PLA tries to buy AV products. Chinese surveillance of Uyghurs. Panda Stealer vs. cryptowallets. Peleton’s API. VDP expanded.
Attacks, Threats, and Vulnerabilities How China turned a prize-winning iPhone hack against the Uyghurs (MIT Technology Review) In March 2017, a group of hackers from China arrived in Vancouver with one goal: Find hidden weak spots inside the world’s most popular technologies. Google’s Chrome browser, Microsoft’s Windows operating system, and Apple’s iPhones were all in […]