Category: AI in news
New Blog Moderation Policy There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. It’s gotten so bad that I need to do something. My options are limited because I’m…
Read MoreMicrosoft has acknowledged the criticisms and recently outlined several privacy enhancements: Recall will now be switched off by default, and users are required to first enroll with Microsoft’s Windows Hello authentication system. In an update to a previous blog post on Thursday, Microsoft outlined plans to delay the full launch, which was due to be made available…
Read More“We can call it a backdoor, a front door, or ‘upload moderation’.” But whatever we call it, each one of these approaches creates a vulnerability that can be exploited by hackers and hostile nation states.” Amandine Le Pape, co-founder and COO of secure messaging platform Element, expressed similar privacy-focused concerns. “We’re disappointed in signs that…
Read MoreThe controversial spyware Pegasus and its operator, the Israeli NSO Group, is once again in the news. Last week, in documents filed in a judgment between NSO and WhatsApp, they admitted that any of their clients can target anyone with their spyware, including government or military officials because their jobs are inherently legitimate intelligence targets.…
Read MoreJun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an unnamed security researcher exploited an “extremely critical” zero-day flaw in its platform to steal $3 million in digital assets and refused to return them. Details of the incident were shared by Kraken’s Chief Security Officer, Nick Percoco, on X (formerly Twitter), stating it…
Read MoreJun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed utilizing multiple persistence mechanisms in order to maintain unfettered access to compromised environments. “Persistence mechanisms encompassed network devices, hypervisors, and virtual machines, ensuring alternative channels remain…
Read MoreWhile AMD confirmed that it is investigating the alleged breach, IntelBroker has posted previews of stolen data that include employee database, customer database, source codes, and firmware data. Sensitive data offered in exchange for crypto In the post on Breach Forums, IntelBroker outlined the extent of the data breach, claiming to have accessed various types…
Read MoreJun 19, 2024The Hacker NewsGDPR Compliance / Data Privacy Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does…
Read MoreThe Hacking of Culture and the Creation of Socio-Technical Debt Culture is increasingly mediated through algorithms. These algorithms have splintered the organization of culture, a result of states and tech companies vying for influence over mass audiences. One byproduct of this splintering is a shift from imperfect but broad cultural narratives to a proliferation of…
Read MoreJun 19, 2024NewsroomMalware / Cyber Attack Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer (MSI) files for virtual private networks (VPNs) to deliver a command-and-control (C&C) framework called Winos 4.0. “The campaign also promotes compromised MSI files embedded with nudifiers and deepfake pornography-generating software,…
Read MoreRecent Posts
- Global infostealer malware operation targets crypto users, gamers
- Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks
- Ukraine Bans Telegram Use for Government and Military Personnel
- LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO
- False claims of hacked voter data – Week in security with Tony Anscombe