logo
Android May Soon Warn You About Fake Cell Towers

Android May Soon Warn You About Fake Cell Towers

WIRED2 days ago
Jul 5, 2025 6:30 AM Plus: Iran-linked hackers threaten to release Trump campaign emails, Chinese hackers still in US telecoms networks, and an abusive deepfake website plans an expansion. Photo-Illustration:In recent years, North Korea has deployed thousands of so-called IT workers to infiltrate Western businesses, get paid salaries, and send money back to support the regime. As the schemes have become more successful, they have grown increasingly elaborate and employed new tactics to evade detection.
But this week, the United States Justice Department revealed one of its biggest operations to tackle IT workers to date. The DOJ says it has identified six Americans who allegedly helped enable the schemes and has arrested one of them. Law enforcement officials searched 29 'laptop farms' in 16 states and seized more than 200 computers, as well as web domains and financial accounts.
Meanwhile, a group of young cybercriminals has been causing chaos around the world, leaving grocery stores empty and temporarily grounding some flights in the wake of their crippling cyberattacks. After a quiet period in 2024, the Scattered Spider hackers have returned this year and are ruthlessly targeting retailers, insurers, and airlines.
Also this week, we've detailed how LGBTIQ+ organizations in El Salvador are helping activists chronicle attacks against their community and better protect themselves against state surveillance.
And there's more. Each week, we round up the security and privacy news we didn't cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.
Cell-site simulators, often known as stingrays or IMSI catchers, are some of the most stealthy and powerful surveillance tools in operation today. The devices, which impersonate cell towers and intercept communications, can collect call metadata, location information, and other traffic about what you do on your devices. They've increasingly been used by law enforcement and immigration officials.
However, according to reporting from Android Authority and Ars Technica, upcoming hardware advances has led to Google upping its efforts to combat the potential snooping. Starting in Android 16, compatible devices will be able to identify when networks request device identifiers, such as device or SIM IDs, and issue alerts when you are connecting to a non-encrypted cell network. Examples of alerts show warnings that 'calls, messages, and data are vulnerable to interception' when connected to insecure networks. There will also be notifications when you move back to an encrypted network. An option to turn on these notifications appears on a mobile network security settings page alongside the option to avoid 2G networks, which could help block some IMSI catchers from connecting to your device. However, while the settings will reportedly be available in Android 16, it may take some time for Android devices to widely use the required hardware. Iran-Linked Hackers Threaten to Release 100 GB of Trump Campaign Emails
Ahead of the presidential election last November, Iran-linked hackers attacked Donald Trump's presidential campaign and stole scores of emails in an apparent bid to influence the election results. Some of the emails were distributed to journalists and the Biden campaign. This week, following the Israel-Iran conflict and US intervention with 'bunker-buster' bombs, the hackers behind the email compromise reemerged, telling Reuters that they may disclose or sell more of the stolen emails.
The cybercriminals claimed they had stolen 100 GB of emails, including some from Susie Wiles, the White House chief of staff. The cache of emails also allegedly includes those from Lindsey Halligan, a Trump lawyer, adviser Roger Stone, and adult film star Stormy Daniels. The hackers, who have used the name Robert, told Reuters they wanted to 'broadcast this matter.' It is unclear whether they will act upon the threats.
In response, US officials claimed that the threat from the hackers was a 'calculated smear campaign' by a foreign power. 'A hostile foreign adversary is threatening to illegally exploit purportedly stolen and unverified material in an effort to distract, discredit, and divide,' Marci McCarthy, a spokesperson for the Cybersecurity and Infrastructure Security Agency, said in a statement. Chinese Hackers Lay 'Dormant' in US Telecoms Networks, FBI Says
Over the past few years, Chinese hacker group Salt Typhoon has been on a hacking rampage against US telecoms networks, successfully breaking into at least nine firms and gaining access to Americans' texts and calls. Brett Leatherman, the recently appointed leader of the FBI's cyber division, tells Cyberscoop that the Chinese hackers are now 'largely contained' and lying 'dormant' in the networks. The groups have not been kicked out of networks, Leatherman said, since the longer they are in the systems there are more ways they can find to 'create points of persistence.' 'Right now, we're very focused on resilience and deterrence and providing significant support to victims,' Leatherman said. Explicit Deepfake Website Leaks User Information, Has Expansion Plans Revealed
Deepfake platforms that allow people to create nonconsensual, often illegal, harmful images of women without clothes on have boomed in recent years. Now a former whistleblower and leaked documents from one of the largest so-called 'nudify' apps, Clothoff, claims the service has a multimillion-euro budget and is planning an aggressive expansion where it will create nonconsensual explicit images of celebrities and influencers, according to reporting by German publication Der Spiegel. The alleged expansion has a marketing budget of €150,000 (around $176,000) per country to promote the images of celebrities and influencers, according to the report. It says more than 'three dozen people' work for Clothoff, and the publication identified some of the potential key operators of the platform. Documents exposed online also revealed customer email addresses. A spokesperson who claimed to represent Clothoff denied there were more than 30 people as part of the central team and told Der Spiegel it does not have a multimillion-euro budget.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

North Philadelphia shooting leaves 26-year-old man dead, police say
North Philadelphia shooting leaves 26-year-old man dead, police say

CBS News

time4 minutes ago

  • CBS News

North Philadelphia shooting leaves 26-year-old man dead, police say

A 26-year-old man was shot multiple times and killed in North Philadelphia on Sunday afternoon, police said. The shooting happened on the 2400 block of North Reese Street at around 2:30 p.m., according to police. Police said the 26-year-old was shot multiple times and taken to Temple University Hospital, where he was pronounced dead at 3:01 p.m. So far, no arrests have been made, and the motive for the shooting remains unclear. The shooting is under investigation.

Keys Inc. Marks a Strong First Half of 2025 with New Features and Industry Growth
Keys Inc. Marks a Strong First Half of 2025 with New Features and Industry Growth

Associated Press

time23 minutes ago

  • Associated Press

Keys Inc. Marks a Strong First Half of 2025 with New Features and Industry Growth

TUCSON, Ariz., July 6, 2025 /PRNewswire/ -- Keys Inc., the leading all-in-one software platform built specifically for locksmiths, is proud to announce a successful first half of 2025 highlighted by enhanced product offerings, strong industry engagement, and accelerated growth. In May, Keys Inc. participated in the IAAL Auto Lock Expo 2025 in Cedar Rapids, Iowa—a premier event for locksmith professionals. The company gained invaluable feedback from locksmiths nationwide, reaffirming its user-driven approach to software development. One of the requested features, Cash Invoicing, was successfully introduced shortly after the event. This feature complements Keys' existing Digital Payment Method invoicing, providing locksmiths the flexibility to issue branded invoices for cash payments while maintaining a professional look and streamlined payment process. 'We built Keys to elevate locksmiths' success by delivering cutting-edge solutions tailored to their unique needs,' said Loay Jamal Alyousfi, Founder of Keys Inc. 'We are constantly improving and investing in the locksmith space to ensure our platform grows alongside the industry's evolving needs.' Keys® is currently developing a QR Code Labeling system to integrate with its inventory management tools, enabling locksmiths to easily track, organize, and manage parts, tools, and keys. This will reduce errors and save valuable time for locksmiths both on the road and in the shop. From real-time payments and branded invoicing to dispatch and inventory control, Keys® continues to evolve based on user feedback, building a platform truly designed for locksmiths. The company remains committed to delivering solutions that enhance operational efficiency and foster business growth. As the second half of 2025 begins, Keys Inc. looks forward to continued innovation, expanded features, and broader adoption within the locksmith industry. Keys® — Built for Locksmiths. Backed by Experience. Driven by Feedback. For more information, visit or contact [email protected]. View original content to download multimedia: SOURCE Keys Inc.

Say Goodbye to Watermarks: The Best Way to Remove Watermarks from Videos
Say Goodbye to Watermarks: The Best Way to Remove Watermarks from Videos

Associated Press

time24 minutes ago

  • Associated Press

Say Goodbye to Watermarks: The Best Way to Remove Watermarks from Videos

07/06/2025, Miami , Florida // KISS PR Brand Story PressWire // There is a boom in video content. There are videos all over the place. Literally everywhere, on TikTok and YouTube, during promotional campaigns and in classrooms where people give tutorials. And although they still remain the ruler of the digital media, there is an issue that irritates millions of creators: a watermark. They can destroy professional appearance of your content, whether it is a trial logo of editing software or branding of stock footage. In this post, you are going to learn how to remove watermark from video, what is the matter and how new AI-powered tools can provide a high-level experience even to a person without a tech background. What Is a Watermark in a Video? Video watermarking is usually a semitransparent logo, text or image inscribed on a video to identify the author of the video or the computer package that creates the video. It can serve as a copy protection agent as well as a brand promotional strategy so that the audience understands that a company owns its products. Although valid and often needed, watermarks may be a problem in: In each of the above situations, a decent video watermark remover will come in handy assisting you to clean up your video and get it ready to be published. Why Removing a Watermark Matters Often, watermarks can make the audience lose the meaning of the video. Corner logo may look neutral, but it may drop the suspension of disbelief and make information less professional. Take a case of a wedding video or a corporate promo you have in mind and it has a huge watermark in the middle of it, it kills the tempo and it leaves one with the perception that it is an unfinished job. Videos that are clean, watermark-free not only appear nice but also: If you're a creator, marketer, educator, or editor, being able to remove such marks efficiently gives you a serious advantage. The Solution: AI-Powered Free Video Watermark Remover Conventionally, watermark removal was performed through manual editing software such as the Adobe Premiere or the Final Cut Pro. That is time consuming, skillful and in many cases causes a recognizable blurring or cropping. The silver lining though is that AI has revolutionized the game. This is what is different about it: Step-by-Step Guide to Removing Watermark in the Video Getting started is simple. You don't need to download any software or have any video editing experience. Follow these easy steps: Step 1: Go to the Tool Visit the AI Face Swap Video Watermark Remover page. It's accessible on any browser. Step 2: Upload Your Video Either manually select or drag drop the video file on your computer. It works with all the major formats such as those of MP4, AVI and MOV. Step 3: Highlight the Watermark Mark the area of watermark with the selection tool. The highlight box can be adjusted and can be moved to fit the watermark position. Step 4: Let the AI Work Click the 'Remove Watermark' button. The system will process the video intelligently, removing the mark while keeping the rest of the video intact. Step 5: Download and Use Once you have done it, you now have your cleaned editing video ready to send or post. When can a Watermark be Removed? One should not disregard copyright law and intellectual property. It is not okay to remove water mark of a video you do not own or you really have no right to use. In most cases it is illegal to remove the water mark of a video which is not yours. Nevertheless, a great number of legal and valid use cases when it is needed, such as: Always double-check the usage rights of a video before modifying it. If you're authorized to use and edit the content, then a watermark remover is a helpful tool—not a shortcut to piracy. Why AI Beats Manual Editing Manual processing of watermark takes a lot of time and does not necessarily yield good results. The majority of non-AI techniques are related to crop/blur/clone neighbour pixels, whose differences may be evident. Even more, they are able to destroy the structure of your video. Instead, AI-aided tools draw over the whole frame, comprehend the structure associated with the watermark, and reconstruct the lost material with the help of information of other frames. This gives natural-looking, smooth video that can hardly be suspected of ever being edited. The video watermark remover by is one such smart tool designed to preserve video quality and save time. Who Needs a Watermark Remover? You might think only professionals care about removing watermarks, but that's not the case. Here's a list of people and industries that benefit from such tools: This smart tool can assist any video-creator/sharer; being free and user-friendly it is especially beneficial. Mistakes to Avoid When Removing Watermarks While using a tool like this is simple, there are a few common mistakes to avoid: Rather, use a reliable, online, automated cleanup tool that makes your materials secure and crisp. Conclusion In a video- ruled world, it counts on quality and professionalism. Watermarks should not be a priority, but they may destroy your message and mislead your listeners. The good news is you do not need the complex software and several hours of back-up and improving to correct the issue. Using such programs as the free video watermark remover, you will be able to strip video of watermark fast, efficiently and with minimum effort. It is intelligent, has a friendly user-interface, and topping all these, it is free. There is no reason that just because you are an experienced editor or a first-time content creator, the protection of your material should be an obstacle to professional-looking and/or high-performing content. Original Source of the original story >> Say Goodbye to Watermarks: The Best Way to Remove Watermarks from Videos

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store