Apple usually excels in shielding us from spam and pop-ups. With the myriad functions Apple packs into iPhones, users engage in diverse activities, from work to photos and gaming. While iPhones are considered less susceptible to cyber threats than…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Surge in Police Adoption of Private Cameras for Video Evidence Raises Privacy Concerns
Major cities like Los Angeles and Washington, D.C., are gearing up to establish Real-Time Crime Centers, positioned as pivotal hubs for the seamless integration of various police technologies and data. Described as a “nerve center,” these facilities typically amalgamate…
Unused Apps Could Still be Tracking and Collecting User’s Data
While almost everyone in this era is glued to their smartphones for long hours, there still remain several mysteries about the device that are not actively being deduced by the users. So how does one begin to know their phones?…
China Backed Actors are Employing Generative AI to Breach US infrastructure
Cybercriminals of all skill levels are utilising AI to hone their skills, but security experts warn that AI is also helping to track them down. At a workshop at Fordham University, National Security Agency head of cybersecurity Rob Joyce…
Opera Browser Users Beware: MyFlaw Bug Allows Hackers to Run Any File Remotely
There has been an unearthed critical security flaw in the Opera browser that has been of concern to Opera browser enthusiasts. As a result of the “MyFlaw Bug,” hackers can remotely execute any file on users’ computers, posing a…
Microsoft ‘Cherry-picked’ Examples to Make its AI Seem Functional, Leaked Audio Revealed
According to a report by Business Insiders, Microsoft “cherry-picked” examples of generative AI’s output since the system would frequently “hallucinate” wrong responses. The intel came from a leaked audio file of an internal presentation on an early version of Microsoft’s…
Ahead of Regulatory Wave: Google’s Pivotal Announcement for EU Users
Users in the European Union will be able to prevent Google services from sharing their data across different services if they do not wish to share their data. Google and five other large technology companies must comply with the…
eBay Settles Blogger Harassment Case with $3 Million Fine
eBay has agreed to pay a substantial fine of $3 million (£2.36 million) in order to settle charges related to the harassment of bloggers who were openly critical of the company. The disturbing details emerged in court documents, revealing…
GitHub Faces Rise in Malicious Use
GitHub, a widely used platform in the tech world, is facing a rising threat from cybercriminals. They’re exploiting GitHub’s popularity to host and spread harmful content, making it a hub for malicious activities like data theft and controlling compromised…
Navigating the Paradox: Bitcoin’s Self-Custody and the Privacy Challenge
Self-custody in Bitcoin refers to individuals holding and controlling their private keys, which in turn control their bitcoin. This concept is akin to securing physical gold in a personal safe rather than relying on a bank or third-party custodian.…
Beware of Malicious YouTube Channels Propagating Lumma Stealer
Attackers have been propagating a Lumma Stealer variant via YouTube channels that post videos about cracking into popular applications. They prevent detection by Web filters by spreading the malware over open source platforms like MediaFire and GitHub rather than…
AI-Driven Phishing on the Rise: NSA Official Stresses Need for Cyber Awareness
Even though the National Security Agency has been investigating cyberattacks and propaganda campaigns, a National Security Agency official said Tuesday that hackers are turning to generative artificial intelligence chatbots, such as ChatGPT, to make their operations appear more convincing…
‘BIN’ Attacks: Cybercriminals are Using Stolen ‘BIN’ Details for Card Fraud
While cybersecurity networks might be boosting themselves with newer technologies, cybercrime groups are also augmenting their tactics with more sophisticated tools. The latest example in cyberspace is the “BIN attacks,” that targeted small businesses. The tactic involved manipulation of the…
Researchers Claim Apple Was Aware of AirDrop User Identification and Tracking Risks Since 2019
Security researchers had reportedly alerted Apple about vulnerabilities in its AirDrop wireless sharing feature back in 2019. According to these researchers, Chinese authorities recently exploited these vulnerabilities to track users of the AirDrop function. This case has raised concerns about…
Bengaluru Woman Escapes a Cyber-scam Attempt, After Indigo’s Bogus ‘Agents’ Cancel Rs.15,600 Tickets
A 32-year-old woman from Bengaluru, India, suffered a cyber scam where the scammers falsely identified themselves as the agents of Indigo Airlines. The scammers attempted to obtain Rs. 15,600 from the victim. Following a few questions from the ‘agents,’ victim…
Here’s Why the World is Investing So Much in Semiconductors
Hannah Mullane, a BBC correspondent, recently visited Pragmatic Semiconductor, the UK’s newest computer chip facility in Durham. Formerly a ceramic pipe factory, from the outside it looks like a large warehouse. However, the large site is being turned into…
Morrisons’ ‘Robocop’ Pods Spark Shopper Backlash: Are Customers Feeling Like Criminals?
In a bid to enhance security, Morrisons has introduced cutting-edge anti-shoplifting technology at select stores, sparking a divisive response among customers. The high-tech, four-legged pods equipped with a 360-degree array of CCTV cameras are being considered for a nationwide…
AI Unravels the Mystery of Fingerprints: Are We Truly Unique?
Due to its uniqueness and permanence, fingerprint analysis is regarded as a valuable tool in the field of forensics and security because no two fingerprint patterns are identical, not even identical twins. There are so many unique aspects of…
Toronto Zoo Suffers a Ransomware Attack
The Toronto Zoo, located in Toronto, Ontario, Canada revealed that it was hit by ransomware attack on January 8th. The attack was first detected on Friday, January 5th. As per the official statement released by the zoo authority, an investigation…
Driving into Tomorrow: The AI powered Car Takeover
In the next decade, a tech-driven revolution is set to transform our roads as 95% of vehicles become AI-powered connected cars. These smart vehicles, while promising enhanced safety and convenience, come with a catch—each generating a whopping 25 gigabytes…