#security-risks

[ follow ]
#cryptocurrency

Crypto CEO kidnapped in Toronto, released after paying $1M ransom | TechCrunch

The kidnapping of WonderFi CEO highlights increasing violence and security risks in the cryptocurrency space.

TON Blockchain Grinds to a Standstill With No Blocks Produced for Over 3 Hours

TON blockchain downtime may relate to DOGS memecoin surge, disrupting network stability and raising security risks.

Crypto CEO kidnapped in Toronto, released after paying $1M ransom | TechCrunch

The kidnapping of WonderFi CEO highlights increasing violence and security risks in the cryptocurrency space.

TON Blockchain Grinds to a Standstill With No Blocks Produced for Over 3 Hours

TON blockchain downtime may relate to DOGS memecoin surge, disrupting network stability and raising security risks.
morecryptocurrency

legacy app migration

Migrating legacy applications reduces security risks and supports business agility while often being more cost-effective than maintaining outdated systems.
#cybersecurity

A leaky database spilled 2FA codes for the world's tech giants | TechCrunch

Exposed database contained sensitive data like security codes for major tech accounts.
Two-factor authentication via SMS may not be as secure as app-based authentication.

FCC approves cyber labeling program for IoT devices

The FCC voted to establish a voluntary cybersecurity labeling program for IoT devices and consumer products.
The FCC will seek feedback on security risks posed by software products from adversarial nations.

The US will ban sales of Kaspersky antivirus software next month

The Biden administration bans Kaspersky Labs' antivirus products due to security concerns.

96% of SMBs are missing critical cybersecurity skills - here's why

The majority of SMBs face gaps in cybersecurity skills, with significant difficulties in investigating security alerts.

How one cyberattack causes relentless ripple effects

A single cyberattack on a third-party vendor can lead to widespread service disruptions for multiple organizations.

Panelists will discuss third-party risks at SECURITY 500 Conference

Third-party vendors present increasing security risks that need effective management strategies.

A leaky database spilled 2FA codes for the world's tech giants | TechCrunch

Exposed database contained sensitive data like security codes for major tech accounts.
Two-factor authentication via SMS may not be as secure as app-based authentication.

FCC approves cyber labeling program for IoT devices

The FCC voted to establish a voluntary cybersecurity labeling program for IoT devices and consumer products.
The FCC will seek feedback on security risks posed by software products from adversarial nations.

The US will ban sales of Kaspersky antivirus software next month

The Biden administration bans Kaspersky Labs' antivirus products due to security concerns.

96% of SMBs are missing critical cybersecurity skills - here's why

The majority of SMBs face gaps in cybersecurity skills, with significant difficulties in investigating security alerts.

How one cyberattack causes relentless ripple effects

A single cyberattack on a third-party vendor can lead to widespread service disruptions for multiple organizations.

Panelists will discuss third-party risks at SECURITY 500 Conference

Third-party vendors present increasing security risks that need effective management strategies.
morecybersecurity
#artificial-intelligence

Breaking bad: How bad actors can corrupt the morals of generative AI

AI-generated synthetic media can blur fact and fiction, but humans can exploit AI maliciously through clever prompting.

From wiretapping to geolocation data collection: AI mass surveillance for the Paris Olympics draws privacy concerns

Increased surveillance using AI and advanced technology during the 2024 Paris Olympics as a response to security risks.

What the Arrival of A.I. Phones and Computers Means for Our Data

Tech giants are introducing AI-driven devices that require more user data, raising privacy concerns.

Agencies are on track with AI executive order deadlines, White House says

The White House has achieved all of the 90-day benchmarks set out in President Biden's executive order on artificial intelligence.
The completed actions focus on managing security risks, investing in innovation, and encouraging private sector participation in public sector regulatory efforts.

Can OpenAI's Strawberry program deceive humans?

OpenAI's new AI, Strawberry, claims reasoning capabilities but raises ethical concerns regarding manipulation and potential misuse.

Breaking bad: How bad actors can corrupt the morals of generative AI

AI-generated synthetic media can blur fact and fiction, but humans can exploit AI maliciously through clever prompting.

From wiretapping to geolocation data collection: AI mass surveillance for the Paris Olympics draws privacy concerns

Increased surveillance using AI and advanced technology during the 2024 Paris Olympics as a response to security risks.

What the Arrival of A.I. Phones and Computers Means for Our Data

Tech giants are introducing AI-driven devices that require more user data, raising privacy concerns.

Agencies are on track with AI executive order deadlines, White House says

The White House has achieved all of the 90-day benchmarks set out in President Biden's executive order on artificial intelligence.
The completed actions focus on managing security risks, investing in innovation, and encouraging private sector participation in public sector regulatory efforts.

Can OpenAI's Strawberry program deceive humans?

OpenAI's new AI, Strawberry, claims reasoning capabilities but raises ethical concerns regarding manipulation and potential misuse.
moreartificial-intelligence
#privacy-concerns

Biden, Trump, Harris and other leaders' confidential movements given away by fitness app Strava, French newspaper Le Monde says

High-profile leaders' movements tracked through a fitness app used by their security staff raises concerns about privacy and security.

This Hacker Tool Extracts All the Data Collected by Windows' New Recall AI

Attacker gaining significant insight from Recall data

Biden, Trump, Harris and other leaders' confidential movements given away by fitness app Strava, French newspaper Le Monde says

High-profile leaders' movements tracked through a fitness app used by their security staff raises concerns about privacy and security.

This Hacker Tool Extracts All the Data Collected by Windows' New Recall AI

Attacker gaining significant insight from Recall data
moreprivacy-concerns

Former Biglaw Attorney Tells Trump To Eliminate FBI Background Checks For Security Clearance

Epshteyn's memo proposes outsourcing security clearance checks to private firms, raising concerns about potential risks of unchecked appointees.
#biden-administration

Independent Panel Warns Another Potshot Assassination Attempt Can and Will Happen Again' In Scathing Report on Secret Service

The Secret Service must undergo significant reforms to avoid future assassination attempts on protectees.

U.S. Chinese Car Tech Ban Will Hit General Motors And Ford Too

The Biden administration is proposing restrictions on vehicles from China and Russia to prevent potential security threats.

Biden administration wades into AI's open source debate

The Biden Administration is addressing the controversy surrounding open source AI models and their impact on society's safety and security.
The National Telecommunications and Information Administration (NTIA) is responsible for studying this issue and making recommendations to the White House.

Independent Panel Warns Another Potshot Assassination Attempt Can and Will Happen Again' In Scathing Report on Secret Service

The Secret Service must undergo significant reforms to avoid future assassination attempts on protectees.

U.S. Chinese Car Tech Ban Will Hit General Motors And Ford Too

The Biden administration is proposing restrictions on vehicles from China and Russia to prevent potential security threats.

Biden administration wades into AI's open source debate

The Biden Administration is addressing the controversy surrounding open source AI models and their impact on society's safety and security.
The National Telecommunications and Information Administration (NTIA) is responsible for studying this issue and making recommendations to the White House.
morebiden-administration

DevSecOps teams are ramping up the use of AI coding tools, but they've got serious concerns - AI-generated code is causing major security headaches and slowing down development processes

AI is widely used in coding, but security concerns about generated code are significant among developers.
Investing in AI requires careful governance strategies to protect sensitive data.
Most organizations recognize challenges of AI but lack confidence in their security measures.
#google

Google wants to put the consequences of its Epic antitrust ruling on pause during appeal

Google seeks to delay antitrust ruling to protect user security amidst new app store regulations.

Microsoft pins Windows outage on EU-enforced 'interoperability' deal

The EU agreement allows federated access to Microsoft's applications, while Apple and Google operating systems are not obliged to offer similar inclusivity.

Google wants to put the consequences of its Epic antitrust ruling on pause during appeal

Google seeks to delay antitrust ruling to protect user security amidst new app store regulations.

Microsoft pins Windows outage on EU-enforced 'interoperability' deal

The EU agreement allows federated access to Microsoft's applications, while Apple and Google operating systems are not obliged to offer similar inclusivity.
moregoogle

How to Create an Employee Offboarding Process (+ Checklist)

Effective employee offboarding is critical to prevent security risks, ensure continuity, and protect the organization's reputation.
#technology

Popular Chinese electric vehicles can listen to conversations, owners claim

Electric vehicles may possess vulnerabilities that compromise user privacy, allowing unauthorized access to internal audio without the owner's consent.

US banning TikTok? Your key questions answered

TikTok won't disappear from phones immediately even after a ban, but app stores will no longer offer updates, making it gradually unusable.

Popular Chinese electric vehicles can listen to conversations, owners claim

Electric vehicles may possess vulnerabilities that compromise user privacy, allowing unauthorized access to internal audio without the owner's consent.

US banning TikTok? Your key questions answered

TikTok won't disappear from phones immediately even after a ban, but app stores will no longer offer updates, making it gradually unusable.
moretechnology
#llms

AI code helpers just can't stop inventing package names

AI models often generate false information, particularly when suggesting software package names, raising concerns about reliance on their outputs.

How to test large language models

Companies are leveraging large language models (LLMs) for various applications like search experiences, chatbots, and customer support.
Organizations investing in LLMs face challenges related to data governance, security risks, and cloud infrastructure planning.

AI code helpers just can't stop inventing package names

AI models often generate false information, particularly when suggesting software package names, raising concerns about reliance on their outputs.

How to test large language models

Companies are leveraging large language models (LLMs) for various applications like search experiences, chatbots, and customer support.
Organizations investing in LLMs face challenges related to data governance, security risks, and cloud infrastructure planning.
morellms

Exploding Pagers Deliver a Supply Chain Warning

Complex global supply chains expose vulnerabilities that can be exploited by malicious actors, demanding enhanced security measures.

Passwordless AND Keyless: The Future of (Privileged) Access Management

SSH key management is crucial for security in IT environments, yet is often neglected by traditional PAM solutions due to technological limitations.

Burnout could be to blame for security failures around Trump, former Secret Service agents say

The Secret Service is facing staffing shortages that compromise the effectiveness of presidential security.
Ronald Rowe emphasized the need for urgent discussions with Congress regarding security challenges.

Hacker tricks ChatGPT into giving out detailed instructions for making homemade bombs | TechCrunch

ChatGPT's safety guidelines can be circumvented, posing risks for creating dangerous instructions through manipulative prompts.
#generative-ai

AI coding assistants are creating messy code

Generative AI tools in coding pose risks of producing flawed, dangerous code, despite increasing efficiency for developers.

Meta AI Introduces AudioSeal: The First Audio Watermarking Technique Designed Specifically for Localized Detection of AI-Generated Speech

Generative AI can create realistic content posing security risks. AudioSeal by Meta detects AI-generated speech through localized watermarking, enhancing detection accuracy and imperceptibility.

Will potential security gaps derail Microsoft's Copilot?

Microsoft's Copilot shows strong sales growth but faces serious security issues related to data access for enterprises using Microsoft 365.

Microsoft security boss warns AI insecurity 'unprecedented' as tech goes mainstream

Generative AI adoption increases security risks, creating a complex threat landscape.

AI Survey Report

Leverage Generative AI tools for efficiency while managing security risks.

Veracode unveils tools to combat growing security debt

Veracode announces new platform innovations to tackle security risks.

AI coding assistants are creating messy code

Generative AI tools in coding pose risks of producing flawed, dangerous code, despite increasing efficiency for developers.

Meta AI Introduces AudioSeal: The First Audio Watermarking Technique Designed Specifically for Localized Detection of AI-Generated Speech

Generative AI can create realistic content posing security risks. AudioSeal by Meta detects AI-generated speech through localized watermarking, enhancing detection accuracy and imperceptibility.

Will potential security gaps derail Microsoft's Copilot?

Microsoft's Copilot shows strong sales growth but faces serious security issues related to data access for enterprises using Microsoft 365.

Microsoft security boss warns AI insecurity 'unprecedented' as tech goes mainstream

Generative AI adoption increases security risks, creating a complex threat landscape.

AI Survey Report

Leverage Generative AI tools for efficiency while managing security risks.

Veracode unveils tools to combat growing security debt

Veracode announces new platform innovations to tackle security risks.
moregenerative-ai

Military Leaders in Huge Trouble After Bolting a Starlink Terminal to a Warship for Unrestricted WiFi

Crew members aboard USS Manchester illegally accessed Starlink WiFi for personal use, leading to severe investigations and consequences for those involved.

Study highlights secure software supply chain best practices | Computer Weekly

IT decision-makers prioritize improving software supply chain security in response to rising concerns about supply chain attacks.

The Green Economy Is Hungry for Copper-and People Are Stealing, Fighting, and Dying to Feed It

Copper theft in South Africa poses a deadly threat to security personnel and compromises energy infrastructure.

How to Automate the Hardest Parts of Employee Offboarding

70% of IT professionals report negative effects from incomplete offboarding, highlighting the significance of robust SaaS account management.

Democrats Asked NOT to Book Hotels Under Own Names Due To Safety Concerns as Pro-Palestinian Protestors Converge on DNC Report

House Democrats are advised not to book hotel rooms in their own names due to safety concerns amidst pro-Palestinian protests at the DNC.
#cyber-attacks

CISA, FBI warn on risks of China-made drones

Chinese-manufactured drones pose security risks to critical infrastructure
Guidance highlights vulnerabilities in data transfer, patching, and firmware updates

Why attacks against critical national infrastructure (CNI) are such a threat - and how governments are responding

Critical national infrastructure (CNI) faces persistent threats from cyber attackers, posing physical risks and potential global impacts.

CISA, FBI warn on risks of China-made drones

Chinese-manufactured drones pose security risks to critical infrastructure
Guidance highlights vulnerabilities in data transfer, patching, and firmware updates

Why attacks against critical national infrastructure (CNI) are such a threat - and how governments are responding

Critical national infrastructure (CNI) faces persistent threats from cyber attackers, posing physical risks and potential global impacts.
morecyber-attacks

Code Smell 262 - Not Replaced Constants | HackerNoon

Ignoring constant replacement leads to severe security risks.

How to Offer Secure IVR Banking and Authenticate Callers

IVR banking provides convenience for customers and efficiency for banks, but comes with potential security risks.

The Windows 10 clock is ticking: 5 ways to save your old PC in 2025 (most are free)

Approximately 240 million Windows 10 PCs may become obsolete when Windows 11 is mandatory, with around 40% of enterprise workstations affected.
Users facing the upgrade dilemma must consider hardware requirements, potential security risks, financial implications, and alternative options like upgrading to Windows 11 or exploring other operating systems.

Code Smell 261 - DigiCert Underscores | HackerNoon

Underscore and special characters can cause validation errors.

Threat actors are exploiting a VMware ESXi bug which could be "catastrophic" for affected firms

A critical flaw in VMware ESXi hypervisor is being exploited by ransomware groups, allowing attackers to gain full administrative permissions and potentially encrypt the file system, impacting hosted servers and virtual machines.
#authentication

5 Benefits of Passwordless Authentication

Passwordless technology is on the rise to combat password overload and security risks.
Benefits of going passwordless include cost savings, improved productivity, and enhanced security.

How to measure the success of identity security initiatives

Identity management has shifted from a productivity nuisance to a major security risk, with stolen credentials playing a significant role in data breaches.

5 Benefits of Passwordless Authentication

Passwordless technology is on the rise to combat password overload and security risks.
Benefits of going passwordless include cost savings, improved productivity, and enhanced security.

How to measure the success of identity security initiatives

Identity management has shifted from a productivity nuisance to a major security risk, with stolen credentials playing a significant role in data breaches.
moreauthentication

The path to reducing software vulnerabilities leads to AI

Tool proliferation creates challenges in understanding and addressing relevant security risks. AI provides a solution.
#paris-olympics

With big goals and gambles, Paris aims to reset the Olympics with a wow opening

Paris is preparing for extravagant and innovative Olympics, aiming to rejuvenate interest in the games and ensure a memorable experience for participants and spectators alike.

Emmanuel Macron says Olympics opening ceremony may be moved due to security fears

The opening ceremony for the Paris Olympics might be moved from the River Seine if security risks are too high.

With big goals and gambles, Paris aims to reset the Olympics with a wow opening

Paris is preparing for extravagant and innovative Olympics, aiming to rejuvenate interest in the games and ensure a memorable experience for participants and spectators alike.

Emmanuel Macron says Olympics opening ceremony may be moved due to security fears

The opening ceremony for the Paris Olympics might be moved from the River Seine if security risks are too high.
moreparis-olympics

These 3 Social Media Apps Are Selling Your Data, Security Experts Warn-Here's How To Protect Yourself

Social media apps collect user data and sell it to third parties for targeted advertising. Users can take steps to mitigate security risks.

API Consumption Management report highlights | App Developer Magazine

Understanding and managing third-party API consumption is crucial for companies, as revealed in Lunar.Dev's report on API consumption management.

How to Securely Onboard New Employees Without Sharing Temporary Passwords

Using temporary first-day passwords during employee onboarding can pose significant security risks for organizations.

Code Smell 260 - Crowdstrike NULL | HackerNoon

Avoid using NULLs in privilege mode drivers to prevent system crashes and instability.

Is Community-Backed Open Source Software Worth the Risk? | @lightbend

Open source infrastructure projects without corporate sponsorship lack security assurances.

Why Your YouTube Videos Are Suddenly Skipping to the End

YouTube is taking drastic measures like skipping to the end of videos for users with ad blockers, aiming to discourage their use and promote Premium subscriptions.

Creeping cloud complexity is hampering incident response

Cloud complexity leads to delays in incident response and increased security risks.
from Mail Online
6 months ago

AI has developed new sinister skill, scientists warn

AI systems are capable of deception and manipulation, posing risks that could escalate in the future.

Attack makes autonomous vehicle tech ignore road signs

Autonomous vehicles can be attacked by manipulating CMOS sensors to distort road signs, posing serious security risks.

Press Freedom Day: Why are journalists fleeing Pakistan? DW 05/03/2024

Journalists in Pakistan face security risks, financial struggles, and job dissatisfaction, leading to an exodus to North America and Europe for safety and stability.

The Ultimate Guide to Bitcoin Self-custody for Miners

Bitcoin miners often overlook the importance of custody but face unique challenges that need to be addressed for secure self-custody.

TikTok on the clock: What you need to know about US ban of social media platform | amNewYork

TikTok ban approved by Congress, awaiting President Biden's signature. Users may face challenges in the future if ByteDance fails to sell the company.

Better Web Security Means Less Convenience - For Now

The convenience of the web comes with security risks. Balancing user experience with security measures like 2FA is crucial.

Companies begin rolling out chief AI officer appointments

Companies are appointing Chief Artificial Intelligence Officers to manage responsible AI integration.

A creep hacked into my son's beloved toy while he slept and started speaking to him - don't make my mistake

Toy walkie-talkies can pose safety risks if not monitored properly.
Parents need to be vigilant about the toys they buy for their children, considering potential security vulnerabilities.

Why you should never charge your phone at an airport

Using public USB ports for phone charging can expose devices to malware
Charging stations can transfer data in addition to power, posing a security risk

A rogue AI might be able to replace all music with Taylor Swift covers

AI-generated music could replace all recorded music
Warning about AI-driven monopolizing

40 state AGs ask Meta to take immediate action' on user account takeovers

State attorneys general express concern over account takeovers on Meta platforms.
Users face emotional distress and financial risks due to account takeovers.

Comparison Chart: VPN Service Providers (Free Download) | TechRepublic

Choosing the right VPN provider requires thorough research and comparison.
Consider factors such as OpenVPN support, pricing, connections, and logging policies when selecting a VPN.

I was in despair': how lending a phone led to life savings being stolen

Be cautious about keeping sensitive financial information on your phone, especially in easily accessible places like mobile cases.
In case of theft or fraud, act promptly to protect your accounts by contacting the bank immediately and avoiding storing PINs and passwords on your devices.

Revealed: car industry was warned keyless vehicles vulnerable to theft a decade ago

Car industry ignored warnings about keyless entry technology leading to car thefts
Thieves using devices like emulators and smart equipment to hack into keyless entry systems

Lindsay Hoyle admits we all get death threats' as he addresses Tory MP's resignation

MPs frequently receive death threats and face security risks
Mike Freer is resigning due to threats and attacks on his office
#apple

They're Selling You Down the River.' Musk Slams Apple Deal with OpenAI

Elon Musk voices concerns over Apple and OpenAI partnership, warns of security risks and potential bans on Apple devices at his companies.

Apple will open iPhone to alternative app stores and lower fees in EU to comply with regulations

Apple is making changes to its app store to comply with European regulations and give consumers more choice.
The changes include allowing iPhone users in Europe to switch to using alternative app stores and enabling developers to offer alternative payment systems.

They're Selling You Down the River.' Musk Slams Apple Deal with OpenAI

Elon Musk voices concerns over Apple and OpenAI partnership, warns of security risks and potential bans on Apple devices at his companies.

Apple will open iPhone to alternative app stores and lower fees in EU to comply with regulations

Apple is making changes to its app store to comply with European regulations and give consumers more choice.
The changes include allowing iPhone users in Europe to switch to using alternative app stores and enabling developers to offer alternative payment systems.
moreapple
#security risks

Google to begin deleting inactive accounts this week

Google is set to delete inactive accounts that have been unused for at least two years.
The move is aimed at preventing security risks associated with older accounts that may have outdated security measures.
Exceptions to the account deletion include accounts with YouTube channels, remaining gift card balances, and active published apps.

Considerations for the security of evolving workspaces | Computer Weekly

Employees' mindset about where they work has shifted, with many preferring flexibility and remote work options.
Security professionals need to ensure updated policies and procedures for remote work to mitigate risks.

PHP 8.0 reaches EOL leaving some websites vulnerable

PHP 8.0 reached end of life on November 26, 2023
Websites using PHP 8.0 may face security risks and compatibility issues

Google to begin deleting inactive accounts this week

Google is set to delete inactive accounts that have been unused for at least two years.
The move is aimed at preventing security risks associated with older accounts that may have outdated security measures.
Exceptions to the account deletion include accounts with YouTube channels, remaining gift card balances, and active published apps.

Considerations for the security of evolving workspaces | Computer Weekly

Employees' mindset about where they work has shifted, with many preferring flexibility and remote work options.
Security professionals need to ensure updated policies and procedures for remote work to mitigate risks.

PHP 8.0 reaches EOL leaving some websites vulnerable

PHP 8.0 reached end of life on November 26, 2023
Websites using PHP 8.0 may face security risks and compatibility issues
moresecurity risks

Google set to delete accounts that have been inactive for last 2 years

Google is deleting inactive accounts that have been inactive for at least two years.
The move is aimed at preventing security risks and protecting users' private information.

Kennedy Calls for Secret Service Detail on Anniversary of Father's Killing

Robert F. Kennedy Jr. is seeking Secret Service protection due to perceived security risks related to his family history.

Why Business Risk Observability is Becoming Critical for Modern Applications - DevOps.com

Organizations must update digital strategies with cloud-native technologies to scale and secure operations, addressing vulnerabilities to mitigate security risks.

How to create and maintain SBOM in cloud-native applications? - Amazic

Organizations need SBOM for security in cloud-native applications.
[ Load more ]