#browser-safety

[ follow ]
#cybersecurity
Information security
fromSecurityWeek
1 hour ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Key cybersecurity developments include a hacker's probation, UK military deployment for internet protection, and Lovable's data exposure issue.
Information security
fromThe Hacker News
5 hours ago

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

A new campaign targets Chinese-speaking individuals using a trojanized SumatraPDF to deploy AdaptixC2 Beacon for remote access via VS Code tunnels.
Privacy technologies
fromMail Online
4 hours ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Privacy technologies
fromTheregister
1 day ago

NCSC: Passkeys now good enough to be the default standard

The NCSC endorses passkeys as the default authentication standard, urging consumers to abandon passwords for enhanced security.
Information security
fromSecurityWeek
1 hour ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Key cybersecurity developments include a hacker's probation, UK military deployment for internet protection, and Lovable's data exposure issue.
Information security
fromThe Hacker News
5 hours ago

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

A new campaign targets Chinese-speaking individuals using a trojanized SumatraPDF to deploy AdaptixC2 Beacon for remote access via VS Code tunnels.
Information security
fromIT Brew
19 hours ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
#google
Privacy technologies
fromPCWorld
1 week ago

Google will soon penalize sites that hijack your browser's back button

Google will penalize websites that hijack the browser's back button to improve user experience and eliminate frustrating redirects.
Privacy technologies
fromPCWorld
1 week ago

Google will soon penalize sites that hijack your browser's back button

Google will penalize websites that hijack the browser's back button to improve user experience and eliminate frustrating redirects.
#remote-work
Remote teams
fromFast Company
1 day ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
1 day ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
1 day ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromWRAL.com
1 day ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but poses privacy and security risks in public spaces.
Remote teams
fromAP News
1 day ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but comes with privacy and security risks when working in public spaces.
Remote teams
fromSFGATE
1 day ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work in public spaces offers flexibility but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
1 day ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
1 day ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
1 day ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromWRAL.com
1 day ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but poses privacy and security risks in public spaces.
Remote teams
fromAP News
1 day ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but comes with privacy and security risks when working in public spaces.
Remote teams
fromSFGATE
1 day ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work in public spaces offers flexibility but poses privacy and security risks that require precautions.
Deliverability
fromSecurityWeek
1 day ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
Cryptocurrency
fromThe Village Voice
17 hours ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
#meta
Privacy professionals
fromFuturism
2 days ago

Meta Installing Software on Employee Computers to Track Everything They Do, Feed the Data to AI

Meta is implementing tracking software on employees' computers to gather data for AI training, raising ethical and privacy concerns.
Privacy professionals
fromFuturism
2 days ago

Meta Installing Software on Employee Computers to Track Everything They Do, Feed the Data to AI

Meta is implementing tracking software on employees' computers to gather data for AI training, raising ethical and privacy concerns.
Apple
fromArs Technica
23 hours ago

Apple stops weirdly storing data that let cops spy on Signal chats

Signal's patch deletes preserved notifications and prevents future preservation for deleted apps, but user concerns about privacy remain.
#firefox
Web frameworks
fromZDNET
1 day ago

New Firefox update patches a whopping 271 bugs, thanks to Claude Mythos

Firefox 150 introduces enhanced features and fixes 271 security flaws.
Software development
fromTechRepublic
1 day ago

Mozilla Fixes 271 Firefox Bugs Using Anthropic's Mythos AI

Firefox 150 includes patches for 271 security vulnerabilities identified using Anthropic's Claude Mythos Preview AI model.
Web frameworks
fromZDNET
1 day ago

New Firefox update patches a whopping 271 bugs, thanks to Claude Mythos

Firefox 150 introduces enhanced features and fixes 271 security flaws.
Software development
fromTechRepublic
1 day ago

Mozilla Fixes 271 Firefox Bugs Using Anthropic's Mythos AI

Firefox 150 includes patches for 271 security vulnerabilities identified using Anthropic's Claude Mythos Preview AI model.
#agentic-ai
Artificial intelligence
fromZDNET
8 hours ago

Government adoption of AI agents could outpace the private sector

Agentic AI adoption in government is a leadership mandate, with 82% already using it and 71% planning to increase usage by 2026-2027.
Artificial intelligence
fromZDNET
8 hours ago

Government adoption of AI agents could outpace the private sector

Agentic AI adoption in government is a leadership mandate, with 82% already using it and 71% planning to increase usage by 2026-2027.
Information security
fromSecurityWeek
3 hours ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
UK news
fromwww.independent.co.uk
4 hours ago

Which countries are restricting children's social media access and how

Australia becomes the first country to ban social media access for children under 16, reflecting concerns over children's health and safety.
EU data protection
fromTechCrunch
18 hours ago

These are the countries moving to ban social media for children | TechCrunch

Countries are implementing social media bans for children to address risks like cyberbullying and mental health issues.
UK politics
fromwww.bbc.com
20 hours ago

Proxy attacks in UK a real and growing concern, says PM

The UK government is increasingly concerned about hostile states using proxies for attacks, particularly against the Jewish community.
Digital life
fromFast Company
23 hours ago

AI sycophancy could be more insidious than social media filter bubbles

AI chatbots may use flattery to enhance user engagement, similar to social media algorithms, leading to potential distortions in judgment.
#ransomware
Healthcare
fromNextgov.com
3 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Healthcare
fromNextgov.com
3 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
fromTechCrunch
1 hour ago

Another spyware maker caught distributing fake Android snooping apps | TechCrunch

Morpheus, a new malware identified by Osservatorio Nessuno, masquerades as a phone updating app and is capable of stealing a broad range of data from an intended target's device.
Privacy professionals
#artificial-intelligence
Artificial intelligence
fromInfoQ
15 hours ago

Deepfakes, Disinformation, and AI Content Are Taking Over the Internet

AI has become ubiquitous in society, influencing various industries and products, but there are concerns about its overuse and effectiveness.
Artificial intelligence
fromWIRED
1 day ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Information security
fromFortune
1 day ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Artificial intelligence
fromInfoQ
15 hours ago

Deepfakes, Disinformation, and AI Content Are Taking Over the Internet

AI has become ubiquitous in society, influencing various industries and products, but there are concerns about its overuse and effectiveness.
Artificial intelligence
fromWIRED
1 day ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Information security
fromFortune
1 day ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
EU data protection
fromwww.theguardian.com
1 day ago

Some Interrail travellers told to cancel passports as hacked data posted online

Holidaymakers in Europe must replace passports after personal data was hacked and sold on the dark web, causing stress and financial burden.
Digital life
fromThe New Yorker
1 day ago

The Anguish of Data Loss

Data preservation is crucial, yet digital devices are fragile and often treated carelessly, leading to significant loss when data is not backed up.
#ai
fromEngadget
2 days ago
Artificial intelligence

Mozilla says it patched 271 Firefox vulnerabilities thanks to Anthropic's Claude Mythos

Information security
fromFast Company
2 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromComputerworld
1 day ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromInfoWorld
1 day ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Software development
fromTheregister
2 days ago

Mythos found 271 Firefox flaws - none a human couldn't spot

Mythos AI model significantly improves bug detection, identifying 271 vulnerabilities in Firefox 150, marking a pivotal moment for software security.
Artificial intelligence
fromEngadget
2 days ago

Mozilla says it patched 271 Firefox vulnerabilities thanks to Anthropic's Claude Mythos

Mozilla's use of Anthropic's Claude Mythos model successfully identified and patched 271 vulnerabilities in Firefox, showcasing AI's potential in cybersecurity.
Information security
fromFast Company
2 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromSecurityWeek
1 day ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromComputerworld
1 day ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromInfoWorld
1 day ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromArs Technica
19 hours ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
Privacy professionals
fromFast Company
1 day ago

Meta tracking employee keystrokes to train AI is probably legal. Experts say that doesn't make it ethical

Meta Platforms is implementing software to track employee computer usage to train AI models, raising privacy concerns amid potential layoffs.
#apple
Apple
fromThe Hacker News
1 day ago

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

Apple has released a software update to fix a flaw in iOS and iPadOS that retained deleted notifications on devices.
Apple
fromSecurityWeek
1 day ago

Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Apple released updates to fix a vulnerability that allowed recovery of deleted messages on iOS and iPadOS devices.
Apple
fromThe Hacker News
1 day ago

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

Apple has released a software update to fix a flaw in iOS and iPadOS that retained deleted notifications on devices.
Apple
fromSecurityWeek
1 day ago

Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Apple released updates to fix a vulnerability that allowed recovery of deleted messages on iOS and iPadOS devices.
Privacy technologies
fromTheregister
23 hours ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
Privacy professionals
fromwww.theguardian.com
1 day ago

Criminal gangs profiting as child sexual abuse websites double, experts say

The number of commercial child sexual abuse websites has doubled in a year, highlighting a significant increase in online exploitation by criminal gangs.
Information security
fromSecurityWeek
4 hours ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Privacy professionals
fromFast Company
1 day ago

How the government is ramping up mass surveillance with AI-driven tech

Surveillance capitalism collects extensive personal data through various devices and technologies, often without user consent or effective opt-out options.
#privacy
Privacy technologies
fromTechRepublic
3 days ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
Privacy professionals
fromSecuritymagazine
2 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromTechRepublic
3 days ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
Privacy technologies
fromComputerWeekly.com
1 week ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
#data-privacy
fromElectronic Frontier Foundation
1 day ago
Privacy technologies

How ICE Got My Data | EFFector 38.8

Tech companies may compromise user data when pressured by the government, as seen in a case involving Google and ICE.
Privacy professionals
fromZDNET
4 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
Privacy professionals
fromZDNET
4 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
Privacy professionals
fromTechCrunch
2 days ago

UK government says 100 countries have spyware that can hack people's phones | TechCrunch

More than half of the world's governments now have access to commercial spyware, increasing risks for citizens and critical infrastructure.
Information security
fromFast Company
1 day ago

1Password sees AI as both threat and tool

AI presents both risks and opportunities for password management, requiring firms to balance security with the potential for careless app development.
Privacy technologies
fromBGR
4 days ago

Should You Accept Or Reject Cookies From A Website? - BGR

Reject non-essential cookies to avoid data tracking and targeted ads while accepting essential cookies for website functionality.
#malware
Information security
fromTheregister
8 hours ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
1 day ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromTheregister
8 hours ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
1 day ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Privacy professionals
fromWIRED
3 days ago

They Built a Legendary Privacy Tool. Now They're Sworn Enemies

GrapheneOS is highly regarded for mobile security, but its creator, Daniel Micay, has a controversial and enigmatic reputation within the cybersecurity community.
fromTNW | Anthropic
1 day ago
Information security

Mozilla fixes 271 Firefox vulnerabilities found by Anthropic's Claude Mythos in a single evaluation pass

Mozilla's Firefox 150 fixes 271 security vulnerabilities identified by Anthropic's AI model, Mythos, showcasing the model's effectiveness in vulnerability detection.
fromSecuritymagazine
1 day ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
Information security
fromTechCrunch
1 day ago

Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say | TechCrunch

Two spying campaigns exploit telecom infrastructure weaknesses to track individuals' locations, revealing ongoing vulnerabilities in global phone networks.
Information security
fromThe Hacker News
1 day ago

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Bitwarden CLI was compromised in the Checkmarx supply chain campaign, with malicious code stealing sensitive data from users.
Information security
fromTechRepublic
2 days ago

Malicious TikTok Downloader Extensions Quietly Compromised 130K Users

Browser extensions disguised as TikTok video downloaders are compromising user data, highlighting vulnerabilities in enterprise security.
Information security
fromZDNET
1 day ago

The shadowy SIM farms behind those incessant scam texts - and how to stay safe

SIM farms are used by cybercriminals for financial fraud, spam, phishing, and online product scalping.
fromArs Technica
2 days ago

Mozilla: Anthropic's Mythos found 271 zero-day vulnerabilities in Firefox 150

Computers were completely incapable of doing this a few months ago, and now they excel at it. We have many years of experience picking apart the work of the world's best security researchers, and Mythos Preview is every bit as capable.
Information security
fromEngadget
2 days ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

We're investigating a report claiming unauthorized access to Claude Mythos Previous through one of our third-party vendor environments.
Information security
Information security
fromSecurityWeek
2 days ago

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Google Antigravity's vulnerabilities have attracted both security researchers and cybercriminals, leading to risks of remote code execution and malware delivery.
Privacy technologies
fromZDNET
1 month ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Information security
fromBusiness Matters
1 week ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Information security
fromSecurityWeek
1 week ago

100 Chrome Extensions Steal User Data, Create Backdoor

Over 20,000 users installed malicious Chrome extensions that steal information, provide backdoors, or inject ads, as reported by cybersecurity firm Socket.
Privacy professionals
fromWIRED
1 month ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
fromZDNET
2 months ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
[ Load more ]