Artificial intelligence (AI), according to cybersecurity professionals, might be a key component in averting ransomware attacks at K–12 institutions. There were roughly 1,619 ransomware assaults on school systems between 2016 and 2022, K12 Security Information Exchange (K12 SIX) stated.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Microsoft’s Rise as a Cybersecurity Powerhouse
Tech titan Microsoft has emerged as an unexpected yet potent competitor in the cybersecurity industry in a time of rapid digital transformation and rising cyber threats. The company has quickly evolved from its conventional position to become a cybersecurity juggernaut,…
The Role of Cryptography in Data Safety
By using codes, the information security strategy of cryptography shields business data and communications from online threats. Security professionals describe it as the art of concealing information to guard against unauthorised access to your data. This technique employs mathematical…
Google Removes 22 Malicious Android Apps Exposed by McAfee
Google recently took action against 22 apps that are available on the Google Play Store, which has alarmed Android users. These apps, which have been downloaded over 2.5 million times in total, have been discovered to engage in harmful behavior…
U.S. Intelligence Reports: Spies and Hackers are Targeting US Space Industry
U.S. intelligence agencies have recently issued a warning against foreign spies who are targeting the American space industry and executing cyberattacks against the country’s satellite infrastructure. The U.S. Office of the Director of National Intelligence’s National Counterintelligence and Security Center…
Tesla Data Breach: 75,000 Users Affected Due to Insider Wrongdoing
There has been an investigation into a data breach that affected the car manufacturer Tesla earlier this year, which has ended up being the result of “insider wrongdoing”, a data breach notification filed by Tesla has revealed. A notice…
Cyberattack Strikes Australian Energy Software Company Energy One
Energy One, an Australian company specializing in software solutions and services for the energy industry, has fallen victim to a cyber assault. In an announcement made on Monday, the company revealed that the breach was identified on August 18…
SA may Surpass the ‘Nigerian Prince,’ Becoming Africa’s New Cybercrime Capital
A surge in cybercrime activities can be witnessed in South Africa, which poses a threat to surpass the notorious “Nigerian Prince” scams and make SA the continent of Africa’s epicenter of this crime. Notably, the rise is despite the passing…
Cuba Ransomware Targets U.S. Organizations via Veeam Exploit
The notorious Cuba ransomware group has leveraged a vulnerability in the popular Veeam software to launch attacks on critical organizations within the United States. This breach underscores the escalating sophistication of cybercriminals and the pressing need for robust cybersecurity measures.…
Cybersecurity Concerns: When Mental Health Queries Become Malware Magnets
‘Beyond Identity’ recently published a study that showed that certain mental health search terms can open users up to the possibility of meeting malware as a result of their search. Using searches related to mental health that were high…
XLoader macOS Malware Variant Disguised as ‘OfficeNote’ Productivity App
A fresh variant of the Apple macOS malware known as XLoader has emerged, disguising its malicious intent through an office productivity app named “OfficeNote,” according to cybersecurity experts from SentinelOne. In an analysis released on Monday, researchers Dinesh Devadoss…
Thousands of Malicious Android Apps are Employing Covert APKs to Bypass Security
To avoid malware detection, threat actors are employing Android Package (APK) files with unknown or unsupported compression algorithms. That’s according to findings from Zimperium, which discovered 3,300 artefacts using such compression algorithms in the wild. 71 of the discovered…
Interpol Operation: 14 Arrested, Allegedly Involved in Scamming Victims of $40 Million
Another Interpol operation detained 14 suspects and identified 20,674 suspected networks spread across 25 African nations that international law enforcement has connected to more than $40 million in losses due to cybercrime. Operation Africa Cyber Surge II The police operation,…
Secure Your Wi-Fi: Spot Hacking Signs and Preventive Tips
The discussion around being cautious regarding security while utilizing public Wi-Fi networks is well-known due to the susceptibility of these networks to compromise by criminals. Yet, it’s essential to recognize that private Wi-Fi networks are also vulnerable to hacking.…
Tesla Begins Notifying Individuals Impacted in a Data Breach Incident
Tesla has acknowledged a data breach affecting around 75,000 individuals, but the incident is the result of a whistleblower leak rather than a malicious attack. The company informed US authorities that a data breach found in May exposed the…
North Korean Hackers Swipe $200M in 2023 Crypto Heists
North Korean hackers had been effective in fleeing with an incredible $200 million in various cryptocurrencies in the year 2023 in a series of clever cyber heists. North Korea’s alarming increase in crypto thefts has not only put the whole…
Behind Closed Cyber Doors: 50 Ransomware Negotiations’ Unexpected Insights
A cybersecurity expert will usually recommend that negotiators should be avoided when trying to resolve the issue of ransomware hackers. A victim recently defied conventional wisdom and attempted to negotiate with their attackers on December 30, 2020, despite their…
Understanding Blagging in Cybersecurity: Tactics and Implications
Blagging might sound intricate, resembling an elaborate hacking maneuver, yet it is remarkably simpler. Despite its less “high-tech” nature compared to other cybercrimes, blagging can inflict significant harm if businesses are unprepared. Blagging involves crafty fraudsters attempting to deceive…
Microsoft Discovers BlackCat’s Sphynx Ransomware Exploiting Impacket & RemCom
A new strain of ransomware known as BlackCat’s Sphynx has recently been discovered by cybersecurity researchers at Microsoft. It has gained notice because it incorporates advanced hacking tools like Impacket and RemCom. This finding highlights the increasing sophistication and power…
Datafication: What is it and Why is it Important ?
While the word ‘datafication’ will sound like an irrelevant word, being forgotten as years went by, it actually hold much importance and impacts individual on a significant basis. And, it is not the same as ‘digitization.’ But, before this conclusive…
Top Five Cybersecurity Challenges in the AI Era
The cybersecurity industry is fascinated by artificial intelligence (AI), which has the ability to completely change how security and IT teams respond to cyber crises, breaches, and ransomware assaults. However, it’s important to have a realistic knowledge of the…
Satellite Security Breached: Hackers Pocket $50K for Exploiting US Air Force Defenses
An impressive security exercise was conducted during the annual “Hack-A-Sat” competition within the US Air Force during which hackers managed to successfully compromise a satellite in orbit. MHACKeroni, an Italian team that emerged as the winner of the competition,…
Responsibilities of an HR to Strengthen Their Company’s Cyber Defenses
Suppose a company is hit by a ransomware attack today, who will the company personnel call or rely on, to remediate their issue. Most probably, a cybersecurity expert. However, companies nowadays go numb in the initial hours of the incident,…
Here’s How to Prevent AI From Cracking Your Password
The world has begun to explore the powers of artificial intelligence and what it can accomplish with a little help. While some individuals are worried about AI, others are eager to discover novel techniques that they can benefit from. …
Guarding Your Finances: The Art of Phishing Attacks and Social Engineering
Malware, hacking techniques, botnets, and other types of technologies are becoming increasingly sophisticated as cyber crimes become more sophisticated. Nevertheless, online criminality exploits tactics that have been refined over decades by criminals long before the internet existed. A cybercriminal…
ChatGPT Joins Data Clean Rooms for Enhanced Analysis
ChatGPT has now entered data clean rooms, marking a big step toward improved data analysis. It is expected to alter the way corporations handle sensitive data. This integration, which provides fresh perspectives while following strict privacy guidelines, is a turning…
Boost Cybersecurity: HR’s Key Role in Guarding Your Business
If your company were to fall victim to ransomware today, whom would you contact? Or perhaps a more pertinent question: How would you go about contacting them? This scenario might appear ludicrous, there are instances where organizations have been…
Ransomware Attack Disrupts Real Estate Property Listing Services in US
One of the functions of real estate agents – their ability to list and update property information – has recently been taken away in a cyberattack. The attack transpired in a California-based data service company – Rapattoni – a multiple…
Rising Concerns as Discord.io Data Breach Compromises 760,000 Users
Although digital companies have multiple data protections in place to safeguard their customers’ information, hackers continue to find ways to circumvent them and gain access to sensitive data even though they have multiple data protections in place to safeguard…
Decoding Cybercriminals’ Motives for Crafting Fake Data Leaks
Companies worldwide are facing an increasingly daunting challenge posed by data leaks, particularly due to the rise in ransomware and sophisticated cyberattacks. This predicament is further complicated by the emergence of fabricated data leaks. Instead of genuine breaches, threat…
Monti Ransomware Strikes Government Systems Again
The notorious Monti ransomware has made an ominous comeback and is now targeting government organizations. Recent reports from cybersecurity professionals indicate that this malware version has reappeared with a new and powerful encryptor, specifically targeting Linux-powered devices. The cybersecurity community…
Infostealer Malware Exposes Over 100K Accounts From Hacking Forums
Security experts identified over 140,000 compromised passwords linked to accounts on hacker forums after their owners were infected with data-stealing malware. Hudson Rock searched its cybercrime intelligence database for infected computers with credentials connected with the top 100 cybercrime…
Grooming Cases Reach Unprecedented Heights Amidst Regulatory Delays
Campaigners are calling for no more delays in the online safety bill, which is being pushed by the Government, as thousands of crimes related to online grooming have been reported during the wait for updated online safety laws. There…
Zen 1 Vulnerability AMD Patchwork Proved Weak, Second Pass Issued
While AMD engineers have already patched their Zen 1 “Division by Zero” bug, it was not the end of their problems, as the company may have released a patch quickly, but perhaps a little too quickly: claims Borislav Petkov, an…
Multiple Severe Flaws Uncovered in CyberPower and Dataprobe Products
Alarm bells are ringing for the security of critical data centre operations after a number of security flaws were uncovered in Dataprobe’s iBoot power distribution unit (PDU) and CyberPower’s PowerPanel Enterprise Data Centre Infrastructure Management (DCIM) platform. The consequences…
Stay Informed: A Guide to ‘Juice Jacking’ Risks Before Your Next Airport Journey
While it might be amusing to imagine “juice jacking” as a playful term for enjoying complimentary beverages at your hotel’s juice bar, the reality is far from lighthearted. The FBI has recently released a travel advisory alerting passengers to…
Scammers Exploit Kids with Fake Fortnite and Roblox Offers
Children are increasingly the targets of sophisticated internet fraud in an era where digital connections predominate. Recent studies point to a concerning pattern where con artists leverage children’s love of well-known video games like Fortnite and Roblox to commit marketing…
Election Security: Lawmakers Will Introduce New Machines Against Defcon Hackers
August is marked as a busy month for computer hackers, since they attempt to break into the election equipment of the Las Vegas conference hall with their USB sticks, screwdrivers or bare fingertips, with one goal: discovering new and more…
Discord.io Acknowledges Data Breach: Hacker Exposes Information of 760K Users
The Discord.io custom invitation service has temporarily ceased its operations due to a data breach that has exposed the personal details of approximately 760,000 members. Discord.io, while not an official Discord platform, functions as a third-party service that enables…
New Indian Data Protection Framework: Data Usage and Ground Rules
The DPDP (Digital Personal Data Protection) Act that was passed by Parliament during the just-passed monsoon session of the Indian Parliament is now in force with the President giving assent to it. With the passing of this law, individuals…
IBM MOVEit Hack Exposes Data of 4 Million US Citizens
Millions of Americans had their private medical and health information stolen after attackers hacked into systems operated by tech giant IBM and exploited a zero-day flaw in the widely used MOVEit file transfer software. The MOVEit major hacks exposed…
Preserving Consumer Trust Through Data Privacy
Data privacy emerges as a crucial cornerstone in preserving consumer trust in today’s digitally driven environment when connected devices and seamless online experiences have become the standard. As data-driven technologies proliferate quickly, strict security controls are required to protect sensitive…
QWIXXRAT: A Fresh Windows RAT Emerges in the Threat Landscape
In early August 2023, the Uptycs Threat Research team uncovered the presence of a newly identified threat, the QwixxRAT, also referred to as the Telegram RAT. This malicious software was being promoted and distributed via platforms such as Telegram…
Avada Theme and Plugin Witnesses Critical Vulnerabilities
Several vulnerabilities have been discovered in the popular Avada theme and its companion Avada Builder plugin by security researcher Rafie Muhammad from Patchstack, who revealed that many WordPress websites are vulnerable to these flaws. Avada Theme and Plugin Avada theme…
Tech Giants Threaten UK Exit Over Privacy Bill Concerns
As US tech giants threaten to sever their links with the UK, a significant fear has emerged among the technology sector in recent days. This upheaval is a result of the UK’s proposed privacy bill, which has shocked the IT…
New Cyber Threat: North Korean Hackers Exploit npm for Malicious Intent
There has been an updated threat warning from GitHub regarding a new North Korean attack campaign that uses malicious dependencies on npm packages to compromise victims. An earlier blog post published by the development platform earlier this week claimed…
Five Reasons Why Network Security Is Paramount
Governments, organisations, and individuals who own computers all require exceptional network security.What is it exactly? It’s a preventative strategy to keep your network and data safe from malware, unauthorised users, and other risks. Numerous hardware components and tools, including…
Defend Against Phishing with Multi-Factor Authentication
Phishing has been a favored attack vector for threat actors for nearly three decades, and its utilization persists until it loses its effectiveness. The success of phishing largely hinges on exploiting the weakest link in an organization’s cybersecurity chain—human…
Security Concerns Surrounding Microsoft OneDrive for Businesses
Microsoft OneDrive has undoubtedly revolutionized the way businesses store and access their data, offering a convenient cloud storage solution. However, recent developments suggest that this widely used platform could inadvertently become a significant security threat to businesses, potentially compromising sensitive…
MasterClass: Online Learning Platform Accused of Violating Customer Privacy by Sharing Info to Meta
Online learning platform MasterClass has been charged for using trackers, transmitting certain customer data to Meta for advertisement purposes without users’ consent. In regards to the case, the law firm Milberg Coleman Bryson Phillips Grossman, PLLC has been gathering the…
Here’s Why You Need to Read Privacy Policy Before Giving Consent
Over the last quarter-century, privacy policies—the lengthy, complex legal language you quickly scan through before mindlessly clicking “agree”—have grown both longer and denser. The average length of a privacy policy quadrupled between 1996 and 2021, according to a study…
EvilProxy Phishing Campaign Targets Microsoft 365 Executives Worldwide
Cybercriminals have launched an EvilProxy phishing campaign with the aim of infiltrating thousands of Microsoft 365 user accounts across the globe. Over a span of three months from March to June, the attackers distributed a barrage of 120,000 phishing…
Operation Jackal: INTERPOL Shuts Down African Cybercrime Gang
A recent operation by INTERPOL on the West African cybercrime organization led to several bank accounts being frozen, with suspects detained and a series of financial investigations organized worldwide. Operation Jackal, conducted between May 15 and 29, apparently mobilized police…
Here’s How You Can Remove Private Info From Google Search Results
Have you ever come across something about yourself that was private or secret in a search engine result? That would not only be embarrassing, but it might also raise security risks like identity theft. Google is trying to make…
Innovative ‘Brain-Like’ Chip Could Transform AI Landscape with Eco-Friendly Promise
Using a prototype chip that looks like a brain, IBM, one of the world’s most respected technology giants, says it may be possible to increase the efficiency of artificial intelligence (AI) by enhancing energy efficiency. The advancement addresses the…
Emerging Technology Facilitating Increased Vehicle Thefts and Accidents by Criminals
The automotive industry is abuzz with discussions about the “Internet of vehicles” (IoV), which envisions a network of interconnected cars and other vehicles capable of sharing data via the Internet. The goal is to revolutionize transportation by enhancing its…
DBS Bank Reveals Big ‘Data Challenges’ With AI Use
In a bid to adopt Artificial Intelligence (AI) to its operations, DBS Bank had to face several challenges. While doing the same, however, the company realized that doing so goes beyond just figuring out the training models. Data turned out to…
Defending Against Stealer Log Cyber Threats
Cyber attacks are a serious concern in a digital environment that is becoming more linked. Silent cyber threats have become more common among the many different types of cyberattacks because of their covert nature and potentially disastrous outcomes. The stealer…
Safeguarding Personal Data in the Wake of Hacks and Leaks
The security of personal data has become a top priority in the current digital era. With recent events like the Northern Ireland data breach, people are understandably concerned about the security of their personal data after a hack or leak.…
CISA Advises Firms to Adopt Passwordless Security in LAPSUS$ Report
A series of high-profile cyber attacks carried out by teenage hackers in 2021 and 2022 reveals systemic flaws in the telecommunications industry and security practices employed by a number of businesses, according to a Department of Homeland Security investigation. …
Notorious Global Phishing Platform Neutralized in Cross-Border Operation
There were arrests made of two alleged operators of the phishing-as-a-service platform “16shop” by INTERPOL in Indonesia and Japan after the agency carried out a successful investigation into the scheme, which was outsourced. A research project that investigated cyber…
Revolutionizing Everyday Life: The Transformative Potential of AI and Blockchain
Artificial intelligence (AI) and blockchain technology have emerged as two pivotal forces of innovation over the past decade, leaving a significant impact on diverse sectors like finance and supply chain management. The prospect of merging these technologies holds tremendous…
Digital Disaster: Electoral Commission Data Breach Leaves 40 Million UK Voters Exposed
In the wake of the revelation that a hostile cyber-attack between February and May of last year was able to access the data of 40 million voters without being detected, along with the lack of notification to the public…
Novel Downfall Bug is Targeting Intel CPUs to Steal Encryption Keys, and Data
Remember those severe Meltdown and Spectre CPU bugs that were discovered nearly five years ago? Intel is once again in hot water due to a severe vulnerability that impacts chips dating back years. The vulnerability, dubbed “Downfall,” exploits a…
North Korean Hackers Breach Russia’s Top Missile Maker’s Data
Reuters reported on Tuesday about a North Korea-based elite hacker group that is in a bid to steal technology by covertly breaching the computer networks of a Russian missile developer giant. Apparently, the hackers have been running the campaign for…
OpenAI’s GPTBot: A New Era of Web Crawling
OpenAI, the pioneering artificial intelligence research lab, is gearing up to launch a formidable new web crawler aimed at enhancing its data-gathering capabilities from the vast expanse of the internet. The announcement comes as part of OpenAI’s ongoing efforts to…
Zoom Refutes Claims of AI Training on Calls Without Consent
Zoom has revised its terms of service following concerns that its artificial intelligence (AI) models were being trained on customer calls without consent, leading to a backlash. In response, the company clarified in a blog post that audio, video,…
LockBit Attack: Ransomware Gang Threatens to Leak Cancer Patients’ Medical Data
LockBit ransomware group recently revealed its intent to leak private medical data of cancer patients, stolen in the breach on Varian Medical Systems. Varian, a subsidiary of Siemens Healthineeres, provides software for the oncology department’s applications and specializes in offering…
37% of Third-party Applications have High-risk Permissions
Recent data analysis reveals a significant increase in the integration of third-party apps with email platforms. This trend underscores the rapid expansion of a new avenue of vulnerability that cybercriminals are exploiting, demonstrating their ongoing evolution in attack strategies. The…
Adobe Patches 30 Acrobat, Reader Vulnerabilities
Adobe has recently released a large batch of security updates for its flagship Acrobat and Reader software, patching at least 30 vulnerabilities affecting Windows and MacOS installations. In this blog post, we’ll take a closer look at the details of…
Fines for Facebook Privacy Breaches in Norway Crack Down on Meta
A fine of 1 million crowns ($98,500) will be imposed on the owner of Facebook, Meta Platforms, by the Norwegian Data Protection Authority (Datatilsynet) starting August 14 due to a privacy breach that occurred before that date. A significant…
Zoom Declines Training AI on Calls Without Approval
In response to criticism that it trained its artificial intelligence (AI) models on client calls, Zoom revised its terms of service. The company emphasised that chats, audio, and video were never utilised for AI without permission in a blog…
AI Eavesdrops on Keystrokes with 95% Accuracy
An advanced artificial intelligence (AI) model recently showed a terrifying ability to eavesdrop on keystrokes with an accuracy rate of 95%, which has caused waves in the field of data security. This new threat highlights potential weaknesses in the security…
Dark Web Grows Stronger. And So Does the Value of Monitoring
The Growing Threat of the Dark Web The Dark Web is rapidly growing along with the variety of cybercrime, and so is the value in monitoring it. The cybercrime ecosystem now not only includes private communications platforms like I2P and…
Colorado Department of Higher Education Attacked by Ransomware
The Colorado state government has issued a cautionary message to both students and educators regarding a potential security breach. The incident involves unauthorized access to personal information dating back to 2004. As stated on the official website of the…
Worldwide Tailor-Made Massive Phishing Campaign
The spotlight turned towards a worldwide phishing campaign when an incident unfolded involving an Imperva staff member who was singled out and almost ensnared by a social engineering assault. Imperva, situated in San Mateo, California, operates as a cybersecurity company.…
Experts Alert Travelers Against Sharing Photos of Boarding Passes Online
After giving hours to work – each day, every week, for months – checking in at the airport possibly represents an exciting time, for travelers who have waited long for the much-needed rest and recreation. One may also want to…
Elon Musk’s X Steps Up: Pledges Legal Funds for Workers Dealing with Unfair Bosses
In a recent interview, Elon Musk said that his company X social media platform, formerly known as Twitter, would cover members’ legal bills and sue those whose jobs are unfairly treated by their employers for posting or liking something…
Two-Thirds of UK Websites are at Risk from Malicious Bots
Two thirds (66%) of UK firms are defenceless against straightforward bot assaults, according to the UK Bot Security Report from DataDome. Security experts draw attention to the risky position that this puts UK firms in given the rising threat…
Govt Proposes Rs 250 Cr Fine for Consumer Data Leaks
The Indian government has proposed a fine of up to Rs 250 crore on enterprises found guilty of disclosing customer data, which is a significant step toward bolstering data protection procedures. This action is a component of the Data Protection…
This Ransomware Targets Several English-Speaking Nations
According to findings by Cisco Talos, a group of researchers, a fresh variant of ransomware is suspected to be employed in a series of attacks on entities situated in China, Vietnam, Bulgaria, and a number of English-speaking nations. The…
North Korean Hackers Infiltrate Russian Missile Engineering Firm
A sanctioned Russian missile engineering business was successfully penetrated by North Korean hackers, it has been revealed in an astonishing development, prompting worries about the possible repercussions of this security breach. The event shows how North Korea’s cyberwarfare capabilities…
Stay Safe Online: How to Protect Yourself from Pass-the-Cookie Attacks
What is a Pass-the-Cookie Attack? A pass-the-cookie attack is a way to bypass authentication in a web application using a stolen session cookie. When a user logs in to any application on the Internet, a session cookie is created in…
Multi-State Cyberattack Disrupts Health Care Services in Multiple States
One of the California organizations faced a cyberattack this week which resulted in some services being shut down at affiliated locations and some patients having to rely solely on paper records. The cyberattack disrupted hospital computer systems in several…
With 95% Accuracy, New Acoustic Attack can Steal from Keystrokes
UK universities’ researchers have recently developed a deep learning model, designed to extract information from keyboard keystrokes collected using a microphone, with 95% accuracy. The prediction accuracy decreased to 93% when Zoom was used to train the sound classification algorithm,…
U.S. Hunts Chinese Malware Halting Military Operations
The Biden administration is looking for malware that may jeopardise military and civilian power grids, communications systems, and water supplies, the New York Times reported. The malware, which is believed to have been installed by Chinese hackers linked to…
Clop Ransomware Adopts Torrents for Data Leaks in Effort to Evade Detection
The Clop ransomware group has once again adjusted its tactics for extortion, now employing torrents to disseminate stolen information obtained from MOVEit attacks. Beginning on May 27th, the Clop ransomware syndicate initiated a series of data theft assaults by…
Generative AI Has an Increasing Effect on the Workforce and Productivity
In a recent report published by KPMG, it was revealed that an overwhelming 97% of participants anticipate a significant or exceedingly substantial influence of generative AI on their respective organizations within the upcoming 12 to 18 months. Furthermore, the survey…
Cybersecurity Companies Offer Technology Stack Incorporating Zero Trust Edge
The rapid surge in cyberattacks delivering destructive payloads, including ransomware, is due to organisations’ complacency with legacy IAM, VPN, and perimeter-based network security systems. CISOs tell VentureBeat that hardware-based systems, which were never intended to guard beyond perimeters, are…
A Software Vulnerability in AMD’s Chip Compromises Tesla’s Paid Features
There is an AMD-based infotainment system vulnerability that can be exploited by researchers from the Technical University of Berlin to unlock restricted vehicle features, according to research. As a result, it has become particularly noticeable in vehicles that provide…
Worldcoin’s Verification Process Under Scrutiny After CertiK’s Discovery
Blockchain security company CertiK recently revealed a severe flaw that put the Worldcoin system at serious risk. The system’s security and integrity might have been compromised if the vulnerability allowed Orb operators unrestricted access. Users’ iris information was collected as…
Autonomous-Car Technology May Possess a Threat to Privacy
Self-driving, which was only possible in science fiction has now become something very common, a reality for people in San Francisco. Other places too, in the US, have been testing the technology. However, with new innovation comes its consequences. Here,…
How to Tell if a Company Is Selling Your Email Address
Have you ever signed up for a new website and then all of a sudden started getting emails from businesses and service providers you had never heard of? If so, there is a very good chance that your data…
Hospitals Paralyzed by Cyberattack, Emergency Services Diverted
Several hospitals in Pennsylvania and California were compelled to close their emergency departments and redirect incoming ambulances due to a recent uptick in cyberattacks, which created a frightening situation. The hack, which targeted the healthcare provider Prospect Medical Holdings, has…
Amazon Executive Lacks Data for Return-to-Office Mandate
Amazon employees are expressing discontent over the company’s recent decision to revoke remote work flexibility, and the situation has been exacerbated by comments made by a senior executive. During an internal staff meeting, Mike Hopkins, the SVP of Amazon…
Worldcoin’s Iris-Scanning Technology: A Game-Changer or a Privacy Concern
Worldcoin, a cryptocurrency and digital ID project co-founded by OpenAI CEO Sam Altman, has recently announced its plans to expand globally and offer its iris-scanning and identity-verification technology to other organizations. The company, which launched last week, requires users to…
Tricky Malware Uses Versioning to Outsmart Google Play Store Scanners
In recent developments, threat actors are using a technique known as “versioning” to evade Google Play Store’s malware detection mechanisms, posing a significant risk to Android users. This method allows them to specifically target users and compromise their sensitive information,…
Hackers Have Scored Unlimited Airline Miles, Targeting One Platform
TRAVEL REWARDS PROGRAMS, such as those provided by hotels and airlines, highlight the unique benefits of joining their club over others. However behind the scenes, several of these programs—including Delta SkyMiles, United MileagePlus, Hilton Honors, and Marriott Bonvoy—share the same…
US Senators Propose Privacy Reform to Tame Artificial Intelligence
The US Senate is now debating the necessity for privacy legislation in light of the development of generative artificial intelligence (AI). While AI businesses like OpenAI and Google continue to create and use cutting-edge technologies, lawmakers are wrestling with…
Contemplating Import Restrictions for PCs and Laptops to Secure Digital Infrastructure
Although it is common practice for the government to introduce new policies hurriedly, especially when it comes to the recent licensing requirement for all-in-one personal computers (PCs), laptops, tablets, and servers, it was pushed three months back to 1…