On Monday, Indian minister of State for Information Technology Rajeev Chandrasekhar confirmed that the government will notify robust rules under the Information Technology Act in order to ensure compliance by platform in the country. Union Minister, on X, expressed gratitude…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Creator of ‘Ready Player One’ Ventures into Launching Metaverse
Oscar Wilde once humorously remarked that life imitates art, a sentiment that Ernest Cline, the author of the 2011 virtual reality adventure novel “Ready Player One,” seems to be embodying quite literally. Teaming up with Dan Farah, the producer…
Data is the Missing Piece in the AI Jigsaw, Here’s How to Bridge the Gap
The skills gap that is stifling development in artificial intelligence (AI) is well documented, but another aspect stands out: data complexity. According to a new IBM study, the most common barriers to AI success are limited AI skills and…
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction
There is a possibility that artificial intelligence (AI) models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and create…
Your iPhone is at risk – Signs of Viruses You Shouldn’t Ignore!
Apple usually excels in shielding us from spam and pop-ups. With the myriad functions Apple packs into iPhones, users engage in diverse activities, from work to photos and gaming. While iPhones are considered less susceptible to cyber threats than…
Surge in Police Adoption of Private Cameras for Video Evidence Raises Privacy Concerns
Major cities like Los Angeles and Washington, D.C., are gearing up to establish Real-Time Crime Centers, positioned as pivotal hubs for the seamless integration of various police technologies and data. Described as a “nerve center,” these facilities typically amalgamate…
Unused Apps Could Still be Tracking and Collecting User’s Data
While almost everyone in this era is glued to their smartphones for long hours, there still remain several mysteries about the device that are not actively being deduced by the users. So how does one begin to know their phones?…
China Backed Actors are Employing Generative AI to Breach US infrastructure
Cybercriminals of all skill levels are utilising AI to hone their skills, but security experts warn that AI is also helping to track them down. At a workshop at Fordham University, National Security Agency head of cybersecurity Rob Joyce…
Opera Browser Users Beware: MyFlaw Bug Allows Hackers to Run Any File Remotely
There has been an unearthed critical security flaw in the Opera browser that has been of concern to Opera browser enthusiasts. As a result of the “MyFlaw Bug,” hackers can remotely execute any file on users’ computers, posing a…
Microsoft ‘Cherry-picked’ Examples to Make its AI Seem Functional, Leaked Audio Revealed
According to a report by Business Insiders, Microsoft “cherry-picked” examples of generative AI’s output since the system would frequently “hallucinate” wrong responses. The intel came from a leaked audio file of an internal presentation on an early version of Microsoft’s…
Ahead of Regulatory Wave: Google’s Pivotal Announcement for EU Users
Users in the European Union will be able to prevent Google services from sharing their data across different services if they do not wish to share their data. Google and five other large technology companies must comply with the…
eBay Settles Blogger Harassment Case with $3 Million Fine
eBay has agreed to pay a substantial fine of $3 million (£2.36 million) in order to settle charges related to the harassment of bloggers who were openly critical of the company. The disturbing details emerged in court documents, revealing…
GitHub Faces Rise in Malicious Use
GitHub, a widely used platform in the tech world, is facing a rising threat from cybercriminals. They’re exploiting GitHub’s popularity to host and spread harmful content, making it a hub for malicious activities like data theft and controlling compromised…
Navigating the Paradox: Bitcoin’s Self-Custody and the Privacy Challenge
Self-custody in Bitcoin refers to individuals holding and controlling their private keys, which in turn control their bitcoin. This concept is akin to securing physical gold in a personal safe rather than relying on a bank or third-party custodian.…
Beware of Malicious YouTube Channels Propagating Lumma Stealer
Attackers have been propagating a Lumma Stealer variant via YouTube channels that post videos about cracking into popular applications. They prevent detection by Web filters by spreading the malware over open source platforms like MediaFire and GitHub rather than…
AI-Driven Phishing on the Rise: NSA Official Stresses Need for Cyber Awareness
Even though the National Security Agency has been investigating cyberattacks and propaganda campaigns, a National Security Agency official said Tuesday that hackers are turning to generative artificial intelligence chatbots, such as ChatGPT, to make their operations appear more convincing…
‘BIN’ Attacks: Cybercriminals are Using Stolen ‘BIN’ Details for Card Fraud
While cybersecurity networks might be boosting themselves with newer technologies, cybercrime groups are also augmenting their tactics with more sophisticated tools. The latest example in cyberspace is the “BIN attacks,” that targeted small businesses. The tactic involved manipulation of the…
Researchers Claim Apple Was Aware of AirDrop User Identification and Tracking Risks Since 2019
Security researchers had reportedly alerted Apple about vulnerabilities in its AirDrop wireless sharing feature back in 2019. According to these researchers, Chinese authorities recently exploited these vulnerabilities to track users of the AirDrop function. This case has raised concerns about…
Bengaluru Woman Escapes a Cyber-scam Attempt, After Indigo’s Bogus ‘Agents’ Cancel Rs.15,600 Tickets
A 32-year-old woman from Bengaluru, India, suffered a cyber scam where the scammers falsely identified themselves as the agents of Indigo Airlines. The scammers attempted to obtain Rs. 15,600 from the victim. Following a few questions from the ‘agents,’ victim…
Here’s Why the World is Investing So Much in Semiconductors
Hannah Mullane, a BBC correspondent, recently visited Pragmatic Semiconductor, the UK’s newest computer chip facility in Durham. Formerly a ceramic pipe factory, from the outside it looks like a large warehouse. However, the large site is being turned into…