loyola Blakefield, Brehm said the cybersecurity club is one of the biggest of its kind in the area."It has more than 100 students involved, which was really a big change from NDP's only 10 students," Brehm said.So, in junior year, Brehm joined Loyola's club and became the only girl on the team. She made it her mission to find out why more girls weren't interested in computer science."There just aren't a lot of resources that are aimed towards women. Like, textbooks usually use more stereotypical males, colors are black and red and black and blue, and there are just not a lot of female role models in the field, which is really unfortunate," Brehm said. So, she set out to change that. The teen wrote and published the book "An Introduction to Computer Science for Young People," which shares some basics about the field."On the cover of the book, I chose colors that are both stereotypically male and female -- so, red, blue, purple — and things to try to get everyone involved. I also chose to include the stories of some really important female leaders," Brehm said. "I hope it is definitely going to inspire a lot of people, and hopefully girls, to join the field, and hopefully, they will see me and think that they can do something and that they can make a change." Watch the video above for the full story.
				</p>
<div class="article-content--body-text">
<p>A Maryland teenager wants to inspire more girls to study computer science.</p>
<p><!-- article/blocks/side-floater --></p>
<p><!-- article/blocks/side-floater --></p>
<p>Grace Brehm, 17, has had a knack for technology and computer science from a young age. She even wrote a book that was released in early July to educate more teens about the field.</p>
<p>"I think it was just mostly my dad being an engineer, and he was always talking to us about, like, circuits and I was always wondering how things work," Brehm said.</p>
<p>She took that interest with her to Notre Dame Preparatory School and joined the cybersecurity club in her freshman and sophomore years, but she was disappointed in the turnout.</p>
<p>"Unfortunately, there wasn't a lot of interest in the club at my school even though there are, like, 600 students that can join the club — only about 10 or 15 students are actually in the club," Brehm said.</p>
<p>Just down the road at the all-boys Loyola Blakefield, Brehm said the cybersecurity club is one of the biggest of its kind in the area.</p>
<p>"It has more than 100 students involved, which was really a big change from NDP's only 10 students," Brehm said.</p>
<p>So, in junior year, Brehm joined Loyola's club and became the only girl on the team. She made it her mission to find out why more girls weren't interested in computer science.</p>
<p>"There just aren't a lot of resources that are aimed towards women. Like, textbooks usually use more stereotypical males, colors are black and red and black and blue, and there are just not a lot of female role models in the field, which is really unfortunate," Brehm said. </p>
<p>So, she set out to change that. The teen wrote and published the book "An Introduction to Computer Science for Young People," which shares some basics about the field.</p>
<p>"On the cover of the book, I chose colors that are both stereotypically male and female -- so, red, blue, purple — and things to try to get everyone involved. I also chose to include the stories of some really important female leaders," Brehm said. "I hope it is definitely going to inspire a lot of people, and hopefully girls, to join the field, and hopefully, they will see me and think that they can do something and that they can make a change." </p>
<p><strong><em>Watch the video above for the full story.</em></strong></p>
</p></div>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/teenager-writes-book-encourage-girls-computer-science/40737083">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2023/07/07/maryland-students-book-encourages-girls-to-take-computer-science/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Publisher of Wall Street Journal hacked, likely by China</title>
		<link>https://cincylink.com/2022/02/05/publisher-of-wall-street-journal-hacked-likely-by-china/</link>
					<comments>https://cincylink.com/2022/02/05/publisher-of-wall-street-journal-hacked-likely-by-china/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Sat, 05 Feb 2022 23:17:15 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[breached]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese government]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[news corp]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[Wall Street Journal]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=144300</guid>

					<description><![CDATA[The publisher of the Wall Street Journal said Friday it believes it was hacked by Chinese intelligence. The breach was discovered on January 20. News Corp said data was stolen from journalists and other employees. It is not known when hackers breached the network or how much data they stole. The breach affected a limited &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>The publisher of the Wall Street Journal said Friday it believes it was hacked by Chinese intelligence.</p>
<p>The breach was discovered on January 20.</p>
<p>News Corp said data was stolen from journalists and other employees.</p>
<p>It is not known when hackers breached the network or how much data they stole.</p>
<p>The breach affected a limited number of email accounts and documents from News Corp headquarters, News Technology Services, Dow Jones, News UK and New York Post.</p>
<p>News Corp told employees in an email to staff that it believed the “threat activity is contained.”</p>
<p>Other newsrooms, including The New York Times have previously been hacked.</p>
<p>Journalists in Mexico, El Salvador and Qatar have also been hacked with spyware.</p>
<p>News Corp also owns HarperCollins, News Corp Australia and Storyful.</p>
<p>It does not appear employees at those companies were affected by the hack.</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    js.async = true;
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/publisher-of-wall-street-journal-hacked-likely-by-china">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2022/02/05/publisher-of-wall-street-journal-hacked-likely-by-china/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fallout from biggest global ransomware attack continues as hackers demand $70 million</title>
		<link>https://cincylink.com/2021/07/06/fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand-70-million/</link>
					<comments>https://cincylink.com/2021/07/06/fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand-70-million/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Tue, 06 Jul 2021 04:07:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[bhnd]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[outage]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[russia]]></category>
		<category><![CDATA[Service.]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[united states]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=67383</guid>

					<description><![CDATA[The single biggest global ransomware attack yet continued to bite Monday as details emerged on how the Russia-linked gang responsible breached the company whose software was the conduit. In essence, the criminals used a tool that helps protect against malware to spread it widely.An affiliate of the notorious REvil gang, best known for extorting $11 &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/07/Fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand.jpg" /></p>
<p>
					The single biggest global ransomware attack yet continued to bite Monday as details emerged on how the Russia-linked gang responsible breached the company whose software was the conduit. In essence, the criminals used a tool that helps protect against malware to spread it widely.An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17 countries on Friday, largely through firms that remotely manage IT infrastructure for multiple customers, cybersecurity researchers said. REvil was demanding ransoms of up to $5 million. But late Sunday it offered in a posting on its dark web site a universal decryptor software key that would unscramble all affected machines in exchange for $70 million in cryptocurrency. It wasn't clear who they expected might pay that amount.Sweden may have been hardest hit by the attack — or at least most transparent about it. Its defense minister, Peter Hultqvist, bemoaned on Monday "a serious attack on basic functions in Swedish society." "It shows how fragile the system is when it comes to IT security and that you must constantly work to develop your ability to defend yourself," he said in a TV interview. Most of the Swedish grocery chain Coop's 800 stores were closed all weekend because their cash register software supplier was crippled. They remained closed Monday. A Swedish pharmacy chain, gas station chain, the state railway and public broadcaster SVT were also hit. A broad array of businesses and public agencies were affected, including in financial services, travel and leisure and the public sector — though few large companies, the cybersecurity firm Sophos reported. The cybersecurity firm ESET identified victims in countries including the United Kingdom, South Africa, Canada, Argentina, Mexico, Indonesia, New Zealand and Kenya.Ransomware criminals infiltrate networks and sow malware that cripples them by scrambling all their data. Victims get a decoder key when they pay up.In Germany, an unnamed IT services company told authorities several thousand of its customers were compromised, the news agency dpa reported. Also among reported victims were two big Dutch IT services companies — VelzArt and Hoppenbrouwer Techniek. Most ransomware victims don't publicly report attacks or disclose if they've paid ransoms.On Sunday, the FBI said in a statement  that while it was investigating the attack, its scale "may make it so that we are unable to respond to each victim individually." Deputy National Security Advisor Anne Neuberger later issued a statement saying President Joe Biden had "directed the full resources of the government to investigate this incident" and urged all who believed they were compromised to alert the FBI.Biden  suggested Saturday  the U.S. would respond if it was determined that the Kremlin is at all involved. Less than a month ago, Biden pressed Russian President Vladimir Putin to stop giving safe haven to REvil and other ransomware gangs whose unrelenting extortionary attacks  the U.S. deems a national security threat.On Monday, Putin spokesman Dmitry Peskov was asked if Russia was aware of the attack or had looked into it. He said no, but suggested it could be discussed by the U.S. and Russia in consultations on cybersecurity issues for which no timeline has been specified.Experts say it was no coincidence that REvil launched the attack at the start of the Fourth of July holiday weekend, knowing U.S. offices would be lightly staffed and many victims might not learn of it until back at work Monday or Tuesday. Most end users of managed service providers "have no idea" whose software keep their networks humming, said CEO Fred Voccola of the breached software company, Kaseya. He estimated the victim number in the low thousands, mostly small businesses like "dental practices, architecture firms, plastic surgery centers, libraries, things like that."Voccola said only between 50-60 of the company's 37,000 customers were compromised. But 70% were managed service providers who use the company's hacked VSA software to manage multiple customers. It automates the installation of software and malware-detection updates and manages backups and other vital tasks. Kaseya said it sent a detection tool to nearly 900 customers on Saturday night.The REvil offer to offer blanket decryption for all victims of the Kaseya attack in exchange for $70 million suggested its inability to cope with the sheer quantity of infected networks, said Allan Liska, an analyst with the cybersecurity firm Recorded Future. But Kevin Reed of Acronis said the offer of a universal decryptor could be a PR stunt because no human involvement would be needed to pay a $45,000 base ransom demand apparently sent to the vast majority of targets. Analysts reported seeing demands of $5 million and $500,000 for bigger targets, which would require negotiation.Analyst Brett Callow of Emsisoft said he suspects REvil is hoping insurers might crunch the numbers and determine the $70 million will be cheaper for them than extended downtime. Sophisticated ransomware gangs on REvil's level usually examine a victim's financial records — and  insurance policies if they can find them  — from files they steal before activating the ransomware. The criminals then threaten to dump the stolen data online unless paid, although that does not appear to have happened in this case. But this attack was apparently bare-bones. REvil seems only to have scrambled victims' data.                Dutch researchers  said they alerted Miami-based Kaseya to the breach and said the criminals used a "zero day," the industry term for a previous unknown security hole in software. Voccola would not confirm that or offer details of the breach — except to say that it was not phishing. "The level of sophistication here was extraordinary," he said.It was not the first ransomware attack to leverage managed services providers. In 2019, criminals hobbled the networks of  22 Texas municipalities  through one. That same year, 400 U.S. dental practices were crippled in a separate attack.Active since April 2019, REvil provides ransomware-as-a-service, meaning it develops the network-paralyzing software and leases it to so-called affiliates who infect targets and earn the lion's share of ransoms. U.S. officials say the most potent ransomware gangs are based in Russia and allied states and operate with Kremlin tolerance and sometimes collude with Russian security services.___AP reporters Jim Heintz in Moscow, Jan Olsen in Stockholm, Kirsten Grieshaber in Berlin, Jari Tanner in Helsinki and Sylvie Corbet in Paris contributed to this report.
				</p>
<div>
					<strong class="dateline">BOSTON —</strong> 											</p>
<p>The single biggest global ransomware attack yet continued to bite Monday as details emerged on how the Russia-linked gang responsible breached the company whose software was the conduit. In essence, the criminals used a tool that helps protect against malware to spread it widely.</p>
<p>An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17 countries on Friday, largely through firms that remotely manage IT infrastructure for multiple customers, cybersecurity researchers said. </p>
<p>REvil was demanding ransoms of up to $5 million. But late Sunday it offered in a posting on its dark web site a universal decryptor software key that would unscramble all affected machines in exchange for $70 million in cryptocurrency. It wasn't clear who they expected might pay that amount.</p>
<p>Sweden may have been hardest hit by the attack — or at least most transparent about it. Its defense minister, Peter Hultqvist, bemoaned on Monday "a serious attack on basic functions in Swedish society." </p>
<p>"It shows how fragile the system is when it comes to IT security and that you must constantly work to develop your ability to defend yourself," he said in a TV interview. Most of the Swedish grocery chain Coop's 800 stores were closed all weekend because their cash register software supplier was crippled. They remained closed Monday. A Swedish pharmacy chain, gas station chain, the state railway and public broadcaster SVT were also hit. </p>
<p>A broad array of businesses and public agencies were affected, including in financial services, travel and leisure and the public sector — though few large companies, the cybersecurity firm Sophos reported. The cybersecurity firm ESET identified victims in countries including the United Kingdom, South Africa, Canada, Argentina, Mexico, Indonesia, New Zealand and Kenya.</p>
<p>Ransomware criminals infiltrate networks and sow malware that cripples them by scrambling all their data. Victims get a decoder key when they pay up.</p>
<p>In Germany, an unnamed IT services company told authorities several thousand of its customers were compromised, the news agency dpa reported. Also among reported victims were two big Dutch IT services companies — VelzArt and Hoppenbrouwer Techniek. Most ransomware victims don't publicly report attacks or disclose if they've paid ransoms.</p>
<p>On Sunday, the FBI said in a statement  that while it was investigating the attack, its scale "may make it so that we are unable to respond to each victim individually." Deputy National Security Advisor Anne Neuberger later issued a statement saying President Joe Biden had "directed the full resources of the government to investigate this incident" and urged all who believed they were compromised to alert the FBI.</p>
<p>Biden  suggested Saturday  the U.S. would respond if it was determined that the Kremlin is at all involved. Less than a month ago, Biden pressed Russian President Vladimir Putin to stop giving safe haven to REvil and other ransomware gangs whose unrelenting extortionary attacks  the U.S. deems a national security threat.</p>
<p>On Monday, Putin spokesman Dmitry Peskov was asked if Russia was aware of the attack or had looked into it. He said no, but suggested it could be discussed by the U.S. and Russia in consultations on cybersecurity issues for which no timeline has been specified.</p>
<p>Experts say it was no coincidence that REvil launched the attack at the start of the Fourth of July holiday weekend, knowing U.S. offices would be lightly staffed and many victims might not learn of it until back at work Monday or Tuesday. </p>
<p>Most end users of managed service providers "have no idea" whose software keep their networks humming, said CEO Fred Voccola of the breached software company, Kaseya.</p>
<p>He estimated the victim number in the low thousands, mostly small businesses like "dental practices, architecture firms, plastic surgery centers, libraries, things like that."</p>
<p>Voccola said only between 50-60 of the company's 37,000 customers were compromised. But 70% were managed service providers who use the company's hacked VSA software to manage multiple customers. It automates the installation of software and malware-detection updates and manages backups and other vital tasks. </p>
<p>Kaseya said it sent a detection tool to nearly 900 customers on Saturday night.</p>
<p>The REvil offer to offer blanket decryption for all victims of the Kaseya attack in exchange for $70 million suggested its inability to cope with the sheer quantity of infected networks, said Allan Liska, an analyst with the cybersecurity firm Recorded Future. </p>
<p>But Kevin Reed of Acronis said the offer of a universal decryptor could be a PR stunt because no human involvement would be needed to pay a $45,000 base ransom demand apparently sent to the vast majority of targets. Analysts reported seeing demands of $5 million and $500,000 for bigger targets, which would require negotiation.</p>
<p>Analyst Brett Callow of Emsisoft said he suspects REvil is hoping insurers might crunch the numbers and determine the $70 million will be cheaper for them than extended downtime. </p>
<p>Sophisticated ransomware gangs on REvil's level usually examine a victim's financial records — and  insurance policies if they can find them  — from files they steal before activating the ransomware. The criminals then threaten to dump the stolen data online unless paid, although that does not appear to have happened in this case. But this attack was apparently bare-bones. REvil seems only to have scrambled victims' data.</p>
<p>                Dutch researchers  said they alerted Miami-based Kaseya to the breach and said the criminals used a "zero day," the industry term for a previous unknown security hole in software. Voccola would not confirm that or offer details of the breach — except to say that it was not phishing. </p>
<p>"The level of sophistication here was extraordinary," he said.</p>
<p>It was not the first ransomware attack to leverage managed services providers. In 2019, criminals hobbled the networks of  22 Texas municipalities  through one. That same year, 400 U.S. dental practices were crippled in a separate attack.</p>
<p>Active since April 2019, REvil provides ransomware-as-a-service, meaning it develops the network-paralyzing software and leases it to so-called affiliates who infect targets and earn the lion's share of ransoms. U.S. officials say the most potent ransomware gangs are based in Russia and allied states and operate with Kremlin tolerance and sometimes collude with Russian security services.</p>
<p>___</p>
<p>AP reporters Jim Heintz in Moscow, Jan Olsen in Stockholm, Kirsten Grieshaber in Berlin, Jari Tanner in Helsinki and Sylvie Corbet in Paris contributed to this report.</p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/revil-ransomware-attack-hackers-demand-70-million/36931420">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/07/06/fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand-70-million/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>President Biden to speak to Russia about cyberattack on world&#8217;s largest meat producer, production largely resumed</title>
		<link>https://cincylink.com/2021/06/04/president-biden-to-speak-to-russia-about-cyberattack-on-worlds-largest-meat-producer-production-largely-resumed/</link>
					<comments>https://cincylink.com/2021/06/04/president-biden-to-speak-to-russia-about-cyberattack-on-worlds-largest-meat-producer-production-largely-resumed/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 04 Jun 2021 04:29:13 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[bhnd]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[JBS]]></category>
		<category><![CDATA[meat producer]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=55802</guid>

					<description><![CDATA[The world's largest meat processing company has resumed most production after a weekend cyberattack, but experts say the vulnerabilities exposed by this attack and others are far from resolved.In a statement late Wednesday, the FBI attributed the attack on Brazil-based meat processor JBS SA to REvil, also known as Sodinokibi, a Russian-speaking gang that has &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/06/President-Biden-to-speak-to-Russia-about-cyberattack-on-worlds.jpg" /></p>
<p>
					The world's largest meat processing company has resumed most production after a weekend cyberattack, but experts say the vulnerabilities exposed by this attack and others are far from resolved.In a statement late Wednesday, the FBI attributed the attack on Brazil-based meat processor JBS SA to REvil, also known as Sodinokibi, a Russian-speaking gang that has made some of the largest ransomware demands on record in recent months. The FBI said it will work to bring the group to justice and it urged anyone who is the victim of a cyberattack to contact the bureau immediately.President Joe Biden will talk with Russia's president about the cyberattack.White House Press Secretary Jen Psaki said Wednesday the JBS hack was expected to be discussed at a mid-June summit with Russian President Vladimir Putin.She was also asked how the U.S. could respond to this attack."We are not taking any options off the table in terms of how we may respond," Psaki said. "But, of course, there is an internal policy review process to consider that. We are in direct touch with the Russians as well to convey our concerns about these reports."REvil has not posted anything related to the hack on its dark web site. But that's not unusual. Ransomware syndicates as a rule don't post about attacks when they are in initial negotiations with victims — or if the victims have paid a ransom. In October, a REvil representative who goes by the handle "UNKN" said in an interview published online that the agriculture sector would now be a main target for the syndicate. REvil also threatened to auction off sensitive stolen data from victims who refused to pay it. The attack targeted servers supporting JBS's operations in North America and Australia. Backup servers weren't affected and the company said it was not aware of any customer, supplier or employee data being compromised.JBS said late Tuesday that it had made "significant progress" and expected the "vast majority" of its plants to be operating Wednesday.It is not known if JBS paid a ransom. The company hasn't discussed it in public statements, and did not respond to phone and email messages Wednesday seeking comment.The FBI and the White House declined to comment on the ransom. White House Press Secretary Jen Psaki said Wednesday the U.S. is considering all options in dealing with the attack."I can assure you that we are raising this through the highest levels of the U.S. government," she said.Ransomware expert Allan Liska of the cybersecurity firm Recorded Future said JBS was the largest food manufacturer yet to be attacked. But he said at least 40 food companies have been targeted by hackers over the last year, including brewer Molson Coors and E &amp; J Gallo Winery. Food companies, Liska said, are at "about the same level of security as manufacturing and shipping. Which is to say, not very."The attack was the second in a month on critical U.S. infrastructure. Earlier in May, hackers shut down operation of the Colonial Pipeline, the largest U.S. fuel pipeline, for nearly a week. The closure sparked long lines and panic buying at gas stations across the Southeast. Colonial Pipeline confirmed it paid $4.4 million to the hackers.Cybersecurity experts said the attacks targeting critical sectors of the U.S. economy are evidence that industry hasn't been taking years of repeated warnings seriously.Cybercriminals previously active in online ID theft and bank fraud moved into ransomware in the mid-2010s as programmers developed sophisticated programs that permitted the software's more efficient dissemination. The ransomware scourge reached epidemic dimensions last year. The firm CrowdStrike observed over 1,400 ransomware and data extortion incidents in 2020. Most targeted manufacturing, industrials, engineering and technology companies, said Adam Meyers, the company's vice president of intelligence."The problem has been spiraling out of control," said John Hultquist, who heads intelligence analysis at FireEye. "We're already deep into a vicious cycle."Hultquist said ransomware syndicates are going after more critical and visible targets because they've invested heavily in identifying "whales" - companies they think will yield big ransoms.JBS is the second-largest producer of beef, pork and chicken in the U.S. If it were to shut down for even one day, the U.S. would lose almost a quarter of its beef-processing capacity, or the equivalent of 20,000 beef cows, according to Trey Malone, an assistant professor of agriculture at Michigan State University.Mark Jordan, who follows the meat industry as the executive director of Leap Market Analytics, said the disruption to the food supply will likely be minimal in this case. Meat has around a 14-day window to move through the market, he said. If a plant is closed for a day or two, companies can usually make up for lost production with extra shifts."Several plants owned by a major meatpacker going offline for a couple of days is a major headache, but it is manageable assuming it doesn't extend much beyond that," he said.Jordan said a closure that runs closer to a week would be more serious, especially for a company like JBS, which controls around one-fifth of the country's beef, pork and chicken supply.Critical U.S. infrastructure might be better hardened against ransomware attacks were it not for the 2012 defeat of legislation that would have set cybersecurity standards for critical industries. The U.S. Chamber of Commerce and other business groups lobbied hard against the bill, condemning it as government interference in the free market. Even a watered-down version that would have made the standards voluntary was blocked by a Republican filibuster in the Senate.Right now, the U.S. has no cybersecurity requirements for companies outside of the electric, nuclear and banking systems, said David White, president of the cyber risk management company Axio.White said regulations would help, particularly for companies with inadequate or immature cybersecurity programs. Those rules should be sector-specific and should consider the national economic risks of outages, he said.But he said regulations can also have an unintentional negative effect. Some companies might consider them the ceiling — not the starting point — for how they need to manage risk, he said."Bottom line: regulation can help, but it is not the panacea,"' White said.JBS plants in Australia resumed limited operations Wednesday in New South Wales and Victoria states, Agriculture Minister David Littleproud said. The company hoped to resume work in Queensland state on Thursday, he said.JBS, which is a majority shareholder of Pilgrim's Pride, didn't say which of its 84 U.S. facilities were closed Monday and Tuesday because of the attack. It said JBS USA and Pilgrim's were able to ship meat from nearly all facilities Tuesday. Several of the company's pork, poultry and prepared foods plants were operational Tuesday and its Canada beef facility resumed production, it said. The plant closures reflect the reality that modern meat processing is heavily automated, for both food- and worker-safety reasons. Computers collect data at multiple stages of the production process; orders, billing, shipping and other functions are all electronic.___Bajak reported from Boston. AP Writers Rod McGuirk in Canberra, Australia; Alan Suderman in Richmond, Virginia; and Nancy Benac, Eric Tucker and Alexandra Jaffe in Washington contributed to this report.
				</p>
<div>
<p>The world's largest meat processing company has resumed most production after a weekend cyberattack, but experts say the vulnerabilities exposed by this attack and others are far from resolved.</p>
<p>In a statement late Wednesday, the FBI attributed the attack on Brazil-based meat processor JBS SA to REvil, also known as Sodinokibi, a Russian-speaking gang that has made some of the largest ransomware demands on record in recent months. The FBI said it will work to bring the group to justice and it urged anyone who is the victim of a cyberattack to contact the bureau immediately.</p>
<p>President Joe Biden will talk with Russia's president about the cyberattack.</p>
<p>White House Press Secretary Jen Psaki said Wednesday the JBS hack was expected to be discussed at a mid-June summit with Russian President Vladimir Putin.</p>
<p>She was also asked how the U.S. could respond to this attack.</p>
<p>"We are not taking any options off the table in terms of how we may respond," Psaki said. "But, of course, there is an internal policy review process to consider that. We are in direct touch with the Russians as well to convey our concerns about these reports."</p>
<p>REvil has not posted anything related to the hack on its dark web site. But that's not unusual. Ransomware syndicates as a rule don't post about attacks when they are in initial negotiations with victims — or if the victims have paid a ransom. </p>
<p>In October, a REvil representative who goes by the handle "UNKN" said in an interview published online that the agriculture sector would now be a main target for the syndicate. REvil also threatened to auction off sensitive stolen data from victims who refused to pay it. </p>
<p>The attack targeted servers supporting JBS's operations in North America and Australia. Backup servers weren't affected and the company said it was not aware of any customer, supplier or employee data being compromised.</p>
<p>JBS said late Tuesday that it had made "significant progress" and expected the "vast majority" of its plants to be operating Wednesday.</p>
<p>It is not known if JBS paid a ransom. The company hasn't discussed it in public statements, and did not respond to phone and email messages Wednesday seeking comment.</p>
<p>The FBI and the White House declined to comment on the ransom. White House Press Secretary Jen Psaki said Wednesday the U.S. is considering all options in dealing with the attack.</p>
<p>"I can assure you that we are raising this through the highest levels of the U.S. government," she said.</p>
<p>Ransomware expert Allan Liska of the cybersecurity firm Recorded Future said JBS was the largest food manufacturer yet to be attacked. But he said at least 40 food companies have been targeted by hackers over the last year, including brewer Molson Coors and E &amp; J Gallo Winery.</p>
<p>Food companies, Liska said, are at "about the same level of security as manufacturing and shipping. Which is to say, not very."</p>
<p>The attack was the second in a month on critical U.S. infrastructure. Earlier in May, hackers shut down operation of the Colonial Pipeline, the largest U.S. fuel pipeline, for nearly a week. The closure sparked long lines and panic buying at gas stations across the Southeast. Colonial Pipeline confirmed it paid $4.4 million to the hackers.</p>
<p>Cybersecurity experts said the attacks targeting critical sectors of the U.S. economy are evidence that industry hasn't been taking years of repeated warnings seriously.</p>
<p>Cybercriminals previously active in online ID theft and bank fraud moved into ransomware in the mid-2010s as programmers developed sophisticated programs that permitted the software's more efficient dissemination. </p>
<p>The ransomware scourge reached epidemic dimensions last year. The firm CrowdStrike observed over 1,400 ransomware and data extortion incidents in 2020. Most targeted manufacturing, industrials, engineering and technology companies, said Adam Meyers, the company's vice president of intelligence.</p>
<p>"The problem has been spiraling out of control," said John Hultquist, who heads intelligence analysis at FireEye. "We're already deep into a vicious cycle."</p>
<p>Hultquist said ransomware syndicates are going after more critical and visible targets because they've invested heavily in identifying "whales" - companies they think will yield big ransoms.</p>
<p>JBS is the second-largest producer of beef, pork and chicken in the U.S. If it were to shut down for even one day, the U.S. would lose almost a quarter of its beef-processing capacity, or the equivalent of 20,000 beef cows, according to Trey Malone, an assistant professor of agriculture at Michigan State University.</p>
<p>Mark Jordan, who follows the meat industry as the executive director of Leap Market Analytics, said the disruption to the food supply will likely be minimal in this case. Meat has around a 14-day window to move through the market, he said. If a plant is closed for a day or two, companies can usually make up for lost production with extra shifts.</p>
<p>"Several plants owned by a major meatpacker going offline for a couple of days is a major headache, but it is manageable assuming it doesn't extend much beyond that," he said.</p>
<p>Jordan said a closure that runs closer to a week would be more serious, especially for a company like JBS, which controls around one-fifth of the country's beef, pork and chicken supply.</p>
<p>Critical U.S. infrastructure might be better hardened against ransomware attacks were it not for the 2012 defeat of legislation that would have set cybersecurity standards for critical industries. </p>
<p>The U.S. Chamber of Commerce and other business groups lobbied hard against the bill, condemning it as government interference in the free market. Even a watered-down version that would have made the standards voluntary was blocked by a Republican filibuster in the Senate.</p>
<p>Right now, the U.S. has no cybersecurity requirements for companies outside of the electric, nuclear and banking systems, said David White, president of the cyber risk management company Axio.</p>
<p>White said regulations would help, particularly for companies with inadequate or immature cybersecurity programs. Those rules should be sector-specific and should consider the national economic risks of outages, he said.</p>
<p>But he said regulations can also have an unintentional negative effect. Some companies might consider them the ceiling — not the starting point — for how they need to manage risk, he said.</p>
<p>"Bottom line: regulation can help, but it is not the panacea,"' White said.</p>
<p>JBS plants in Australia resumed limited operations Wednesday in New South Wales and Victoria states, Agriculture Minister David Littleproud said. The company hoped to resume work in Queensland state on Thursday, he said.</p>
<p>JBS, which is a majority shareholder of Pilgrim's Pride, didn't say which of its 84 U.S. facilities were closed Monday and Tuesday because of the attack. It said JBS USA and Pilgrim's were able to ship meat from nearly all facilities Tuesday. Several of the company's pork, poultry and prepared foods plants were operational Tuesday and its Canada beef facility resumed production, it said. </p>
<p>The plant closures reflect the reality that modern meat processing is heavily automated, for both food- and worker-safety reasons. Computers collect data at multiple stages of the production process; orders, billing, shipping and other functions are all electronic.</p>
<p>___</p>
<p><em>Bajak reported from Boston. AP Writers Rod McGuirk in Canberra, Australia; Alan Suderman in Richmond, Virginia; and Nancy Benac, Eric Tucker and Alexandra Jaffe in Washington contributed to this report.</em></p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/jbs-ransomware-expects-plants-working-wednesday/36600915">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/06/04/president-biden-to-speak-to-russia-about-cyberattack-on-worlds-largest-meat-producer-production-largely-resumed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple vs. the US government and YOUR private information, explained (again!)</title>
		<link>https://cincylink.com/2020/01/16/apple-vs-the-us-government-and-your-private-information-explained-again/</link>
					<comments>https://cincylink.com/2020/01/16/apple-vs-the-us-government-and-your-private-information-explained-again/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Thu, 16 Jan 2020 22:43:24 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tech Videos]]></category>
		<category><![CDATA[Watch]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[apple court case]]></category>
		<category><![CDATA[apple encryption]]></category>
		<category><![CDATA[apple encryption explained]]></category>
		<category><![CDATA[apple fbi]]></category>
		<category><![CDATA[apple fbi case explained]]></category>
		<category><![CDATA[apple fbi iphone]]></category>
		<category><![CDATA[apple news]]></category>
		<category><![CDATA[apple news 2019]]></category>
		<category><![CDATA[apple password]]></category>
		<category><![CDATA[apple vs fbi]]></category>
		<category><![CDATA[CNET]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[fbi iphone unlock]]></category>
		<category><![CDATA[government and politics]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[iphone fbi]]></category>
		<category><![CDATA[mobile phone]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[san bernardino]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[tim cook]]></category>
		<category><![CDATA[trump vs apple]]></category>
		<guid isPermaLink="false">https://cincylink.com/apple-vs-the-us-government-and-your-private-information-explained-again/</guid>

					<description><![CDATA[Apple won't budge on the government's request to unlock a terrorist's iPhone. Here's why. Subscribe to CNET: CNET playlists: Download the new CNET app: Like us on Facebook: Follow us on Twitter: Follow us on Instagram: source]]></description>
										<content:encoded><![CDATA[<p><iframe  width="580" height="385" src="https://www.youtube.com/embed/t4szqp5mRlM?rel=0&modestbranding=1" frameborder="0" allowfullscreen></iframe><br />
<br />Apple won't budge on the government's request to unlock a terrorist's iPhone. Here's why.</p>
<p>Subscribe to CNET:<br />
CNET playlists:<br />
Download the new CNET app:<br />
Like us on Facebook:<br />
Follow us on Twitter:<br />
Follow us on Instagram:<br />
<br /><a href="https://www.youtube.com/watch?v=t4szqp5mRlM">source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2020/01/16/apple-vs-the-us-government-and-your-private-information-explained-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
