Category: AI in news

New Blog Moderation Policy There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. It’s gotten so bad that I need to do something. My options are limited because I’m…

Read More

Microsoft has acknowledged the criticisms and recently outlined several privacy enhancements: Recall will now be switched off by default, and users are required to first enroll with Microsoft’s Windows Hello authentication system.  In an update to a previous blog post on Thursday, Microsoft outlined plans to delay the full launch, which was due to be made available…

Read More

“We can call it a backdoor, a front door, or ‘upload moderation’.” But whatever we call it, each one of these approaches creates a vulnerability that can be exploited by hackers and hostile nation states.” Amandine Le Pape, co-founder and COO of secure messaging platform Element, expressed similar privacy-focused concerns. “We’re disappointed in signs that…

Read More

The controversial spyware Pegasus and its operator, the Israeli NSO Group, is once again in the news. Last week, in documents filed in a judgment between NSO and WhatsApp, they admitted that any of their clients can target anyone with their spyware, including government or military officials because their jobs are inherently legitimate intelligence targets.…

Read More

Jun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an unnamed security researcher exploited an “extremely critical” zero-day flaw in its platform to steal $3 million in digital assets and refused to return them. Details of the incident were shared by Kraken’s Chief Security Officer, Nick Percoco, on X (formerly Twitter), stating it…

Read More

Jun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed utilizing multiple persistence mechanisms in order to maintain unfettered access to compromised environments. “Persistence mechanisms encompassed network devices, hypervisors, and virtual machines, ensuring alternative channels remain…

Read More

While AMD confirmed that it is investigating the alleged breach, IntelBroker has posted previews of stolen data that include employee database, customer database, source codes, and firmware data. Sensitive data offered in exchange for crypto In the post on Breach Forums, IntelBroker outlined the extent of the data breach, claiming to have accessed various types…

Read More

Jun 19, 2024The Hacker NewsGDPR Compliance / Data Privacy Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does…

Read More

The Hacking of Culture and the Creation of Socio-Technical Debt Culture is increasingly mediated through algorithms. These algorithms have splintered the organization of culture, a result of states and tech companies vying for influence over mass audiences. One byproduct of this splintering is a shift from imperfect but broad cultural narratives to a proliferation of…

Read More

Jun 19, 2024NewsroomMalware / Cyber Attack Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer (MSI) files for virtual private networks (VPNs) to deliver a command-and-control (C&C) framework called Winos 4.0. “The campaign also promotes compromised MSI files embedded with nudifiers and deepfake pornography-generating software,…

Read More