Over the past two years, Scattered Spider has emerged as one of the most prolific and dangerous sets of hackers currently operating. The threat actors are not a well-defined group of hackers. Instead, they’re more a loose collective that uses social engineering—such as phishing and voice calls—to gain initial access …
Read More »Security
Mike Waltz Has Somehow Gotten Even Worse at Using Signal
On ThursdaY, Reuters published a photo depicting then-United States national security adviser Mike Waltz checking his phone during a cabinet meeting held by President Trump in the White House. If you enlarge the portion of the image that captures Waltz’s screen, it seems to show him using the end-to-end encrypted …
Read More »Think Twice Before Creating That ChatGPT Action Figure
Any data, prompts, or requests you share helps teach the algorithm—and personalized information helps fine tune it further, says Jake Moore, global cybersecurity adviser at security outfit ESET, who created his own action figure to demonstrate the privacy risks of the trend on LinkedIn. Uncanny Likeness In some markets, your …
Read More »North Korea Stole Your Job
Even security experts can be fooled. In July 2024, Knowbe4, a Florida-based company that offers security training, discovered that a new hire known as “Kyle” was actually a foreign agent. “He interviewed great,” says Brian Jack, KnowBe4’s chief information security officer. “He was on camera, his résumé was right, his …
Read More »AI Code Hallucinations Increase the Risk of ‘Package Confusion’ Attacks
AI-generated computer code is rife with references to non-existent third-party libraries, creating a golden opportunity for supply-chain attacks that poison legitimate programs with malicious packages that can steal data, plant backdoors, and carry out other nefarious actions, newly published research shows. The study, which used 16 of the most widely …
Read More »WhatsApp Is Walking a Tightrope Between AI Features and Privacy
Last year, Apple debuted a similar scheme, known as Private Cloud Compute, for its Apple Intelligence AI platform. And users can turn the service on in Apple’s end-to-end encrypted communication app, Messages, to generate message summaries and compose “Smart Reply” messages on both iPhones and Macs. Looking at Private Cloud …
Read More »Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi
Below is a video of the Oligo researchers demonstrating their AirBorne hacking technique to take over an AirPlay-enabled Bose speaker to show their company’s logo for AirBorne. (The researchers say they didn’t intend to single out Bose, but just happened to have one of the company’s speakers on hand for …
Read More »Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show
What is also clear from the documents is that US police are aware of the control corporations have over their ability to acquire vehicle location data, expressing fears that they could abruptly decide to kill off certain capabilities at any time. In a letter sent in April 2024 to the …
Read More »Pete Hegseth’s Signal Scandal Spirals Out of Control
As the Trump administration’s aggressive immigration policy ramps up, people have started to seriously consider their privacy and security when crossing into the United States. That’s especially true when it comes to searches of travelers’ phones and other devices, which US Customs and Border Protection agents have broad authority to …
Read More »Protecting Your Phone—and Your Privacy—at the US Border
Lauren Goode: I think Katie should go first. She’s the boss. Katie Drummond: So as you all know, because I can’t stop talking about it, I recently returned from France, and one thing in particular that I am now pathologically fixated on, that I am recommending to all of you, …
Read More »