More stories

  • in

    Google Close to Its Biggest Acquisition Ever, Despite Antitrust Scrutiny

    The search giant’s negotiations to buy Wiz, a cybersecurity start-up, for $23 billion, come as the Biden administration has taken a hard line against consolidation in tech and other industries.Google, which became one of the world’s the most valuable companies through its search engine and other consumer internet services, is nearing its largest-ever acquisition to improve what it can offer to business customers.Google is in talks to buy Wiz, a New York-based cybersecurity start-up, according to three people with knowledge of the discussions, who were not authorized to discuss them. Wiz was last valued at $12 billion.The companies have valued the deal at roughly $23 billion, said one of the people, easily making it Google’s most expensive acquisition and nearly double what the company paid for Motorola Mobility in 2012.While a deal looks likely, talks could still fall apart, the people said.Google and Wiz did not respond to requests for comment. The Wall Street Journal earlier reported that the companies were discussing a deal.Google has moved forward with negotiations despite the possibility that regulators might try to block the deal. But the company may be willing to fight to beef up its cloud-computing division, which lags behind Amazon Web Services and Microsoft Azure.Google was sued by the Justice Department in two separate antitrust cases, one targeting its ubiquitous search engine and another seeking to break up its digital advertising-technology business. A verdict in the search case is expected this summer.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Are You an AT&T Customer? Here’s What to Know About the Data Breach

    Nearly all AT&T customers were affected by a recent cyberattack.Nearly all customers of the telecommunications company AT&T were affected by a cyberattack that exposed phone records of calls and texts from May 2022 through October 2022, and on Jan. 2, 2023, the company said Friday.Although the company said the breach did not expose the contents of calls or texts or information such as Social Security numbers, passwords or other personally identifiable information, the information that was exposed can still threaten customers’ security.If you are an AT&T customer, here is what you need to know about the breach.How do I know if my records were exposed?AT&T will contact you by text, email or U.S. mail if your account was affected by the cyberattack, the company said.But AT&T also said that “nearly all” customers had been affected by the breach. So if you were a customer from May 1, 2022, to Oct. 31, 2022, or on Jan. 2, 2023, your phone logs were most likely exposed.What was exposed?The phone numbers that you texted and called, as well as how frequently you interacted with them, were exposed by the breach, the company said.Customers’ personal details, such as Social Security numbers and dates of birth, were not exposed. Nor were the contents of the calls and texts. Although customers’ names were not exposed by the breach, “there are often ways to find a name associated with a phone number using publicly available online tools,” AT&T said.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Germany to Strip Huawei From Its 5G Networks

    Major telecom companies agreed to stop using critical components made by Chinese companies in their mobile infrastructure by 2029.The German government said on Thursday that it had reached an agreement with major telecom companies to have them stop using critical Huawei and ZTE components in their 5G mobile infrastructure in five years, the latest step by a European country to ban Chinese companies from critical telecommunications infrastructure.“We are protecting the central nervous system of the German economy — and we are protecting the communication of citizens, companies and the state,” Nancy Faeser, the interior minister, said in a news conference in Berlin on Thursday.The agreement with the telecom companies — Deutsche Telekom, Vodafone and Telefonica — comes in two steps. First, use of Chinese-made critical components will be discontinued from core parts of the country’s 5G networks by the end of 2026. Then, the parts made by Chinese manufacturers will be phased out from antennas, transmission lines and towers by the end of 2029.Huawei and ZTE did not respond to requests for comment.Germany, which accounts for roughly a quarter of mobile customers in the European Union , is highly dependent on the Chinese export market and has long delayed taking such a drastic step against Chinese firms. Instead it has chosen to certify components based on a case-by-case security check.Other European countries such as Britain, Denmark, Sweden, Latvia, Estonia and Lithuania have already instituted bans on Huawei and ZTE components. The United States has restricted the use of Huawei equipment since at least 2019.In presenting the arrangement, Ms. Faeser reiterated that it was based on negotiations with German telecom providers. Those providers had long argued that switching from Huawei and ZTE components too quickly would be complicated and expensive.The question of banning Huawei and ZTE from German mobile infrastructure has been discussed in Berlin since the previous government, headed by Angela Merkel, but the decision announced on Thursday comes after an extensive security assessment, said Ms. Faeser.“The current threat situation underlines the importance of a secure and resilient telecommunications infrastructure, especially in view of the dangers of sabotage and espionage,” she said.Adam Satariano More

  • in

    The Aftermath of a U.K. Cyberattack: Blood Shortages and Delayed Operations

    Several London hospitals, still reeling from a cyberattack last week, have made an urgent plea to medical students to help stem the disruption.Several London hospitals, still under significant strain more than a week after a cyberattack crippled services, have asked medical students to volunteer to help minimize disruption, as thousands of blood samples have had to be discarded and operations postponed.The ransomware attack on Synnovis, a private firm that analyzes blood tests, has crippled services at two major National Health Service hospital trusts, Guy’s and St. Thomas’ and King’s College, which described the situation as “critical.”According to a memo leaked in recent days, several London hospitals asked medical students to volunteer for 10- to 12-hour shifts. “We urgently need volunteers to step forward and support our pathology services,” said the message, which was reported earlier by the BBC. “The ripple effect of this extremely serious incident is felt across various hospital, community and mental health services in our region.”The attack also disrupted blood transfusions, and the N.H.S. appealed to the public this week for blood donors with O-negative blood types, which can be used in transfusions for any blood type, and O-positive blood types, which is the most frequently occurring blood type, saying it could not match patients’ blood at the same frequency as usual.While the N.H.S. has declined to comment on which group was suspected of carrying out the attack, Ciaran Martin, a former head of British cybersecurity, told the BBC last week that a Russian cybercriminal group known as Qilin was most likely the perpetrator. Synnovis said last week in a statement that it was working with the British government’s National Cyber Security Center to understand what had happened.Synnovis, in an email sent Monday to primary health providers, said that thousands of blood test samples would probably have to be destroyed because of the lack of connectivity to electronic health records. In a statement on Wednesday, Synnovis said that the I.T. system had been down for too long for samples taken last week to be processed.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Ticketmaster Confirms Data Breach. Here’s What to Know.

    The hacking group ShinyHunters has claimed responsibility for stealing the user information of more than 500 million Ticketmaster customers.Ticketmaster confirmed in a federal filing on Friday that it was investigating a data breach after a hacking group known as ShinyHunters claimed responsibility for stealing the information of more than 500 million Ticketmaster customers.In the filing, with the U.S. Securities and Exchange Commission, Ticketmaster’s parent company, Live Nation Entertainment, said it had “identified unauthorized activity within a third-party cloud database environment.”Who is behind the breach?ShinyHunters, a hacker group believed to have been formed around 2020, is believed to have been behind the breach.Brett Callow, a threat analyst with the cybersecurity company Emsisoft, said it was a “credible threat actor,” though not much more was known about the group.Its chief aim appears to be to obtain personal records and sell them.Its past victims have included Microsoft and AT&T, among dozens of other companies in the United States and elsewhere, according to federal prosecutors.In March, AT&T confirmed a breach in a news release and said it had affected roughly 70 million past or present customers.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Taiwan, on China’s Doorstep, Is Dealing With TikTok Its Own Way

    The island democracy was early to ban TikTok on government phones, and the ruling party refuses to use it. But a U.S.-style ban is not under consideration.As it is in the United States, TikTok is popular in Taiwan, used by a quarter of the island’s 23 million residents.People post videos of themselves shopping for trendy clothes, dressing up as video game characters and playing pranks on their roommates. Influencers share their choreographed dances and debate whether the sticky rice dumplings are better in Taiwan’s north or south.Taiwanese users of TikTok, which is owned by the Chinese internet giant ByteDance, are also served the kind of pro-China content that the U.S. Congress cited as a reason it passed a law that could result in a ban of TikTok in America.One recent example is a video showing a Republican congressman, Rob Wittman of Virginia, stoking fears that a vote for the ruling party in Taiwan’s January election would prompt a flood of American weapons to aid the island democracy in a possible conflict with China, which claims it as part of its territory. The video was flagged as fake by a fact-checking organization, and TikTok took it down.About 80 miles from China’s coast, Taiwan is particularly exposed to the possibility of TikTok’s being used as a source of geopolitical propaganda. Taiwan has been bombarded with digital disinformation for decades, much of it traced back to China.But unlike Congress, the government in Taiwan is not contemplating legislation that could end in a ban of TikTok.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Biden Bans Chinese Bitcoin Mine Near U.S. Nuclear Missile Base

    An investigation identified national security risks posed by a crypto facility in Wyoming. It is near an Air Force base and a data center doing work for the Pentagon.President Biden on Monday ordered a company with Chinese origins to shut down and sell the Wyoming cryptocurrency mine it built a mile from an Air Force base that controls nuclear-armed intercontinental ballistic missiles.The cryptomining facility, which operates high-powered computers in a data center near the F.E. Warren base in Cheyenne, “presents a national security risk to the United States,” the president said in an executive order, because its equipment could be used for surveillance and espionage.The New York Times reported last October that Microsoft, which operates a nearby data center supporting the Pentagon, had flagged the Chinese-connected cryptocurrency mine to the federal Committee on Foreign Investment in the United States, warning that it could enable the Chinese to “pursue full-spectrum intelligence collection operations.” An investigation by the committee identified risks to national security, according to the president’s order.The order did not detail those risks. But Microsoft’s report to the federal committee, obtained last year by The Times, said, “We suggest the possibility that the computing power of an industrial-level cryptomining operation, along with the presence of an unidentified number of Chinese nationals in direct proximity to Microsoft’s Data Center and one of three strategic-missile bases in the U.S., provides significant threat vectors.”Now, the mine must immediately cease operations, and the owners must remove all their equipment within 90 days and sell or transfer the property within 120 days, according to the order, which cites the risks of the facility’s “foreign-sourced” mining equipment. A vast majority of the machinery powering cryptomining operations across the United States is manufactured by Chinese companies.Cryptomining operations are housed in large warehouses or shipping containers packed with specialized computers that typically run around the clock, performing trillions of calculations per second, hunting for a sequence of numbers that will reward them with new cryptocurrency. The most common is Bitcoin, currently worth more than $60,000 apiece. Crypto mines consume an enormous amount of electricity: At full capacity, the one in Cheyenne would draw as much power as 55,000 homes.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    How to Claim Your Part of a $5.6 Million Ring Settlement

    The Federal Trade Commission is sending payments to customers who had certain Ring home security cameras and accounts during a particular time period, the agency said.The Federal Trade Commission said this week that some people who had bought certain home security cameras made by Ring, which is owned by Amazon, would be eligible for refunds for their purchase. The payments, totaling more than $5.6 million, are part of a settlement between Ring and the F.T.C. over claims that the company failed to protect customer accounts.Here’s what to know.What is the lawsuit about?The F.T.C. sued Ring last May, accusing the company of giving employees and contractors access to customers’ private video footage. The agency said in its complaint that Ring had used the videos to train computer algorithms without first getting customers’ consent. Ring also failed to have proper protections, which made customer accounts, videos and cameras more vulnerable to hacking, the F.T.C. said.The F.T.C. and Ring reached a settlement that month. As part of the agreement, Ring paid a settlement that would be used for customer refunds, deleted all private videos that it shouldn’t have access to, and established a privacy and security program. The F.T.C. is now using the money Ring paid to send 117,044 PayPal payments to affected customers.Ring did not immediately respond to a request for comment. But in a statement after the settlement, Ring said that it addressed issues about its security and privacy practices “well before” the F.T.C.’s lawsuit, and that the agency “mischaracterizes our security practices and ignores the many protections we have in place for our customers.”How do I find out if I am eligible for the refund?If you had a Ring account and certain types of Ring devices, such as the indoor camera models Stick Up Cam and Indoor Cam, before Feb. 1, 2018, you are eligible for a refund, according to a court order.The defendant — in this case, Ring — is typically required to provide a list of customers, their contact information and how much they paid. The F.T.C. will use the information to send payments.Eligible customers should have already received an email from the F.T.C.How much will I receive?Your payment depends on the type of Ring device you owned and the time you had your account.I got a PayPal payment from the F.T.C. How do I know if it is real?If you are eligible for a refund, you should have received an email from the agency (from the address subscribe@subscribe.ftc.gov) before Tuesday. Since payments were issued on Tuesday, you should have received another email from PayPal about the refund. You have to redeem the payment by May 22, or it will be returned to the F.T.C.If you would like the F.T.C. to send you a check instead, or have any other questions about the payment, you can speak with the refund administrator, Rust Consulting, by calling 1-833-637-4884. You can also email your request to info@ring.com. More