Hackerzhome

hackerzhome-logo-bg

Cybersecurity news all over the world

HACKERZHOME NEWS

May 3, 2023

Wednesday

Utah's SB287 age-verification law has caused PornHub to be blocked.

Adult video production business MindGeek has blocked access to its websites in Utah, including PornHub, Brazzers, RedTube, YouPorn, and Reality Kings, in response to a new law requiring websites to confirm that a visitor from the state is 18 or older.


‘S.B. 287 Online Pornography Viewing Age Requirements’ was signed into law by the governor of Utah in March, and it takes effect today. Due to Utah’s SB287 age-verification law, PornHub has been blocked.


This law mandates that pornographic websites verify that a visitor is at least 18 years old by uploading official IDs or using a third-party age verification service.


S.B. 287 mandates the age verification of those accessing pornography and other information deemed harmful to minors as a significant component of the content provided by commercial entities.


If the company neglected to verify the visitors’ ages before allowing them into Utah, it would be responsible for any damages caused by a minor accessing the content, as well as court expenses and appropriate attorney fees as determined by the court.


According to MindGeek, one of the major providers of pornographic content online, its network of websites receives over 125 million daily visits and 100 billion video views annually.

NEWS 1
Utah's SB287 age-verification law has caused PornHub to be blocked.

Breaking news

LIVE

You are not up to date!

Subscribe to our newsletter and stay updated on cybersecurity news

After two security audits, the crypto exchange Level Finance was breached.

By exploiting a Level Finance smart contract flaw, hackers were able to take 214,000 LVL tokens from the decentralized exchange and convert them for 3,345 BNB, which is worth over $1,000,000 in total.

The DAO treasury and Level Finance’s liquidity pool were unaffected by the attack, and the exploit was isolated from all other contracts, according to Level Finance, however, the LVL token lost over 50% of its value as soon as the attack was made public.

The company has promised to release updates on the situation as soon as the investigation produces new facts.

The DAO has since released a proposal asking the public for feedback on handling the 214K LVL tokens that the hack has introduced to the market.

To maximize the profits they could get by taking advantage of the smart contract issue, the attacker set up many referral accounts.

The attacker was able to do many token swaps while gaining rewards because of the use of flash loans (single-transaction borrow and return).

The hacker eventually followed the correct procedures last night and conducted the attack, which brought in $1.1 million for them.

NEWS 2

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news:

May 3, 2023 /

Wednesday

Hackerzhome News

2

Have you heard?
Hackers now have concealed VNC access to Windows devices thanks to new LOBSHOT spyware Know more!

explains 1Password terrifying Changing password and secret key notifications

explains 1Password terrifying Changing password and secret key notifications

According to 1Password, a recent event that resulted in consumers receiving warnings about altered passwords was due to a service interruption rather than a security breach.

The notices were false and related to routine database maintenance scheduled for Thursday, April 27th, the company first disclosed in an incident report five days ago.

Pedro Canahuati, the chief technology officer (CTO) of 1Password, gave new information today and assured users that their data was unharmed.

Canahuati clarified that this did not take place. The false alerts were brought on by the American servers of 1Password responding to an increase in sync requests after the move of backend databases that resulted in sign-in rejections.

In the United States area, the client applications improperly read the error code supplied by the servers and displayed incorrect password change warnings on users’ devices.

These notifications weren’t ignored, though, since some 1Passwords members were concerned that their accounts had been compromised or that there had been a security breach at the organization.

NEWS 3

In Chrome 117, Google will remove the secure website indicators.

In Chrome 117, Google will remove the secure website indicators.
NEWS 4

Google said today that the lock icon, long seen as a symbol of website security and dependability, will shortly be replaced by a new icon that makes no such claims.

Given that more than 99% of all web pages are now loaded in Google Chrome over HTTPS, the lock icon, which was initially intended to indicate that a website was utilizing HTTPS encryption to encrypt connections, is no longer necessary.

Websites that exploit the lock icon to deceive targets into believing they are safe from attacks also fall into this category.

These include websites used as landing pages in phishing campaigns or for other nefarious objectives.

Due to the fact that almost all phishing websites use HTTPS and so display the lock icon, this mistake is not harmless, according to Google.

Many organizations, including the FBI, publish explicit guidance that the lock icon is not a sign of a secure website because misconceptions about it are so widespread.

In Chrome 117, the lock symbol will be replaced with a variation of the tune icon, a user interface component frequently connected to app settings and intended to indicate that it is a clickable item.

Google and Apple collaborate to combat Bluetooth tracker snooping

To promote the adoption of new industry standards intended to end stalking via Bluetooth-enabled location-tracking devices, Apple and Google have teamed up.

The two tech behemoths’ new draught specification proposes that manufacturers of gadgets that can enable unwanted tracking make it simpler to notify the people who are being tracked when this happens.

Manufacturers will be able to use Android and iOS devices’ unwanted tracking detection and alerting capability if they follow the recently proposed technical standard.

Since iOS and Android devices will be able to notify users that a location tracker is being used to monitor their activities via Bluetooth crowdsourcing, GPS/GNSS location, WiFi location, cellular location, or some other method, this will make detecting unwanted tracking via misused location-tracking accessories much easier.

Apple currently provides functionality incorporated into the iOS platform and through a dedicated Android app that allows users to locate nearby AirTag or AirPod devices that might be used to track people.

The Android app can assist in finding item trackers that are compatible with Apple’s Find My network, out of their owner’s Bluetooth range, and within Bluetooth range.

The business also offers instructions on how to stop receiving location updates from unidentified AirTag, AirPods, or other third-party Find My network devices.

Google and Apple collaborate to combat Bluetooth tracker snooping
NEWS 5

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news: