Ask Slashdot: How Harmful Are In-House Phishing Campaigns?
tiltowait writes: My organization has an acceptable use policy which forbids sending out spam. Every few months, however, the central IT office exempts itself from this rule by delivering deceptive e-mails to all employees as a test of their ability.....»»
Harmful “nudify” websites used Google, Apple, and Discord sign-on systems
Sign-on systems from Big Tech companies have been incorporated into deepfake generators. Enlarge (credit: Photo illustration by Jacqui VanLiew/WIRED; Getty Images) Major technology companies, including Google, Apple, and.....»»
Report: Amazon’s new $5/month Alexa will use Anthropic’s tech, as in-house AI failed
Amazon is moving closer to its expected launch of a premium, $5-10/month new Alexa assistant. But according to a new report from Reuters, plans to use Amazon’s own in-house AI have failed, leading the company to turn to Anthropic’s Claude instead.....»»
Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites
Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 and J.....»»
Deepfake-generating AI websites blocked from using Sign in with Apple
Apple has blocked some developers from using Sign in with Apple, after a report discovered popular sign-in tools have been used by websites providing harmful AI image undressing services.Legitimate examples of Sign in with AppleWhile Apple Intelligen.....»»
PSA: Watch out for phishing attacks with fake banking app updates
A security researcher has discovered a phishing attack intended to fool iPhone users into installing what is claimed to be an update to their banking app. The attack works despite iOS protections because what is actually being ‘installed’ is a.....»»
RSA Authenticator App improves cybersecurity for federal agencies
RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»
Nissan welcomes Reggie Bush to Heisman House after he reclaimed his trophy
USC legend Reggie Bush stars in college football campaign four months after the Heisman Trophy Trust returned his trophy, which he forfeited in the wake of sanctions......»»
Missouri AG’s legal war against Media Matters shot down by federal judge
Judge: Missouri AG's actions chill speech about extremist content on Musk's X. Enlarge / Missouri Attorney General Andrew Bailey arrives to testify at House Homeland Security Committee hearing on Wednesday, January 10, 2024. (c.....»»
Clean house quicker than ever with Tineco back-to-school deals
As summer comes to an end, now's a great time to upgrade your cleaning game with these Tineco back-to-school deals on vacuums, wet-dry cleaners, and more......»»
Researchers identify effective materials for protecting astronauts from harmful cosmic radiation on Mars
Researchers have identified specific materials, including certain plastics, rubber, and synthetic fibers, as well as Martian soil (regolith), which would effectively protect astronauts by blocking harmful space radiation on Mars. These findings could.....»»
Can"t buy me love: TikTok users seek authenticity in sponsored content, dismissing top influencers for smaller creators
High-profile and popular influencers on TikTok should rethink their approach to brand-sponsored campaigns since followers better engage and trust the authenticity of smaller creators over super influencers when it comes to paid content......»»
Telco fined $1M for transmitting Biden deepfake without verifying Caller ID
Lingo Telecom signed calls with A-Level attestations despite not verifying them. Enlarge / President Joe Biden leaving the White House on August 16, 2024, in Washington, DC. (credit: Getty Images | Anna Moneymaker ) A ph.....»»
Calls to ban "harmful pornography" are rife—here"s what teens actually think about porn
Pornography has been in the news a lot this year. It was at the center of discussions addressing violence against women back in May. Deepfake pornography has also been in the headlines......»»
Federal judge in Texas strikes down FTC’s ban on noncompete agreements
Judge: FTC Act doesn't give substantive rulemaking authority to FTC. Enlarge / Federal Trade Commission Chair Lina Khan arrives to testify before the House Appropriations Subcommittee at the Rayburn House Office Building on May 1.....»»
Study discovers an electric current in the gut that attracts pathogens like Salmonella
How do bad bacteria find entry points in the body to cause infection? This question is fundamental for infectious disease experts and people who study bacteria. Harmful pathogens, like Salmonella, find their way through a complex gut system where the.....»»
New phishing method targets Android and iPhone users
ESET researchers discovered an uncommon type of phishing campaign targeting Android and iPhone users. They analyzed a case observed in the wild that targeted clients of a prominent Czech bank. PWA phishing flow (Source: ESET) This technique is notewo.....»»
Why don"t more politicians retire? Expert explains how the US could benefit from a mandatory retirement age
President Joe Biden and former President Donald Trump are hardly the only examples of politicians who work well into their golden years. Members of the baby-boom generation—Americans born between 1946 and 1964—are the most numerous in the House,.....»»
GuidePoint Security releases Phishing as a Service
GuidePoint Security has launched a new Phishing as a Service (PhaaS) offering. Phishing remains one of the most common entry points for threat actors – according to CISA, over 90% of successful cyberattacks start with a phishing email. However, man.....»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»
Researchers develop nanoparticle array implantation for sensitive and reusable detection
Shanghai Jiao Tong University (SJTU) researchers have developed a highly sensitive and reusable surface-enhanced Raman spectroscopy (SERS) microfluidics system that has achieved a detection limit lower than 10 ppt (parts per trillion) of harmful subs.....»»