Category: Security Latest

The US Navy Has Run Out of Pants

Plus: The US intelligence community formally blames Iran for Trump campaign hack, aircraft-tracking platform FlightAware says a “configuration error” exposed sensitive user data, and more. This article has been indexed from Security Latest Read the original article: The US Navy…

When War Came to Their Country, They Built a Map

The Telegram channel and website Deep State uses public data and insider intelligence to power its live tracker of Ukraine’s ever-shifting front line. This article has been indexed from Security Latest Read the original article: When War Came to Their…

The Slow-Burn Nightmare of the National Public Data Breach

Social Security numbers, physical addresses, and more—all available online. After months of confusion, leaked information from a background-check firm underscores the long-term risks of data breaches. This article has been indexed from Security Latest Read the original article: The Slow-Burn…

Your Gym Locker May Be Hackable

Security researchers say they’ve extracted digital management keys from select electronic lockers and revealed how they could be cloned. This article has been indexed from Security Latest Read the original article: Your Gym Locker May Be Hackable

The Hacker Who Hunts Video Game Speedrunning Cheaters

Allan “dwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that’s stood for 15 years. This article has been indexed from Security Latest Read the original article: The Hacker Who…

Computer Crash Reports Are an Untapped Hacker Gold Mine

One hacker solved the CrowdStrike outage mystery with simple crash reports, illustrating the wealth of detail about potential bugs and vulnerabilities those key documents hold. This article has been indexed from Security Latest Read the original article: Computer Crash Reports…

Inside the Dark World of Doxing for Profit

From tricking companies into handing over victims’ personal data to offering violence as a service, the online doxing ecosystem is not just still a problem—it’s getting more extreme. This article has been indexed from Security Latest Read the original article:…

A Flaw in Windows Update Opens the Door to Zombie Exploits

A researcher found a vulnerability that would let hackers strategically downgrade a target’s Windows version to reexpose patched vulnerabilities. Microsoft is working on fixes for the issue. This article has been indexed from Security Latest Read the original article: A…

How Project 2025 Would Put US Elections at Risk

Experts say the “nonsensical” policy proposal, which largely aligns with Donald Trump’s agenda, would weaken the US agency tasked with protecting election integrity, critical infrastructure, and more. This article has been indexed from Security Latest Read the original article: How…

Can GPT-4o Be Trusted With Your Private Data?

OpenAI’s newest model is “a data hoover on steroids,” says one expert—but there are still ways to use it while minimizing risk. This article has been indexed from Security Latest Read the original article: Can GPT-4o Be Trusted With Your…

Can ChatGPT-4o Be Trusted With Your Private Data?

OpenAI’s newest model is “a data hoover on steroids,” says one expert—but there are still ways to use it while minimizing risk. This article has been indexed from Security Latest Read the original article: Can ChatGPT-4o Be Trusted With Your…

A Senate Bill Would Radically Improve Voting Machine Security

This year’s Intelligence Authorization Act would mandate penetration testing for federally certified voting machines and allow independent researchers to work on exposing vulnerabilities. This article has been indexed from Security Latest Read the original article: A Senate Bill Would Radically…

How Infostealers Pillaged the World’s Passwords

Infostealer malware is swiping millions of passwords, cookies, and search histories. It’s a gold mine for hackers—and a disaster for anyone who becomes a target. This article has been indexed from Security Latest Read the original article: How Infostealers Pillaged…

Stop X’s Grok AI From Training on Your Tweets

Plus: More Pegasus spyware controversy, a major BIOS controversy, and more of the week’s top security news. This article has been indexed from Security Latest Read the original article: Stop X’s Grok AI From Training on Your Tweets

Europe Is Pumping Billions Into New Military Tech

The European Commission is allocating €7.3 billion for defense research over the next seven years. From drones and tanks of the future to battleships and space intelligence, here’s what it funds. This article has been indexed from Security Latest Read…

At the Olympics, AI Is Watching You

A controversial new surveillance system in Paris foreshadows a future where there are too many CCTV cameras for humans to physically watch. This article has been indexed from Security Latest Read the original article: At the Olympics, AI Is Watching…

At The 2024 Summer Olympics, AI Is Watching You

A controversial new surveillance system in Paris foreshadows a future where there are too many CCTV cameras for humans to physically watch. This article has been indexed from Security Latest Read the original article: At The 2024 Summer Olympics, AI…

This Machine Exposes Privacy Violations

A former Google engineer has built a search engine, WebXray, that aims to find illicit online data collection and tracking—with the goal of becoming “the Henry Ford of tech lawsuits.” This article has been indexed from Security Latest Read the…

Don’t Fall for CrowdStrike Outage Scams

Swindlers are spinning up bogus websites in an attempt to dupe people with “CrowdStrike support” scams following the security firm’s catastrophic software update. This article has been indexed from Security Latest Read the original article: Don’t Fall for CrowdStrike Outage…

Don’t Fall for CrowdStrike Outage Scams

Swindlers are spinning up bogus websites in an attempt to dupe people with “CrowdStrike support” scams following the security firm’s catastrophic software update. This article has been indexed from Security Latest Read the original article: Don’t Fall for CrowdStrike Outage…

J.D. Vance Left His Venmo Public. Here’s What It Shows

The Republican VP nominee’s Venmo network reveals connections ranging from the architects of Project 2025 to enemies of Donald Trump—and the populist’s close ties to the very elites he rails against. This article has been indexed from Security Latest Read…

The US Supreme Court Kneecapped US Cyber Strategy

After the Supreme Court limited the power of federal agencies to craft regulations, it’s likely up to Congress to keep US cybersecurity policy intact. This article has been indexed from Security Latest Read the original article: The US Supreme Court…

Spyware Users Exposed in Major Data Breach

Plus: The Heritage Foundation gets hacked over Project 2025, a car dealership software provider seems to have paid $25 million to a ransomware gang, and authorities disrupt a Russian bot farm. This article has been indexed from Security Latest Read…

The Sweeping Danger of the AT&T Phone Records Breach

Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security. This article has been indexed from Security Latest Read the original article:…

The $11 Billion Marketplace Enabling the Crypto Scam Economy

Deepfake scam services. Victim data. Electrified shackles for human trafficking. Crypto tracing firm Elliptic found all were available for sale on an online marketplace linked to Cambodia’s ruling family. This article has been indexed from Security Latest Read the original…

The Tech Crash Course That Trains US Diplomats to Spot Threats

The US State Department is training diplomats in cybersecurity, privacy, telecommunications, and other technology issues, allowing them to advance US policy abroad. This article has been indexed from Security Latest Read the original article: The Tech Crash Course That Trains…

Google Is Piloting Face Recognition for Office Security

Plus: A cloud company says notorious Russian hacker group APT29 attacked it, Chinese hackers use ransomware to hide their espionage campaigns, and a bank popular with startups discloses a cyberattack. This article has been indexed from Security Latest Read the…

War Crime Prosecutions Enter a New Digital Age

A custom platform developed by SITU Research aided the International Criminal Court’s prosecution in a war crimes trial for the first time. It could change how justice is enacted on an international scale. This article has been indexed from Security…

The Julian Assange Saga Is Finally Over

WikiLeaks founder Julian Assange has agreed to plead guilty to one count of espionage in US court on Wednesday, ending a years-long legal battle between the US government and a controversial publisher. This article has been indexed from Security Latest…

Red Tape Is Making Hospital Ransomware Attacks Worse

With cyberattacks increasingly targeting health care providers, an arduous bureaucratic process meant to address legal risk is keeping hospitals offline longer, potentially risking lives. This article has been indexed from Security Latest Read the original article: Red Tape Is Making…

US Bans Kaspersky Software

Using a Trump-era authority, the US Commerce Department has banned the sale of Kaspersky’s antivirus tools to new customers in the US, citing alleged threats to national security. This article has been indexed from Security Latest Read the original article:…

Perplexity Is a Bullshit Machine

A WIRED investigation shows that the AI search startup Perplexity is surreptitiously downloading your data. This article has been indexed from Security Latest Read the original article: Perplexity Is a Bullshit Machine

How to Spot a Business Email Compromise Scam

In this common email scam, a criminal pretending to be your boss or coworker emails you asking for a favor involving money. Here’s what do to when a bad actor lands in your inbox. This article has been indexed from…