Information security
fromSecurityWeek
2 days agoCursor AI Vulnerability Exposed Developer Devices
A vulnerability in Cursor AI allows attackers to hijack developer machines via malicious repositories without user interaction.
Apple privately threatened to remove Elon Musk's artificial intelligence app, Grok, from its App Store in January after Musk's xAI failed to do enough to stop it from creating nude or sexualized deepfakes.
Spyware is one of the top threats to your mobile security and can severely impact your handset's performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phishing links, emails, and messages. While appearing to be a legitimate software package or useful utility, spyware will operate quietly in the background to monitor your movements,
The data that a smartphone transmits in a continuous loop can be divided into two categories: legitimate data that maintains the functionality of the device, and sensitive data that is used for tracking, advertising and other purposes. It is not always clear which data falls into which category. For example, if your device sends diagnostic data and reports to the manufacturer or app developers, this may be necessary and important. However, it usually also requires your consent.