Posted inCyberSecurity

Microsoft’s AI researchers accidentally leak terabytes of sensitive data

Microsoft’s AI researchers have inadvertently exposed dozens of terabytes of sensitive data, including things like private keys and passwords, when they published training data for open source on GitHub. GitHub users were instructed to download the models from an Azure Storage URL, but the security firm Wiz discovered that this URL provided access to the […]

Posted inCyberSecurity

It may be smart to update your browser now

Google, Mozilla, Microsoft, and Brave have all released critical security updates for their browsers. The updates address a vulnerability that an attacker could exploit to gain access to or execute malicious code on your computer, and the companies say that the vulnerability has been actively exploited in the wild. The vulnerability is related to the […]

Posted inCyberSecurity

Chrome gets a new way to track users

In conjunction with the new design of Chrome, Google has begun rolling out its new advertising technology called “Privacy Sandbox,” which tracks web pages and generates a list of advertising topics shared with web pages upon request. The platform has faced significant opposition but is still being released to the majority of Chrome users today. […]

Posted inCyberSecurity

Top 3 Trends in Security System Technology

Security system technology is quickly developing to meet the demands of a complex and connected world. New technology trends, however, are taking the world by surprise as their advancement redefines security measures. As cyber-attacks become more complex and advanced, attack defense techniques also get more sophisticated to keep up with the expanding difficulties. With traditional […]

Posted inCyberSecurity

Global botnet taken down

The U.S. Department of Justice states that the FBI, in collaboration with international law enforcement agencies, has successfully dismantled QakBot, a botnet that has been utilized by hacking groups for ransomware attacks and other cyber-related crimes for fifteen years. The botnet consisted of around 700,000 infected computers, with 200,000 of them located in the United […]

Posted inCyberSecurity

Microsoft makes some of its security tools free

Microsoft has announced that it will make certain security tools for their cloud services free, allowing their customers greater opportunities to analyze logs of activities within the services. Microsoft’s decision comes after hackers believed to be from China gained access to emails from U.S. agencies. The tools that Microsoft is now releasing for free were […]

Posted inCyberSecurity

Android app recorded users every 15 minutes

The Android app iRecorder Screen Recorder, which started as an innocent screen recording app, reportedly began recording one minute of audio every 15 minutes and transmitting these recordings via an encrypted link to the developer’s server. The app was initially released in September 2021, but it was about a year later that it began recording […]

Posted inCyberSecurity

The new Google Authenticator is not end-to-end encrypted

The new feature that allows users to sync their one-time codes between multiple devices in Google’s two-factor authentication tool, Authenticator, does not use end-to-end encryption, which can expose users to significant security risks, according to security researchers who have examined the new feature. However, you can still use Google Authenticator without linking it to your […]

Posted inCyberSecurity

Proton releases password manager

Proton, the company behind the security-focused email service Proton Mail, is now launching its own password manager. Proton’s password manager is called “Proton Pass” and stores login information for various services with end-to-end encryption (E2EE). In addition to usernames and passwords, it is also possible to store web addresses and email addresses for the services […]

Posted inAI

Microsoft introduces Security Copilot

Microsoft has unveiled its new AI-based security service, Security Copilot, which may make it easier for companies to protect their computer networks from intrusions and attacks. Security Copilot is based on OpenAI’s language model GPT-4 in a similar way to how Microsoft has previously used OpenAI’s technology in its search engine Bing, Microsoft 365, and […]

Posted inMobile Apps

Google blocks apps from Chinese Pinduoduo

Yesterday, Google began flagging more apps from Chinese e-commerce giant Pinduoduo as malware in the Play Store. Users attempting to install, or who have already installed, apps from the company have reportedly received a warning on their device. Over the past few weeks, several Chinese security researchers have accused Pinduoduo, which is a growing e-commerce […]

Posted inSocial Media

Twitter discontinues two-factor authentication via SMS

If you have not switched from two-factor authentication via SMS on your Twitter account before today, March 20th, your account will have two-factor authentication deactivated. From now on, only accounts subscribed to Twitter Blue will have access to the security feature. It is still possible to use two-factor authentication via an authentication app without a […]

Posted inCyberSecurity

These Android Keyboard Apps With Over 1 Million Installs Can Be Hacked Remotely

Android keyboard apps are a popular way for users to customize their phone’s typing experience. However, a recent report has found that some popular keyboard apps with over 1 million installs can be hacked remotely. This means that a cyber attacker could potentially gain access to sensitive information, such as passwords and financial data, through […]