Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Review: ROG Xbox Ally and ROG Xbox Ally X

16 October 2025

The Best Swimming Headphones

16 October 2025

Federal Workers Are Being Used as Pawns in the Shutdown

16 October 2025
Facebook X (Twitter) Instagram
Just In
  • Review: ROG Xbox Ally and ROG Xbox Ally X
  • The Best Swimming Headphones
  • Federal Workers Are Being Used as Pawns in the Shutdown
  • Does The Outer Worlds 2 Take Into Account Any Endings From The First Game?
  • 20 Practical Gift Ideas for Exhausted New Parents
  • The Best Travel Tote for Digital Nomads Who Never Log Off
  • The AI Industry’s Scaling Obsession Is Headed for a Cliff
  • Wizarding Life Sim Witchbrook Delayed To 2026
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Security News This Week: Identity Thief Lived as a Different Man for 33 Years
News

Security News This Week: Identity Thief Lived as a Different Man for 33 Years

News RoomBy News Room6 April 20244 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

It’s been a week since the world avoided a potentially catastrophic cyberattack. On March 29, Microsoft developer Andres Freund disclosed his discovery of a backdoor in XZ Utils, a compression tool widely used in Linux distributions and thus countless computer systems worldwide. The backdoor was inserted into the open source tool by someone operating under the persona “Jia Tan” after years of patient work building a reputation as a trustworthy volunteer developer. Security experts believe Jia Tan is the work of a nation-state actor, with clues largely pointing to Russia, although definitive attribution for the attack is still outstanding.

In early 2022, a hacker operating under the name “P4x” took down the internet of North Korea, after the country’s hackers had targeted him. This week, WIRED revealed P4x’s true identity as Alejandro Caceres, a 38-year-old Colombian American. Following his successful attack on North Korea, Caceres pitched the US military on a “special forces”-style offensive hacking team that would carry out operations similar to the one that made P4x famous. The Pentagon eventually declined, but Caceres has launched a startup, Hyperion Gray, and plans to further pursue his controversial approach to cyberwarfare.

In mid-February, millions of people lost internet access after three undersea cables in the Arabian Sea were damaged. Some blamed Houthi rebels in Yemen, who had been attacking ships in the region, but the group denied it had sabotaged the cables. But the rebel attacks are still likely to blame—albeit, in a bizarre way. A WIRED analysis of satellite images, maritime data, and more found that the cables were likely damaged by the trailing anchor of a cargo ship that the Houthi rebels had bombed. The ship drifted for two weeks before finally sinking, crossing paths with the cables at the time they were damaged.

The myth that Google Chrome’s Incognito mode provides adequate privacy protections can finally be put to rest. As part of a settlement over Google’s Incognito privacy claims and practices, the company has agreed to delete “billions” of records collected while users browsed in Incognito mode. It will also further clarify how much user data can be collected by Google and third parties while Incognito is enabled, and take further steps to protect user privacy. There are other privacy-focused browsers that can replace Chrome. But if you’re still using it, make sure to update it to patch some serious security flaws.

But that’s not all. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

A 58-year-old hospital systems administrator pleaded guilty this week to US federal charges after he was caught using another man’s name for more than 30 years. Matthew David Keirans allegedly stole the identity of William Woods in 1988, when the two men worked at a hot dog cart in Albuquerque, New Mexico, according to the US Attorney’s Office for the Northern District of Iowa. Over the decades, Keirans obtained employment, bank accounts, loans, and insurance, and paid taxes, under the Woods name. Keirans even had a child whose last name is Woods.

The real William Woods, meanwhile, reportedly learned that someone else was using his identity in 2019. At the time, Woods was unhoused and living in Los Angeles. He contacted a bank where “William Woods” had an account, providing his real Social Security card and California ID card to prove his identity. However, he could not answer the security questions to gain access. The bank called Keirans—who was pretending to be Woods—and Keirans convinced the bank employee that the real Woods should not have access to the accounts. The Los Angeles Police Department then arrested the real Woods and charged him with identity theft after Keirans provided officers with false documents and information.

In a nightmarish twist, during judicial proceedings, the real Woods accurately maintained that “William Donald Woods” was his true identity, prompting the court to order him to a mental institution. The real Woods ultimately spent 428 days in jail and 147 days in a mental hospital before his release.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleVivo V30 Lite 4G – Price in India, Specifications (6th April 2024)
Next Article 3 underrated Netflix movies you should watch this weekend (April 5-7)

Related Articles

News

Review: ROG Xbox Ally and ROG Xbox Ally X

16 October 2025
News

The Best Swimming Headphones

16 October 2025
News

Federal Workers Are Being Used as Pawns in the Shutdown

16 October 2025
News

20 Practical Gift Ideas for Exhausted New Parents

15 October 2025
News

The Best Travel Tote for Digital Nomads Who Never Log Off

15 October 2025
News

The AI Industry’s Scaling Obsession Is Headed for a Cliff

15 October 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024105 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202492 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

The Best Travel Tote for Digital Nomads Who Never Log Off

News Room15 October 2025
News

The AI Industry’s Scaling Obsession Is Headed for a Cliff

News Room15 October 2025
Gaming

Wizarding Life Sim Witchbrook Delayed To 2026

News Room15 October 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025130 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024105 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Does The Outer Worlds 2 Take Into Account Any Endings From The First Game?

15 October 2025

20 Practical Gift Ideas for Exhausted New Parents

15 October 2025

The Best Travel Tote for Digital Nomads Who Never Log Off

15 October 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.