18 Feb

Indian authorities seize loot from collapsed BitConnect crypto scam

Indian authorities seize loot from BitConnect crypto-Ponzi scheme Devices containing crypto wallets tracked online, then in the real world India’s Directorate of Enforcement has found

Author rabih
17 Feb

XCSSET macOS malware returns with first new version since 2022

Microsoft says there’s a new variant of XCSSET on the prowl for Mac users – the first new iteration of the malware since 2022. XCSSET

Author rabih
17 Feb

Katharine Hayhoe: The most important climate equation | Starmus highlights

WeLiveScience The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action 17 Feb 2025 Most people acknowledge that

Author rabih
17 Feb

Twin Google flaws allowed researcher to get from YouTube ID to Gmail address in a few easy steps

Infosec In Brief A security researcher has found that Google could leak the email addresses of YouTube channels, which wasn’t good because the search and

Author rabih
17 Feb

Twin Google flaws allowed attacker to get from YouTube ID to Gmail address in a few easy steps

Infosec In Brief A security researcher has found that Google could leak the email addresses of YouTube channels, which wasn’t good because the search and

Author rabih
16 Feb

Fujitsu worries US tariffs will see its clients slow digital spend

Asia In Brief The head of Fujitsu’s North American operations has warned that the Trump administration’s tariff plans will be bad for business. In remarks

Author rabih
16 Feb

This open text-to-speech model needs just seconds of audio to clone your voice

Hands on Palo Alto-based AI startup Zyphra unveiled a pair of open text-to-speech (TTS) models this week said to be capable of cloning your voice

Author rabih
15 Feb

Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwed

Interview It has been nearly a decade since famed cryptographer and privacy expert Bruce Schneier released the book Data and Goliath: The Hidden Battles to

Author rabih
15 Feb

If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish

Digital thieves – quite possibly Kremlin-linked baddies – have been emailing out bogus Microsoft Teams meeting invites to trick victims in key government and business

Author rabih
14 Feb

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Miscreants are actively abusing a high-severity authentication bypass bug in unpatched internet-facing SonicWall firewalls following the public release of proof-of-concept exploit code. The vulnerability, tracked

Author rabih
14 Feb

Critical PostgreSQL bug tied to zero-day attack on US Treasury

A high-severity SQL injection bug in the PostgreSQL interactive tool was exploited alongside the zero-day used to break into the US Treasury in December, researchers

Author rabih
14 Feb

2 charged over alleged New IRA terrorism activity linked to cops’ spilled data

Two suspected New IRA members were arrested on Tuesday and charged under the Terrorism Act 2000 after they were found in possession of spreadsheets containing

Author rabih
14 Feb

Watchdog ponders why Apple doesn’t apply its strict app tracking rules to itself

Apple is feeling the heat over its acclaimed iPhone privacy policy after a German regulator’s review of iOS tracking consent alleged that the tech giant

Author rabih
14 Feb

Chinese spies suspected of ‘moonlighting’ as tawdry ransomware crooks

A crew identified as a Chinese government-backed espionage group appears to have started moonlighting as a ransomware player – further evidence that lines are blurring

Author rabih
13 Feb

More victims of China’s Salt Typhoon crew emerge: Telcos just now hit via Cisco bugs

China’s Salt Typhoon spy crew exploited vulnerabilities in Cisco devices to compromise at least seven devices linked to global telecom providers and other orgs, in

Author rabih
13 Feb

US lawmakers press Trump admin to oppose UK’s order for Apple iCloud backdoor

US lawmakers want newly confirmed Director of National Intelligence Tulsi Gabbard to back up her tough talk on backdoors. They’re urging her to push back

Author rabih
13 Feb

North Korea targets crypto developers via NPM supply chain attack

North Korea has changed tack: its latest campaign targets the NPM registry and owners of Exodus and Atomic cryptocurrency wallets. Carrying out a financially motivated

Author rabih
13 Feb

Gaming or gambling? Lifting the lid on in-game loot boxes

Kids Online The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down 13 Feb 2025  • 

Author rabih
Load moreLoadingAll items loaded