#age-verification-vulnerability

[ follow ]
#social-media
Social media marketing
fromHer Campus
1 day ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Europe politics
fromEngadget
8 hours ago

Estonia is the rare EU country opposing child social media bans

Estonia's education minister argues against social media bans for children, emphasizing the need for government and corporate responsibility instead.
EU data protection
fromTechCrunch
2 days ago

These are the countries moving to ban social media for children | TechCrunch

Countries are implementing social media bans for children to address risks like cyberbullying and mental health issues.
Social media marketing
fromHer Campus
1 day ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Europe politics
fromEngadget
8 hours ago

Estonia is the rare EU country opposing child social media bans

Estonia's education minister argues against social media bans for children, emphasizing the need for government and corporate responsibility instead.
EU data protection
fromTechCrunch
2 days ago

These are the countries moving to ban social media for children | TechCrunch

Countries are implementing social media bans for children to address risks like cyberbullying and mental health issues.
#cybersecurity
fromZDNET
11 hours ago
Information security

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

fromnews.bitcoin.com
1 day ago
Cryptocurrency

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

Information security
fromWIRED
10 hours ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
fromTechSpot
1 day ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

Information security
fromZDNET
11 hours ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Artificial intelligence
fromwww.theguardian.com
20 hours ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Information security
fromWIRED
10 hours ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Information security
fromTechSpot
1 day ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
#discord
UK politics
fromwww.independent.co.uk
17 hours ago

Tech bosses could face jail for failing to remove revenge porn from websites

New government proposals aim to hold tech executives accountable for failing to remove revenge porn from their platforms.
#digital-sovereignty
DevOps
fromFortune
1 day ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
DevOps
fromFortune
1 day ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
SF politics
fromNextgov.com
6 hours ago

Appeals court removes limits on DOGE access to SSA data despite 'alarming' revelations

A federal appeals court reversed restrictions on the Department of Government Efficiency's access to sensitive Social Security Administration data.
#meta
Law
fromBBC News
12 hours ago

Meta pulls Facebook ads for social media addiction clients

Meta faces significant legal challenges over child safety and social media addiction lawsuits in the US.
Social media marketing
fromTechCrunch
14 hours ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Law
fromNewsmax
1 day ago

Meta Pulls Lawyer Ads After Social Media Lawsuit Loss

Meta is removing ads from lawyers seeking clients harmed by social media addiction amid ongoing lawsuits.
Law
fromgizmodo.com
1 day ago

Meta Is Pulling Down Ads That Seek to Recruit Clients for Social Media Addiction Litigation

Meta is removing ads from attorneys recruiting clients for social media addiction lawsuits after recent legal defeats.
Social media marketing
fromNew York Post
1 day ago

Meta boots law firm ads seeking clients to sue over alleged Facebook, Instagram addiction

Meta is removing ads aimed at recruiting plaintiffs for lawsuits related to mental health effects of its platforms.
Law
fromBBC News
12 hours ago

Meta pulls Facebook ads for social media addiction clients

Meta faces significant legal challenges over child safety and social media addiction lawsuits in the US.
Social media marketing
fromTechCrunch
14 hours ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Law
fromNewsmax
1 day ago

Meta Pulls Lawyer Ads After Social Media Lawsuit Loss

Meta is removing ads from lawyers seeking clients harmed by social media addiction amid ongoing lawsuits.
Law
fromgizmodo.com
1 day ago

Meta Is Pulling Down Ads That Seek to Recruit Clients for Social Media Addiction Litigation

Meta is removing ads from attorneys recruiting clients for social media addiction lawsuits after recent legal defeats.
Social media marketing
fromNew York Post
1 day ago

Meta boots law firm ads seeking clients to sue over alleged Facebook, Instagram addiction

Meta is removing ads aimed at recruiting plaintiffs for lawsuits related to mental health effects of its platforms.
World news
fromWIRED
1 day ago

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans

Governments struggle to combat industrial-scale scamming operations linked to organized crime, causing billions in losses, particularly affecting foreign victims.
UX design
fromEntrepreneur
3 days ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Apple
fromTechRepublic
1 day ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
Marketing tech
fromDigiday
1 day ago

Future of Marketing Briefing: The ad industry has an AI label problem

The ad industry struggles with AI transparency, balancing honesty against potential loss in ad effectiveness.
Health
fromWIRED
18 hours ago

Meta's New AI Asked for My Raw Health Data-and Gave Me Terrible Advice

Medical experts express concerns about uploading personal health data to AI models due to privacy and control issues.
#child-safety
fromComputerWeekly.com
3 days ago
Parenting

Tech can't wait for regulation to protect children online | Computer Weekly

Harmful online content for children results from profit-driven algorithms, not parenting or education failures.
EU data protection
fromwww.theguardian.com
22 hours ago

Irresponsible failure': Google, Meta, Snap and Microsoft slam EU over child sexual abuse law lapse

The European parliament has blocked the extension of a law allowing tech firms to scan for child sexual exploitation, creating a legal gap for child safety.
Parenting
fromComputerWeekly.com
3 days ago

Tech can't wait for regulation to protect children online | Computer Weekly

Harmful online content for children results from profit-driven algorithms, not parenting or education failures.
EU data protection
fromwww.theguardian.com
22 hours ago

Irresponsible failure': Google, Meta, Snap and Microsoft slam EU over child sexual abuse law lapse

The European parliament has blocked the extension of a law allowing tech firms to scan for child sexual exploitation, creating a legal gap for child safety.
#ai
fromKqed
3 days ago
Mental health

Google Updates Suicide, Self-Harm Safeguards in Gemini as AI Lawsuits Mount | KQED

Information security
fromFortune
12 hours ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Mental health
fromKqed
3 days ago

Google Updates Suicide, Self-Harm Safeguards in Gemini as AI Lawsuits Mount | KQED

Google's Gemini chatbot will direct users to a support hotline during potential crises related to suicide or self-harm.
Information security
fromFortune
12 hours ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromwww.theguardian.com
2 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Canada news
fromThe Walrus
3 days ago

Why Your Credit Card Is a National Security Threat | The Walrus

Canada needs to develop its own digital payment infrastructure to ensure financial autonomy and protect against foreign control.
fromThe Verge
3 days ago

The case for banning cookie banners

Cookie banners have become bloated and useless, creating a new kind of interaction that means trouble all over the web. The only solution is to get rid of them, and do it now.
Digital life
US politics
fromArs Technica
5 days ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
fromSecurityWeek
18 hours ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Law
fromIndependent
9 hours ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
#gmail
Information security
fromEngadget
11 hours ago

Google adds E2E encryption to Gmail for iOS and Android enterprise users

End-to-end encryption for Gmail on Android and iOS is now available for enterprise users, enhancing privacy and security for email communication.
Information security
fromTNW | Apps
15 hours ago

Gmail's end-to-end encryption comes to mobile, a year after its web launch

Google has introduced end-to-end encryption for Gmail on Android and iOS, enabling secure email communication for mobile users.
Information security
fromEngadget
11 hours ago

Google adds E2E encryption to Gmail for iOS and Android enterprise users

End-to-end encryption for Gmail on Android and iOS is now available for enterprise users, enhancing privacy and security for email communication.
Information security
fromTNW | Apps
15 hours ago

Gmail's end-to-end encryption comes to mobile, a year after its web launch

Google has introduced end-to-end encryption for Gmail on Android and iOS, enabling secure email communication for mobile users.
US news
fromwww.independent.co.uk
1 day ago

Moment Roblox predator arrested after grooming 14-year-old girl

A 19-year-old man was jailed for 28 months for sexually exploiting a 14-year-old girl he met on Roblox.
#ai-integration
fromArs Technica
11 hours ago
Artificial intelligence

What leaked "SteamGPT" files could mean for the PC gaming platform's use of AI

Valve is integrating AI tools, named SteamGPT, to enhance internal evaluations of in-game incidents and analyze suspicious accounts.
Artificial intelligence
fromArs Technica
11 hours ago

What leaked "SteamGPT" files could mean for the PC gaming platform's use of AI

Valve is integrating AI tools, named SteamGPT, to enhance internal evaluations of in-game incidents and analyze suspicious accounts.
UK politics
fromwww.independent.co.uk
18 hours ago

Reform voters least likely to see social media posts from friends and family

The Independent provides accessible journalism on critical issues without paywalls, emphasizing the importance of on-the-ground reporting.
#data-breach
Privacy professionals
fromTheregister
1 day ago

Capita's pension portal exposes civil servants' private data

Capita limited online functionality of the Civil Service Pensions Scheme member portal after a data breach exposed personal information of public sector workers.
Privacy professionals
fromTechCrunch
1 day ago

After data breach, $10B valued startup Mercor is having a month | TechCrunch

Mercor faces significant challenges after a data breach, with hackers claiming to have stolen 4TB of sensitive data.
EU data protection
fromSecurityWeek
1 day ago

300,000 People Impacted by Eurail Data Breach

Eurail is notifying over 300,000 customers about a data breach that exposed personal information, including names and passport numbers.
Privacy professionals
fromSilicon Canals
1 week ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromTheregister
1 day ago

Capita's pension portal exposes civil servants' private data

Capita limited online functionality of the Civil Service Pensions Scheme member portal after a data breach exposed personal information of public sector workers.
Privacy professionals
fromTechCrunch
1 day ago

After data breach, $10B valued startup Mercor is having a month | TechCrunch

Mercor faces significant challenges after a data breach, with hackers claiming to have stolen 4TB of sensitive data.
EU data protection
fromSecurityWeek
1 day ago

300,000 People Impacted by Eurail Data Breach

Eurail is notifying over 300,000 customers about a data breach that exposed personal information, including names and passport numbers.
Privacy professionals
fromSilicon Canals
1 week ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Apple
fromMail Online
1 day ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
2 days ago

South Korea Implements Unified Crypto Withdrawal Rules to Combat Phishing

South Korea's regulators implemented stricter cryptocurrency withdrawal standards to combat voice phishing, reducing exception eligibility by over 99%.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

South Korea Implements Unified Crypto Withdrawal Rules to Combat Phishing

South Korea's regulators implemented stricter cryptocurrency withdrawal standards to combat voice phishing, reducing exception eligibility by over 99%.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Marketing tech
fromExchangewire
2 days ago

Teads Expands Commitment to Inventory Quality & Safety Through Partnership with NewsGuard

Teads expands partnership with NewsGuard to enhance inventory quality and brand safety in its advertising marketplace.
Mental health
fromwww.theguardian.com
3 days ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
Law
fromwww.theguardian.com
12 hours ago

Meta must face Massachusetts lawsuit over youth social media addiction, court rules

Meta Platforms faces a lawsuit for allegedly designing addictive features targeting young users, as ruled by the Massachusetts supreme judicial court.
Privacy technologies
fromThe Hacker News
19 hours ago

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google's Device Bound Session Credentials enhance security for Chrome users by tying authentication sessions to specific devices, combating session theft.
Apple
fromTheregister
1 day ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
#digital-wallet
EU data protection
fromWIRED
3 days ago

Europe Gets Serious About Age Verification Online

Five EU countries are testing a digital wallet for age verification, but progress varies significantly among them.
EU data protection
fromEngadget
6 days ago

Ireland is testing out a digital wallet that conducts age verification for social media users

Ireland is trialing a Government Digital Wallet to verify user age for social media access, aiming for user-friendly design before its 2026 EU deadline.
EU data protection
fromWIRED
3 days ago

Europe Gets Serious About Age Verification Online

Five EU countries are testing a digital wallet for age verification, but progress varies significantly among them.
EU data protection
fromEngadget
6 days ago

Ireland is testing out a digital wallet that conducts age verification for social media users

Ireland is trialing a Government Digital Wallet to verify user age for social media access, aiming for user-friendly design before its 2026 EU deadline.
#generative-ai
Digital life
fromBig Think
1 week ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
1 week ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Social media marketing
fromTechCrunch
1 day ago

Instagram expands its movie inspired content restriction for teens internationally | TechCrunch

Instagram is implementing stricter content restrictions for teen accounts globally, focusing on reducing exposure to harmful themes.
Privacy professionals
fromComputerworld
2 days ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Privacy technologies
fromArs Technica
2 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Law
fromAxios
1 day ago

Scoop: Meta removes ads for social media addiction litigation

Lawyers are seeking new plaintiffs for class action lawsuits related to social media addiction, with ads running on major platforms.
fromFast Company
2 days ago

The list of countries banning young teens from social media keeps getting bigger. Here's the latest

Prime Minister Kyriakos Mitsotakis announced plans to restrict social media use by age starting on January 1, 2027, citing concerns such as problems sleeping, increasing anxiety, and social media platforms' addictive designs.
EU data protection
Social media marketing
fromwww.theguardian.com
4 days ago

It started with a tip-off': how a Guardian investigation exposed child sex trafficking on Facebook and Instagram

Child sexual abuse trafficking surged during the pandemic, with platforms like Facebook and Instagram being exploited for these crimes.
Information security
fromTechRepublic
11 hours ago

Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed

A critical flaw in the EngageLab SDK allowed malicious apps to exploit trusted permissions, affecting over 50 million Android users.
Privacy technologies
fromFortune
2 weeks ago

Americans want kids shielded from the internet. They don't trust websites or the government to do anything about it | Fortune

Public support for age verification laws exists, but many believe these laws are ineffective and easily bypassed.
Privacy professionals
fromHer Campus
1 week ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
#ai-security
Information security
fromThe Hacker News
16 hours ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Information security
fromThe Hacker News
16 hours ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Information security
fromSecurityWeek
19 hours ago

Critical Marimo Flaw Exploited Hours After Public Disclosure

A critical vulnerability in Marimo was exploited within hours of its public disclosure, allowing unauthenticated remote code execution.
#identity-management
fromThe Hacker News
2 days ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
3 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
2 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
3 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Privacy professionals
fromTheregister
3 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Information security
fromThe Hacker News
1 day ago

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets

A security vulnerability in EngageLab SDK could have exposed millions of cryptocurrency wallet users to unauthorized data access.
Information security
fromThe Hacker News
3 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromTheregister
3 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromComputerworld
1 month ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
[ Load more ]