-
Sharing your business’s data with ChatGPT: How risky is it?
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As a natural language processing model, ChatGPT – and other similar machine learning-based language models – is trained on huge amounts…
-
UK Man Sentenced to 13 Years for Running Multi-Million Fraud Website
PRIVACY PRIVACY Confirmed global losses from iSpoof scams were £100m, with the actual figure believed to be far higher Read More
-
Instagram Safety for Kids: Protecting Privacy and Avoiding Risks
PRIVACY PRIVACY If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk of their screen time. However, woven into the stream of reels, stories, selfies, and Insta-worthy moments, are potential risks to your child’s privacy and safety. According to a recent Pew Research Center report,…
-
What cybersecurity professionals can learn from the humble ant
PRIVACY PRIVACY When an ant colony is threatened, individual ants release pheromones to warn of the impending danger. Each ant picking up the warning broadcasts it further, passing it from individual to individual until the full defenses of the colony are mobilized. Instead of a single ant facing the danger alone, thousands of defenders with…
-
5 Minute Parent’s Guide to Social Media
PRIVACY PRIVACY The time has come. Your kids are chafing at the bit to get on social media and you can no longer hold them back. But you’re terrified. ‘What if they say the wrong thing? What if they meet some unsavoury types or worst case, what if they get bullied?’ I hear you –…
-
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away
PRIVACY PRIVACY A Peruvian oversight law has the opposite effect: Peru in 2020 began requiring any foreign fishing boat entering its ports to use a vessel monitoring system allowing its activities to be tracked in real time 24 hours a day. The equipment, which tracks a vessel’s geographic position and fishing activity through a proprietary…
-
Legitimate looking npm packages found hosting TurkoRat infostealer
PRIVACY PRIVACY Despite efforts taken in recent years to proactively monitor public software repositories for malicious code, packages that bundle malware continue to routinely pop up in such places. Researchers recently identified two legitimate looking packages that remained undetected for over two months and deployed an open-source information stealing trojan called TurkoRat. Effective use of…
-
Guerrilla malware is preinfected on 8.9 million Android devices, Trend Micro says
PRIVACY PRIVACY Cybercrime gang Lemon Group has managed to get malware known as Guerrilla preinstalled on about 8.9 million Android-based smartphones, watches, TVs, and TV boxes globally, according to Trend Micro. The Guerilla malware can load additional payloads, intercept one-time passwords (OTPs) from SMS texts, set up a reverse proxy from the infected device, and…
-
Microsoft Warns of Increase in Business Email Compromise Attacks
PRIVACY PRIVACY The company’s systems currently detect and investigate an average of 156,000 BEC attacks daily Read More
-
KeePass Flaw Exposes Master Passwords
PRIVACY PRIVACY The vulnerability (CVE-2023-32784) was discovered by security researcher Dominik Reichl Read More