ReportWire

Tag: Privacy

  • The truth behind those mysterious shipment emails in your inbox

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Over the past year, more people have reported receiving order shipment emails for purchases they never made. These messages usually come from legitimate retailers, often sportswear brands or electronics stores, and contain real tracking numbers and delivery details. The products are being shipped to different names at different addresses, but for some reason, the buyer’s contact email is yours.

    It might seem like a harmless clerical error or someone accidentally typing the wrong email address. But when it happens repeatedly, and across multiple unrelated orders, it starts to look less like a coincidence and more like a tactic.

    Arthur from Cape Coral, Florida, recently reached out with an experience that mirrors what others have been describing:

    “My wife’s e-mail address is showing up in emails from various sports entities to notify her of shipping dates, etc. So far, three separate individuals have ordered products, shipped to a different name at a different address, but used her email as the contact. They didn’t use our credit card to place the order. What could be going on? I don’t believe it’s a coincidence.”

    HOW TO DETECT FAKE AMAZON EMAILS AND AVOID IMPERSONATION SCAMS

    Arthur is right to question what’s happening. Scammers are deliberately using real email addresses to push fraudulent purchases through retailer systems with fewer checks. They rely on your email to carry out the scam, even if they have not stolen your payment details.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    Some scammers use valid, active email addresses to bypass retailer fraud filters. (Kurt “CyberGuy” Knutsson)

    What’s likely happening with those shipment emails in your inbox

    It is unlikely that someone is accidentally typing your email address every single time. Rather, scammers are deliberately using valid, active email addresses like yours to bypass retailer fraud filters. Numerous sources confirm that fake order and shipping confirmation emails are a common tactic in fraud operations, with criminals exploiting the trust systems placed in legitimate email addresses.

    When a stolen credit card is used, pairing it with a real email that has not triggered spam alerts increases the chance the transaction will go unnoticed by anti-fraud systems. Retailers often check whether an email address is active or bounces. If the system sees a functioning address, it may be less suspicious than an obviously fake one.

    Once the order is placed, products are frequently sent to drop addresses or freight-forwarding services, as confirmed by official investigations into brushing scams. These services act as intermediaries, making the scam harder to trace. In that context, your email is simply a means to an end, a validated contact point that helps the operation move forward smoothly.

    A laptop with the Google search screen on it

    Scammers can obtain email addresses when reputable companies experience data breaches. (Kurt “CyberGuy” Knutsson)

    How bad actors are able to get your email

    Your email address may have ended up in the hands of scammers through several common methods. The most likely cause is a data breach. Many well-known companies have experienced leaks in which customer emails and other information were exposed. 

    Once your email is part of a leaked database, it often circulates on the dark web or in underground forums, where it is freely traded and reused. Even if you were not part of a breach, scammers often use a technique called credential stuffing. This involves testing stolen login details across different websites to confirm which email addresses are active.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Remove yourself from the web

    The best thing you can do to prevent this from happening is to invest in a data removal service. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. 

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    A person types on their laptop.

    If you are receiving order confirmations for things you never bought, your email address could be a tool used by scammers in a larger fraud operation. (Kurt “CyberGuy” Knutsson)

    7 ways to secure your email from scammers

    These simple but powerful steps can help you protect your inbox, safeguard your identity and stay one step ahead of scammers misusing your email.

    1. Protect and monitor your email

    Start by locking down your email account with a strong, unique password that you don’t reuse anywhere else. Enable two-factor authentication (2FA) so hackers can’t get in even if they’ve stolen your password. A password manager makes this much easier by generating and securely storing complex passwords, helping you avoid the risks of reuse. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    2. Watch for suspicious messages

    Scan your inbox regularly for order confirmations, shipping notices or account sign-ups you don’t recognize. If something looks off, report it directly to the retailer or platform; it could be part of a larger scam using your email address. Never click on suspicious links, even if the message looks legitimate, and protect your devices with strong antivirus software to catch threats before they spread.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/LockUpYourTech 

    3. Be picky about where you share your email

    Avoid entering your email on shady giveaway sites or sketchy online forms. When in doubt, skip the sign-up or use a throwaway email. The fewer places your email lives, the harder it is for scammers to get hold of it.

    4. Create a second email address for shopping

    Set up a dedicated email for online purchases, newsletters and subscriptions. This helps keep your main inbox clean and makes it easier to spot strange activity. Sometimes, it’s best to create various email aliases so that you don’t have to worry about all your info getting taken in a data breach.  An email alias address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/Mail

    HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM

    5. Monitor your credit and identity regularly

    Even if no purchases appear under your name, scams involving your email can be a red flag for future identity misuse. Set up alerts with your bank and consider a credit monitoring service to catch unauthorized activity early.

    See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft

    6. Review connected accounts and revoke access

    In your email settings (e.g., Gmail, Outlook), check for any connected apps, services or delegated access you don’t recognize and remove them. This ensures no third party is piggybacking off your account.

    7. File an identity theft report if the problem escalates

    If this email misuse leads to fraudulent financial activity, users should file a report with the FTC at IdentityTheft.gov or their local authorities. 

    Kurt’s key takeaway

    If you are receiving order confirmations for things you never bought, do not shrug it off. Your email is likely being misused as part of a larger fraud operation, not by accident but intentionally. Scammers are taking advantage of active, trustworthy email addresses to slip past retailer defenses and carry out unauthorized purchases. The repeated use of your email shows that fraud networks are already circulating it, even if your financial information remains untouched.

    Are you comfortable with how much of your personal information is floating around online? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Remove your data to protect your retirement from scammers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’ve spent decades building your retirement fund. Now is the time to enjoy it, not lie awake worrying about scammers and identity thieves. Criminals are more aggressive than ever, and they know your personal information is the key to your money.

    The good news? You can take simple steps to remove your personal data from risky websites and databases. These actions greatly reduce the chance of fraud and protect your hard-earned savings from scammers. By taking control of your information now, you keep your money secure and your retirement in your hands.

    THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER 

    A man enjoys his retirement. (Kurt “CyberGuy” Knutsson)

    Why criminals target retirement accounts

    Retirement accounts are a goldmine for criminals. Here’s why:

    • They’re large. A lifetime of savings can add up to six or seven figures.
    • They’re less monitored. Unlike checking accounts, you may only review them a few times a year.
    • They’re easy to access remotely. Scammers don’t need your wallet — just enough personal details to pretend to be you.

    Elder fraud caused more than $4.9 billion in losses in 2024. In 72% of cases, scammers found victims’ personal data online. Most of these crimes were tied to identity theft, allowing criminals to access accounts, redirect benefits, or launch phishing attacks.

    A woman enjoying her retirement

    A woman enjoys her retirement. (Kurt “CyberGuy” Knutsson)

    You have an online profile even without social media

    You don’t have to be on Facebook to have your information online. Data brokers, companies you may have never heard of, collect and sell personal details about nearly every adult in the U.S. These profiles may include:

    • Age and date of birth
    • Home address and property value
    • Marital status and family details
    • Income range and investments
    • Retirement status

    For scammers, this information is like a treasure map.

    HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUD

    How criminals abuse your data

    When scammers know your age, address, and that you’re retired, they can craft scams that feel frighteningly real. Some examples are:

    • Fake financial advisor calls: Claiming to represent your bank or retirement plan provider, they already know your full name, your investment type, and even the city you live in.
    • “Pre-approved” retirement loan or annuity offers: Complete with official-sounding terms and personal details to make them seem legitimate.
    • Social engineering scams: Using information about your family or recent life events (like selling a home) to build trust before asking for account details.

    The more accurate the personal data they have, the more convincing their story, and the higher the risk you’ll believe them.

    A woman scrolling on social media on her phone

    A woman scrolls on her phone. (Kurt “CyberGuy” Knutsson)

    Reduce the target on your back

    Every piece of personal information you remove from public databases is one less tool scammers can use. Removing your data can:

    • Reduce the number of scam attempts
    • Limit how convincing those scams seem
    • Prevent your details from being resold repeatedly

    Think of it as changing the locks on your home before a break-in happens.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    Remove your data manually

    You can contact data brokers and request that they delete your profile. To start, search your name online, find the sites listing your data, and follow each site’s removal process. However, there’s a catch:

    • There are hundreds of these companies
    • Each has a different process, often requiring ID copies or mailed letters
    • Many will repost your data within months unless you check back regularly

    It’s a time-consuming job that most people eventually abandon.

    A woman checking her retirement accounts on her laptop

    A woman checks her retirement accounts on her laptop. (Kurt “CyberGuy” Knutsson)

    Use an automated data removal service

    A data removal tool handles the work for you. It:

    • Contacts hundreds of data brokers on your behalf
    • Tracks each request and follow-up to ensure deletion
    • Monitors continuously to keep your data off the lists

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    Kurt’s key takeaways

    You’ve worked too hard to let criminals take what you’ve built. By reducing your digital footprint, you protect both your money and your peace of mind. Start removing your personal information today, and keep your retirement exactly where it belongs, in your hands.

    If you’ve been targeted by a scam, how did you handle it, and what advice would you give others?  Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Your phone is tracking you even when you think it’s not

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You know that little GPS icon that pops up when an app is using your location? That’s the polite part. The tip of the iceberg. The warm handshake before your phone whispers your every movement to Big Tech behind your back. 

    Your phone has more than one way to know where you are. Cell towers, Wi-Fi networks, Bluetooth beacons and even background pings track you. If you have an old smartphone, you can enter to win a new iPhone 16 Pro at www.komando.com/win.

    I’m not here to scare you or tinfoil-hat this. 

    I’m here to help you take back control. I tested these steps myself, but your phone’s menus might look a little different depending on the make and model. Poke around your settings and you’ll find it.

    YOUR PHONE PREDICTS AN EARTHQUAKE

    Your phone has more than one way of knowing where you are. (iStock)

    iPhone: The sneakiest setting

    Apple keeps a “Significant Locations” log buried deep in your settings. It’s meant to make your Maps smarter and improve recommendations, but it’s also a detailed history of where you’ve been.

    Here’s how to find and clear it:

    1. Go to Settings > Privacy & Security > Location Services.
    2. Scroll to System Services. Tap Significant Locations.
    3. Use Face ID or your passcode to unlock it, then review your history.
    4. Tap Clear History, and if you don’t want it tracked anymore, toggle it off.

    While you’re there, review your Location Services list and set apps to While Using or Never. Most don’t need 24/7 access.

    FORGET SEO: HOW TO GET FOUND BY AI TOOLS IN 2025

    iPhone settings app

    On iPhones, there’s a “Significant Locations” log deep in your Settings. (Photo by STR/NurPhoto via Getty Images)

    Android: Timeline and app permissions

    Android’s version is called “Timeline,” and it’s tied to your Google account, not just your device. Even if you switch phones, the log follows you unless you turn it off.

    To see it:

    1. Open Google Maps. Tap your profile picture > Your timeline.
    2. Hit the three dots > Location & privacy settings.
    3. Under Location Settings, toggle off Timeline. You can also Delete all Timeline data.

    Next, check app permissions:

    • Go to Settings > Location > App permissions.
    • Change any “Allow all the time” apps to “Allow only while using” or “Deny.”

    FOLDABLE PHONES ARE IMPRESSIVE TECHNOLOGICAL MARVELS BUT COME WITH SERIOUS COMPROMISES

    Google Maps app on Android phone

    On Android, Google Maps has a “Timeline” worth disabling if you’re concerned about privacy. (Guillaume Payen/SOPA Images/LightRocket via Getty Images)

    Pro tip for both

    Even with these off, your carrier still knows where you are when your phone is connected to the network. If you really need to go off-grid, you’ll need to power down or use airplane mode.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio and podcasts: Airing on 500+ stations across the US, search for Komando in your favorite radio or podcast app
    • Daily newsletter: Join 650,000 folks who read the Current (free!) at www.GetKim.com
    • Watch: On YouTube.com/kimkomando

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • Air France and KLM breach tied to hacker group

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Air France and KLM are warning customers about a new data breach that hit their customer service platform. Hackers accessed personal details including names, emails, phone numbers, loyalty program information and recent transactions. While no financial details were stolen, experts warn that this information is still a gold mine for cybercriminals.

    The airlines say they acted quickly to cut off the attackers’ access. They also stressed that their internal networks remain secure.

    “Air France and KLM detected unusual activity on an external platform we use for customer service,” the companies said in a joint statement. “This activity led to unauthorized access to customer data. Our IT security teams, along with the relevant external party, took immediate action to stop it. We have also put measures in place to prevent it from happening again. Internal Air France and KLM systems were not affected.”

    Authorities in France and the Netherlands have been notified. Meanwhile, impacted customers are being told to stay alert.

    “Customers whose data may have been accessed are currently being informed,” the airlines added. “We are advising them to be extra vigilant for suspicious emails or phone calls.”

    NOTORIOUS HACKER GROUP SETS SIGHTS ON AIRLINE INDUSTRY IN ALARMING SECURITY THREAT

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Air France airliner (Kurt “CyberGuy” Knutsson)

    A larger cybercrime trend

    This attack is part of a broader wave of data theft linked to the ShinyHunters group. In recent months, they have targeted Salesforce customer service systems used by major global brands. High-profile victims include Adidas, Qantas, Louis Vuitton and even Google.

    Ricardo Amper, CEO of Incode Technologies, a global leader in identity verification and AI-powered fraud prevention, calls this a dangerous shift.

    “This signals hackers like ShinyHunters evolving from brute-force hacks to AI-amplified social engineering, targeting third-party platforms where humans are the weak link. They’re not just stealing data; they’re using generative AI to craft convincing impersonations. It’s an AI arms race.”

    KLM airliner (Kurt "CyberGuy" Knutsson)

    KLM airliner (Kurt “CyberGuy” Knutsson)

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    How hackers pulled this off

    Attackers now use advanced AI tools that make impersonation both fast and inexpensive. These tools allow them to convincingly mimic real people.

    “Attackers today are digital con artists with an unprecedented toolkit,” Amper explains. “With AI, they can convincingly impersonate real people using cloned voices, speech patterns and even realistic video deepfakes. With just 10-20 seconds of someone’s voice, they can create an audio clone that sounds exactly like them. Armed with this, attackers call customer service reps, posing as an executive, a partner or a high-value customer, and request sensitive account changes or data access.”

    These AI-driven impersonations bypass the “red flags” that once alerted employees.

    “The best AI deepfakes are nearly impossible for humans to detect in real time,” says Amper. “Pauses, awkward phrasing, bad audio, those giveaways are disappearing.”

    Why customer service platforms are prime targets

    Customer service portals hold a wealth of personal information and often have the power to reset accounts or override security settings. This combination makes them especially attractive to hackers.

    “Customer service platforms are considered a treasure trove because they store detailed personal data, transaction histories, and sometimes have capabilities to reset passwords or override security settings,” Amper notes. “Unlike core financial systems, many lack robust security controls, making them accessible to attackers armed with partial user information.”

    What this means for you

    Air France-KLM’s breach shows just how quickly cybercriminals are adapting. With AI-powered impersonation, even experienced customer service representatives can be tricked. Your best defense is to stay vigilant, use stronger authentication and actively monitor your accounts for any unusual activity.

    A woman booking airline travel on her laptop (Kurt "CyberGuy" Knutsson)

    A woman booking airline travel on her laptop (Kurt “CyberGuy” Knutsson)

    What hackers do with the stolen data

    Once hackers gain access to this data, they can quickly convert it into profit.

    “This starts when attackers use stolen data such as loyalty program numbers, recent transactions or service request information to impersonate customers in future interactions,” Amper says. “Loyalty points and frequent flyer miles act as digital currency that can be monetized or redeemed for rewards. These pieces of information are treated as puzzle pieces to build complete identity profiles.”

    These profiles often appear for sale on the dark web. Criminals can also reuse them to break into other accounts or launch highly targeted scams.

    How to protect yourself after a breach

    Amper warns that scammers often move quickly after a breach, sending fake alerts that seem legitimate.

    “Post-breach, watch for phishing lures tailored to you, like emails citing your recent Air France flight, urging a ‘security update’ with a dodgy link. Scammers thrive on urgency.”

    If you were notified, or even suspect that your data was part of this breach, take these steps immediately:

    1) Enable phishing-resistant MFA

    Use app-based authentication, security keys or biometrics wherever possible. Unlike basic text message codes, these methods are far harder for cybercriminals to intercept, even if they already have some of your personal information from the breach.

    2) Watch for tailored phishing attempts and use strong antivirus software

    Scammers may reference real flights, loyalty program balances or recent transactions to trick you into clicking malicious links. Pair your caution with strong antivirus tools which can block dangerous websites, phishing attempts and malware before they get a chance to run. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

    3) Monitor loyalty and financial accounts closely

    Frequent flyer miles and loyalty points are like digital currency. They can be stolen, sold or redeemed for real-world goods. Check your airline, hotel and bank accounts regularly for unusual activity.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    4) Use strong, unique passwords

    Never reuse the same password across accounts. If hackers compromise one account, they can try the same password elsewhere in a “credential stuffing” attack. A reputable password manager can create and store complex, unique logins.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    5) Sign up for an identity theft protection service

    Credit bureaus and specialized services can alert you if your information appears on the dark web or is linked to suspicious activity. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft

    6) Use a personal data removal service

    Personal data removal services can help scrub your personal information from data broker sites. Removing these records makes it harder for attackers to gather the details they need to impersonate you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    7) Scan your credit reports weekly

    Review your reports from major credit bureaus for suspicious accounts or inquiries you didn’t initiate.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Your frequent flyer miles, email address and phone number might not seem as valuable as your credit card, but in the wrong hands, they’re keys to unlocking more of your personal life. Protect them like cash.

    What would you do if a scammer could call your airline and sound exactly like you? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Nearly a million patients hit by DaVita dialysis ransomware attack

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Healthcare institutions have become a favorite target for bad actors, largely because of how easy they make it for attackers. In June, researchers discovered a healthcare data breach that exposed the personal information of around 8 million patients. All of this information was publicly accessible online without any passwords or authentication protocols.

    The latest healthcare organization to fall victim to a breach is DaVita, which has put nearly a million people at risk. Headquartered in Denver, Colorado, DaVita provides dialysis treatment to about 200,000 patients across the U.S. and 13 other countries.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    A healthcare professional working on her laptop  (Kurt “CyberGuy” Knutsson)

    What you need to know DaVita ransomware attack

    Kidney dialysis giant DaVita says nearly 916,000 people had personal and medical information exposed in an April ransomware attack (via Comparitech). The breach, which the company disclosed in state filings, compromised names, Social Security numbers, dates of birth, health insurance details, medical records, tax ID numbers, addresses and even images of checks made out to the company.

    DaVita says the incident disrupted internal operations and primarily affected its laboratories. In its latest notice to victims, the company says the cyberattack began March 24, 2025, and continued until April 12. It has not confirmed whether a ransom was paid.

    Ransomware gang Interlock claimed responsibility on April 25, posting screenshots of alleged stolen documents and saying it took 1.5TB of DaVita’s data. The group lists the company on its public leak site, where it pressures victims by threatening to sell or release stolen files.

    DaVita is offering eligible breach victims free identity restoration services through Experian, with a Nov. 28 enrollment deadline. The company has not confirmed how attackers gained access to its network or the size of the ransom demand.

    CyberGuy reached out to DaVita for comment but did not receive a response before publication.

    person typing on tablet

    A healthcare professional working on a tablet   (Kurt “CyberGuy” Knutsson)

    Who’s behind the DaVita breach

    Interlock, which first appeared in October 2024, has claimed responsibility for the DaVita attack and at least 23 other ransomware attacks, plus dozens more that remain unverified. Healthcare targets have included Texas Digestive Specialists, Kettering Health and Naper Grove Vision Care, all of which reported data breaches in 2025.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The DaVita incident is the second-largest U.S. healthcare ransomware attack by number of records this year, behind Frederick Health’s January breach. According to Comparitech, there have been 53 confirmed ransomware attacks on American healthcare providers in 2025 alone, compromising more than 3.2 million patient records.

    patient vitals

    A screen showing a patient’s vitals  (Kurt “CyberGuy” Knutsson)

    6 ways to protect yourself from DaVita ransomware attack

    The DaVita data breach exposed sensitive patient information. If you are affected or just want to stay one step ahead, these actions can help minimize your risk.

    1. Don’t click on suspicious links or attachments and use strong antivirus software

    The DaVita data breach likely gives attackers access to your contact details, which they can misuse. Avoid clicking on unexpected emails or messages, even if they look legitimate.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech

    2. Use a personal data removal service

    Since your personal details were exposed in the DaVita breach, you’re more vulnerable to targeted fraud. Consider using a personal data removal service to scrub your personal details from data broker websites that sell your information.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan 

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    3. Use strong, unique passwords for every account

    Reusing passwords increases your risk. A single leaked password can unlock multiple accounts. Use a password manager to generate and store secure passwords.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4. Sign up for an identity theft protection service

    DaVita is offering free identity theft and credit monitoring services to those affected by the breach. But even if you weren’t a victim of this specific breach, it’s still smart to protect yourself.

    Identity theft protection services can alert you to suspicious activity, help you recover if your identity is stolen and often provide tools to freeze or lock your credit. That prevents fraudsters from opening new accounts in your name, and you can lift the freeze temporarily when needed.

    See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft

    5. Enable two-factor authentication (2FA)

    Adding a second layer of login protection, like a text message or app-based code via 2FA, can make it much harder for DaVita attackers to access your accounts, even if your password is exposed.

    6. Monitor your credit and financial accounts

    Keep an eye out for strange charges or unfamiliar accounts. Set up alerts through your bank and review your credit report regularly to catch fraud early.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The investigation into the DaVita breach is ongoing, and the company has not disclosed how the hackers got in. Nearly a million people now face the possibility of their personal information being used for malicious purposes. Ransomware attacks on hospitals and clinics can lock critical systems, delay care and push providers back to paper records. In severe cases, they can force appointment cancellations and patient diversions and potentially endanger lives.

    Should U.S. law require healthcare organizations to meet stricter cybersecurity standards? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Google confirms data stolen in breach by known hacker group

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When a hospital or nonprofit falls victim to a cyberattack, it’s hard to place blame. Cybersecurity isn’t their strength, and many lack the budget for a dedicated security team, let alone a chief technology officer.

    But when a tech giant like Google experiences a data breach, it raises serious questions. Is data security slipping down the company’s priority list? Or are today’s cybercriminals so advanced that even Google’s top engineers are struggling to keep up?

    Here’s what happened: Google recently confirmed that hackers stole customer data by breaching one of its internal databases. The breach targeted a system that used Salesforce, a popular cloud-based platform companies use to manage customer relationships, store business contact information and track interactions. The attack has been linked to a known threat group.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    A Google sign on the side of a building (Kurt “CyberGuy” Knutsson)

    What you need to know about Google data breach

    Google has confirmed that a hacking group known as ShinyHunters stole customer data from one of its internal Salesforce databases used to manage business client relationships. The company disclosed the breach in a blog post published in early August, noting that the stolen data included “basic and largely publicly available business information, such as business names and contact details.”

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The breach was carried out by ShinyHunters, a well-known cybercriminal group formally tracked as UNC6040. The group has recently been linked to a string of high-profile incidents involving companies such as AT&T, Ticketmaster, Allianz Life and Pandora. In this case, the attackers targeted Google’s corporate Salesforce system, which the company uses to store contact information and notes about small and medium-sized businesses.

    According to Google’s Threat Intelligence Group, the attackers relied on voice phishing, or “vishing,” impersonating company employees in phone calls to IT support and persuading them to reset login credentials. This technique has proven effective against multiple organizations in recent months.

    google hackers 2

    A man using the Google search engine on his laptop   (Kurt “CyberGuy” Knutsson)

    No company is safe from cyberattacks

    Google did not specify how many customers were affected by the breach. When asked for comment, a company spokesperson pointed CyberGuy back to the blog post and declined to elaborate. It is also unclear whether Google has received any sort of ransom demand from the group.

    Cisco, Qantas and Pandora have all reported similar breaches in recent months, which now appear to be part of a broader campaign targeting cloud-based customer relationship management tools.

    In its blog post, Google warned that ShinyHunters may be preparing a public leak site. Ransomware gangs often use this tactic to extort companies, threatening to publish stolen data. The group reportedly shares infrastructure and personnel with other cybercriminal collectives, including The Com, which runs extortion campaigns and has, in some cases, issued threats of physical violence. 

    google hackers 3

    Google search engine (Kurt “CyberGuy” Knutsson)

    9 ways to stay safe from voice phishing and social engineering attacks

    While organizations like Google may be prime targets, individuals are often the weakest link that attackers exploit. But with a few smart practices, you can dramatically reduce your risk.

    1. Never share login credentials over the phone

    The Google breach happened because employees gave up sensitive information over a phone call. No legitimate IT team will ever ask you to share your password or 2FA codes over the phone. If someone does, it’s a major red flag.

    2. Always verify who’s calling

    If someone claims to be from your company’s IT department or a service provider, hang up and call back using an official number. Never trust the number displayed on caller ID.

    3. Enable two-factor authentication (2FA)

    Even if credentials are compromised, two-factor authentication (2FA) can block unauthorized access by adding an extra layer of security. It ensures that a password alone isn’t enough to break into your accounts.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    4. Beware of phishing links too

    Phishing emails and messages often include links that take you to fake websites designed to steal your login credentials or personal information. These messages usually create a sense of urgency, asking you to verify an account, reset a password or claim a reward. Instead of clicking the link, take a moment to inspect the message.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech

    5. Use a data removal service

    Attackers are able to carry out phishing, smishing and vishing attacks because your personal data is readily available online. The less of it that’s publicly accessible, the harder it becomes for them to craft convincing scams.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    6. Keep your software and browsers up to date

    Attackers often exploit outdated software with known vulnerabilities. Make sure your operating system, browsers, plugins and apps are always running the latest version. Enable auto updates wherever possible to avoid missing critical patches.

    7. Use a password manager with phishing detection

    A good password manager doesn’t just store strong, unique passwords; it can also alert you if you’re on a suspicious site. If your password manager refuses to autofill your login, it could mean the site is fake.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    8. Monitor your accounts for unusual activity

    If you suspect a breach, watch your accounts for unauthorized logins, password reset emails or other suspicious behavior. Set up alerts when possible. Many online services offer login notifications or dashboards that show recent access history.

    9. Report phishing attempts

    If you receive a vishing or phishing attempt, report it to your organization’s IT/security team or the appropriate government agency (like reportfraud.ftc.gov in the U.S.). Reporting helps shut down these scams faster and can protect others.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    While the data exposed in Google’s case may be limited, the breach highlights a persistent vulnerability in corporate systems: people. ShinyHunters seems to be getting more effective at exploiting that weakness. What’s even more concerning is the rise of vishing, also known as voice phishing. Vishing isn’t new, but its growing success shows just how fragile even well-defended systems can be when human error is involved.

    How confident are you in your company’s cybersecurity awareness training? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Google AI email summaries can be hacked to hide phishing attacks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial intelligence is everywhere these days — in your phone, your car, even your washing machine. I saw one just the other day featuring built-in AI. And while that might sound a little over the top, there’s no denying that artificial intelligence has made life easier in a lot of ways.

    From boosting productivity to unlocking new creative tools, it’s changing how we work and live. The most common version you’ve probably encountered? Generative AI, think chatbots like ChatGPT. But as helpful as this tech can be, it’s not without its problems.

    If you’ve used Google’s Workspace suite, you may have noticed the company’s AI model, Gemini, integrated across apps like Docs, Sheets and Gmail. Now, researchers say attackers can manipulate Gemini-generated email summaries to sneak in hidden phishing prompts.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER  

    HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

    Google Gemini app on a mobile device  (Kurt “CyberGuy” Knutsson)

    How Gemini summaries can be hacked

    Researchers at Mozilla’s 0Din have discovered a vulnerability in Google’s Gemini for Workspace that allows attackers to inject hidden instructions into email summaries. The issue, demonstrated by Marco Figueroa, shows how generative AI tools can be misled through indirect prompt injection. This technique embeds invisible commands inside the body of an email. When Gemini summarizes the message, it interprets and acts on those hidden prompts.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The attack does not rely on suspicious links or attachments. Instead, it uses a combination of HTML and CSS to conceal the prompt by setting the font size to zero and the color to white. These commands remain invisible in Gmail’s standard view but are still accessible to Gemini. Once you request a summary, the AI can be tricked into presenting fake security alerts or urgent instructions that appear to come from Google.

    In a proof of concept, Gemini falsely warned a user that a Gmail password had been compromised and included a fake support phone number. Since Gemini summaries are integrated into Google Workspace, you are more likely to trust the information, making this tactic especially effective.

    google sign

    A Google sign on a building   (Kurt “CyberGuy” Knutsson)

    What is Google doing about the flaw?

    While Google has implemented defenses against prompt injection since 2024, this method appears to bypass current protections. The company told CyberGuy it is actively deploying updated safeguards.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    In a statement, a Google spokesperson said, “Defending against attacks impacting the industry, like prompt injections, has been a continued priority for us, and we’ve deployed numerous strong defenses to keep users safe, including safeguards to prevent harmful or misleading responses. We are constantly hardening our already robust defenses through red-teaming exercises that train our models to defend against these types of adversarial attacks.”

    Google also confirmed that it has not observed active exploitation of this specific technique.

    google gemini

    Google Gemini app on the home screen of a mobile device    (Kurt “CyberGuy” Knutsson)

    6 ways you can stay safe from AI phishing scams

    So, how can you protect yourself from phishing scams that exploit AI tools like Gemini? Here are six essential steps you can take right now to stay safe:

    1. Do not blindly trust AI-generated content

    Just because a summary appears in Gmail or Docs does not mean it is automatically safe. Treat AI-generated suggestions, alerts or links with the same caution you would any unsolicited message. Always verify critical information, such as security alerts or phone numbers, through official sources.

    2. Avoid using summary features for suspicious emails

    If an email seems unusual, especially if it is unexpected or from someone you do not recognize, avoid using the AI summary feature. Instead, read the full email as it was originally written. This lowers the chance of falling for misleading summaries.

    3. Beware of phishing emails and messages

    Watch for emails or messages that create a sense of urgency, ask you to verify account details or provide unexpected links or contact information, even if they appear trustworthy or come from familiar sources. Attackers can use AI to craft realistic-looking alerts or requests for sensitive information, sometimes concealed within automatically generated summaries. So, always pause and scrutinize suspicious prompts before responding. 

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech 

    4. Keep your apps and extensions updated

    Ensure that Google Workspace and your browser are always running the latest version. Google regularly releases security updates that help prevent newer types of attacks. Also, avoid using unofficial extensions that have access to your Gmail or Docs.

    5. Invest in a data removal service

    AI-driven scams like the Gemini summary attack don’t happen in a vacuum. They often begin with stolen personal information. That data might come from past breaches, public records or details you’ve unknowingly shared online. A data removal service can help by continuously scanning and requesting the removal of your information from data broker sites. While no service can wipe everything, reducing your digital footprint makes it harder for attackers to personalize phishing attempts or link you to known breach data. Think of it as one more layer of protection in a world where AI makes targeted scams even easier.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    6. Disable AI summaries for now if you’re concerned

    If you’re worried about falling for an AI-generated phishing attempt, consider disabling Gemini summaries in Gmail until Google rolls out stronger protections. You can still read full emails the traditional way, which can lower your risk of being misled by manipulated summaries.

    How to disable Gemini features on desktop

    • Open Gmail on desktop.
    • Click the Settings gear icon in the upper right.
    • Click See all settings.
    • Scroll to “Google Workspace smart features” and click Manage Workspace smart feature settings.
    • Disable the toggle for Smart features in Google Workspace.
    • Then, click Save.
    • Note: This will turn off Gemini summaries as well as other smart features.

    How to disable Gemini features on mobile

    On iPhone:

    If you use the Gemini mobile app specifically:

    • Open the Gemini app.
    • Tap your Profile picture.
    • Tap Gemini Apps Activity.
    • At the top, tap Turn off.

    On Android:

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Gmail app on your Android.
    • Tap the Menu icon (three horizontal lines) in the upper left corner.
    • Scroll down and tap Settings.
    • Select the relevant email account.
    • Scroll down and tap Google Workspace smart features and uncheck the box to turn them off.

    Key caveats to know:

    • Disabling Smart Features may remove other convenient functionalities, such as predictive text and automatic appointment detection.
    • The Gemini icon or summary buttons may still appear, even after disabling these features. Some users report having to physically hide them via browser tools.

    There is no centralized single “off switch” to completely remove all Gemini AI references everywhere, but these steps significantly reduce the feature’s presence and risk.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    This vulnerability highlights how phishing tactics are evolving alongside AI. Instead of relying on visible red flags like misspelled URLs or suspicious attachments, attackers are now targeting trusted systems that help users filter and interpret messages. As AI becomes more deeply embedded in productivity tools, prompt injection could emerge as a subtle but powerful vector for social engineering, hiding malicious intent in the very tools designed to simplify communication.

    How comfortable are you letting AI summarize or filter your emails, and where do you draw the line? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
     

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • YouTube to begin testing a new AI-powered age verification system in the U.S.

    [ad_1]

    YouTube on Wednesday will begin testing a new age-verification system in the U.S. that relies on artificial intelligence to differentiate between adults and minors, based on the kinds of videos that they have been watching.

    The tests initially will only affect a sliver of YouTube’s audience in the U.S., but it will likely become more pervasive if the system works as well at guessing viewers’ ages as it does in other parts of the world. The system will only work when viewers are logged into their accounts, and it will make its age assessments regardless of the birth date a user might have entered upon signing up.

    If the system flags a logged-in viewer as being under 18, YouTube will impose the normal controls and restrictions that the site already uses as a way to prevent minors from watching videos and engaging in other behavior deemed inappropriate for that age.

    The safeguards include reminders to take a break from the screen, privacy warnings and restrictions on video recommendations. YouTube, which has been owned by Google for nearly 20 years, also doesn’t show ads tailored to individual tastes if a viewer is under 18.

    If the system has inaccurately called out a viewer as a minor, the mistake can be corrected by showing YouTube a government-issued identification card, a credit card or a selfie.

    “YouTube was one of the first platforms to offer experiences designed specifically for young people, and we’re proud to again be at the forefront of introducing technology that allows us to deliver safety protections while preserving teen privacy,” James Beser, the video service’s director of product management, wrote in a blog post about the age-verification system.

    People still will be able to watch YouTube videos without logging into an account, but viewing that way triggers an automatic block on some content without proof of age.

    The political pressure has been building on websites to do a better job of verifying ages to shield children from inappropriate content since late June when the U.S. Supreme Court upheld a Texas law aimed at preventing minors from watching pornography online.

    While some services, such as YouTube, have been stepping up their efforts to verify users’ ages, others have contended that the responsibility should primarily fall upon the two main smartphone app stores run by Apple and Google — a position that those two technology powerhouses have resisted.

    Some digital rights groups, such as the Electronic Frontier Foundation and the Center for Democracy & Technology, have raised concerns that age verification could infringe on personal privacy and violate First Amendment protections on free speech.

    [ad_2]

    Source link

  • Florida Man Accused of Hacking Disney World Menus, Changing Font to Wingdings

    Florida Man Accused of Hacking Disney World Menus, Changing Font to Wingdings

    [ad_1]

    With just days to go until the 2024 presidential election in the United States, WIRED reported on documents that revealed US government assessments about multiple components of election security and stability. First obtained by the national security transparency nonprofit Property of the People, one report distributed by the US Department of Homeland Security in October assessed that financially motivated cybercriminals and ideologically motivated hacktivists are more likely than state-backed hackers to attack US election infrastructure. Another government memo warned of the risk to the election of insider threats, noting that such internal malfeasance “could derail or jeopardize a fair and transparent election process.”

    With so much at stake in a hyper-polarized and combative climate, US elections have become increasingly militarized, with bulletproof glass, drones, defensive blockades, and snipers protecting election offices, and election officials bracing for the possibility of violent attacks. A WIRED investigation also revealed a successful CIA hack of Venezuela’s military payroll system that was part of a clandestine Trump administration effort to overthrow the country’s autocratic president, Nicolás Maduro.

    In other cybersecurity news, WIRED did a deep dive into the firewall vendor Sophos’ five-year turf war to try to remove Chinese hackers running espionage operations on some vulnerable devices—and keep them out. And researchers warn that a “critical” zero-click vulnerability in a default photo app on Synology network-attached storage devices could be exploited by hackers to steal data or infiltrate networks.

    As always, there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    A Disney employee who was fired from the company and still had access to its passwords allegedly hacked into the software used by Walt Disney World’s restaurants, according to reporting by 404 Media and Court Watch. A criminal complaint against Michael Scheuer claims he repeatedly accessed the third-party menu-creation system created for Disney and changed menus, including changing fonts to Windings—the font made up entirely of symbols.

    “The fonts were renamed by the threat actor to maintain the name of the original font, but the actual characters appeared as symbols,” the criminal complaint says. “As a result of this change, all of the menus within the database were unusable because the font changes propagated throughout the database.”

    The allegations aren’t limited to whimsical font vandalism, however. The federal complaint also details how Scheuer allegedly changed menu listings to say that foods with peanuts in them were safe for people with allergies, tried to log into Disney employees’ accounts, locked 14 employees out of their accounts by trying to log in with an automated script, and maintained a folder of personal information about employees and turned up at one person’s home. A lawyer representing Scheuer did not comment on the allegations.

    For the past few years, infostealers have become a popular tool of choice for hackers, from cybercriminals trying to make money to sophisticated nation state groups. The malware, which is often bundled into pirated software, uses web browsers to collect usernames and passwords, cookies, financial information, and other data you enter into your computer. This week, cops around the world took down the Redline infostealer, which has been used to grab more than 170 million pieces of information and has been linked to large-scale hacks. An almost identical infostealer called Meta was also disrupted. As part of Operation Magnus, US officials identified Russian national Maxim Rudometov as being behind the development of Redline. As TechCrunch reports, Rudometov was identified following a series of operational security errors, including reusing online handles and emails across social media apps and other websites. In its criminal complaint, the US Department of Justice pointed out Rudometov’s dating profile, which apparently has “liked” 89 other users and received no likes in return.

    In January 2018, it emerged that GPS data from running and cycling app Strava could expose secret military locations and the movements of people exercising around them. Officials warned that it was a clear security risk. Years later, many seemingly haven’t paid attention. French newspaper Le Monde has revealed in a series of stories that US Secret Service agents are leaking their data through the fitness app, allowing the movements of Joe Biden, Donald Trump, and Kamala Harris to be tracked. Security staff linked to French president Emmanuel Macron and Russian president Vladimir Putin are similarly exposing their movements. Those exposing their data used public profiles and often posted runs starting or finishing at the locations they were staying during official trips. Included in the leaks were bodyguards linked to Putin who were running near a palace the Russian leader has denied owning.

    Italian prosecutors placed four people under house arrest and revealed they are investigating at least 60 others after an intelligence firm in the country allegedly hacked government databases and gathered information on more than 800,000 people. Intelligence company Equalize allegedly gathered information about some of Italy’s most prominent politicians, entrepreneurs, and sports stars, Politico reported. It is alleged that the information accessed included bank transactions, police investigations, and more. The hacked information was reportedly sold or potentially used as part of extortion attempts, with those behind the scheme allegedly earning €3.1 million. The scandal, which has enraged Italian politicians, may also be wider than just its impact in Italy, with the latest reports suggesting Equalize counted Israeli intelligence and the Vatican as clients.

    [ad_2]

    Matt Burgess, Lily Hay Newman

    Source link

  • LinkedIn hit with 310 million euro fine for data privacy violations from Irish watchdog

    LinkedIn hit with 310 million euro fine for data privacy violations from Irish watchdog

    [ad_1]

    LONDON (AP) — European Union regulators slapped LinkedIn on Thursday with a 310 million euro ($335 million) fine for violations of the bloc’s stringent data privacy rules.

    Ireland’s Data Protection Commission reprimanded the Microsoft-owned professional social networking site over concerns about the “lawfulness, fairness and transparency” of its personal data processing for advertising purposes.

    The Dublin-based watchdog is LinkedIn’s lead privacy regulator in the 27-nation EU because that’s where the company’s European headquarters is based.

    The watchdog said it carried out an investigation that found LinkedIn did not have a lawful basis to gather data so it could target users with online ads, which is a breach of the privacy rules known as General Data Protection Regulation, or GDPR. It ordered LinkedIn to comply with the rules.

    Processing personal data “without an appropriate legal basis is a clear and serious violation” of the right to data protection in the EU, Deputy Commissioner Graham Doyle said in a statement.

    LinkedIn said it that while it believes it has been “in compliance” with the rules, it’s working to ensure its “ad practices” meet the requirements.

    [ad_2]

    Source link

  • Exposed United Nations Database Left Sensitive Information Accessible Online

    Exposed United Nations Database Left Sensitive Information Accessible Online

    [ad_1]

    A database containing sensitive, sometimes personal information from the United Nations Trust Fund to End Violence Against Women was openly accessible on the internet, revealing more than 115,000 files related to organizations that partner with or receive funding from UN Women. The documents range from staffing information and contracts to letters and even detailed financial audits about organizations working with vulnerable communities around the world, including under repressive regimes.

    Security researcher Jeremiah Fowler discovered the database, which was not password protected or otherwise access controlled, and disclosed the finding to the UN, which secured the database. Such incidents are not uncommon, and many researchers regularly find and disclose examples of exposures to help organizations correct data management mistakes. But Fowler emphasizes that this ubiquity is exactly why it is important to continue to raise awareness about the threat of such misconfigurations. The UN Women database is a prime example of a small error that could create additional risk for women, children, and LGBTQ people living in hostile situations worldwide.

    “They’re doing great work and helping real people on the ground, but the cybersecurity aspect is still critical,” Fowler tells WIRED. “I’ve found lots of data before, including from all sorts of government agencies, but these organizations are helping people who are at risk just for being who they are, where they are.”

    A spokesperson for UN Women tells WIRED in a statement that the organization appreciates collaboration from cybersecurity researchers and combines any outside findings with its own telemetry and monitoring.

    “As per our incident response procedure, containment measures were rapidly put in place and investigative actions are being taken,” the spokesperson said of the database Fowler discovered. “We are in the process of assessing how to communicate with the potential affected persons so that they are aware and alert as well as incorporating the lessons learned to prevent similar incidents in the future.”

    The data could expose people in multiple ways. At the organizational level, some of the financial audits include bank account information, but more broadly, the disclosures provide granular detail on where each organization gets its funding and how it budgets. The information also includes breakdowns of operating costs, and details about employees that could be used to map the interconnections between civil society groups in a country or region. Such information is also ripe for abuse in scams since the UN is such a trusted organization, and the exposed data would provide details on internal operations and potentially serve as templates for malicious actors to create legitimate-looking communications that purport to come from the UN.

    [ad_2]

    Lily Hay Newman

    Source link

  • ICE’s $2 Million Contract With a Spyware Vendor Is Under White House Review

    ICE’s $2 Million Contract With a Spyware Vendor Is Under White House Review

    [ad_1]

    A $2 million contract that United States Immigration and Customs Enforcement signed with Israeli commercial spyware vendor Paragon Solutions has been paused and placed under compliance review, WIRED has learned.

    The White House’s scrutiny of the contract marks the first test of the Biden administration’s executive order restricting the government’s use of spyware.

    The one-year contract between Paragon’s US subsidiary in Chantilly, Virginia, and ICE’s Homeland Security Investigations (HSI) Division 3 was signed on September 27 and first reported by WIRED on October 1. A few days later, on October 8, HSI issued a stop-work order for the award “to review and verify compliance with Executive Order 14093,” a Department of Homeland Security spokesperson tells WIRED.

    The executive order signed by President Joe Biden in March 2023 aims to restrict the US government’s use of commercial spyware technology while promoting its “responsible use” that aligns with the protection of human rights.

    DHS did not confirm whether the contract, which says it covers a “fully configured proprietary solution including license, hardware, warranty, maintenance, and training,” includes the deployment of Paragon’s flagship product, Graphite, a powerful spyware tool that reportedly extracts data primarily from cloud backups.

    “We immediately engaged the leadership at DHS and worked very collaboratively together to understand exactly what was put in place, what the scope of this contract was, and whether or not it adhered to the procedures and requirements of the executive order,” a senior US administration official with first-hand knowledge of the workings of the executive order tells WIRED. The official requested anonymity to speak candidly about the White House’s review of the ICE contract.

    Paragon Solutions did not respond to WIRED’s request to comment on the contract’s review.

    The process laid out in the executive order requires a robust review of the due diligence regarding both the vendor and the tool, to see whether any concerns, such as counterintelligence, security, and improper use risks, arise. It also stipulates that an agency may not make operational use of the commercial spyware until at least seven days after providing this information to the White House or until the president’s national security adviser consents.

    “Ultimately, there will have to be a determination made by the leadership of the department. The outcome may be—based on the information and the facts that we have—that this particular vendor and tool does not spur a violation of the requirements in the executive order,” the senior official says.

    [ad_2]

    Vas Panagiotopoulos

    Source link

  • Google Chrome’s uBlock Origin Purge Has Begun

    Google Chrome’s uBlock Origin Purge Has Begun

    [ad_1]

    And that’s not all. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    If you use uBlock Origin’s Chrome extension to filter out online ads, expect to get mildly annoyed in the near future. Google has begun implementing new Chrome extension standards, called Manifest V3, that will disable the legacy version of uBlock Origin’s extension that most users likely have installed. And while you might be thinking, “Google is a silverback gorilla of online advertising, of course they’re finally forcing me to see ads!” there is some good news. A new version of the ad-filtering extension that meets the Manifest V3 standards, uBlock Origin Lite, is now available. Then again, it won’t block as much as the previous iteration of uBlock. Still, as a Google spokesperson told The Verge, you have options: “The top content filtering extensions all have Manifest V3 versions available — with options for users of AdBlock, Adblock Plus, uBlock Origin and AdGuard.” Either way, you’ll need to install a new extension soon.

    US authorities announced charges this week against a 25-year-old Alabama man accused of hacking the Security and Exchange Commission’s X account. Prosecutors claim Eric Council Jr. obtained personal information and the materials for a fake ID of a person who controlled the @SECGov account from unidentified coconspirators. Council allegedly used the fake ID to carry out a SIM-swapping attack, duping AT&T retail store staff into giving him a new SIM card, which he ultimately used to take control of the victim’s phone account. The coconspirators used that to gain access to the SEC’s X account, where they posted a fake announcement about Bitcoin’s regulatory status, which was followed by a price jump of $1,000 per bitcoin. Council stands charged of conspiracy to commit aggravated identity theft and access device fraud.

    The grocery store chain Kroger has never used facial-recognition technology broadly in its stores and has no current plans to, a spokesperson told Fast Company this week. The company has been facing a firestorm over its use of electronic shelving labels over concerns that ESLs could be used to impose surge pricing on popular items, and fears that the devices could also be deployed with facial recognition. The company did a single-store facial-recognition pilot of a technology called EDGE in 2019, but it did not move forward with the service. US lawmakers including Rashida Tlaib, Elizabeth Warren, and Robert Casey have publicly raised concerns about Kroger’s use of ESLs.

    Microsoft told customers that it failed to capture more than two weeks of security logs from certain cloud services in September, including Microsoft Entra, Sentinel, Defender for Cloud, and Purview. News of the lost logs was first reported by Business Insider. The company said in the notification that “a bug in one of Microsoft’s internal monitoring agents resulted in a malfunction in some of the agents when uploading log data to our internal logging platform.” The blank extends from September 2 to September 19. A Microsoft executive confirmed to TechCrunch that the incident was caused by an “operational bug within our internal monitoring agent.”

    System activity logs are crucial for all sorts of operations and are particularly used for security monitoring and investigations, because they can expose breaches and malicious activity. After Russian hackers breached US government networks through SolarWinds software in 2020, many agencies couldn’t detect the activity in their Microsoft Azure cloud services because they weren’t paying for Microsoft’s premium tier features, so they didn’t have adequate network activity logs. Lawmakers were outraged about the up-charge, and the Biden administration worked for more than two years to get Microsoft to make the logging services free. The company ultimately announced the change in July 2023.

    [ad_2]

    Lily Hay Newman, Andrew Couts

    Source link

  • It Seemed Like an AI Crime-Fighting Super Tool. Then Defense Attorneys Started Asking Questions

    It Seemed Like an AI Crime-Fighting Super Tool. Then Defense Attorneys Started Asking Questions

    [ad_1]

    In 2017, then 9-year-old Kayla Unbehaun was abducted. For years, the South Elgin, Illinois police department searched for Unbehaun and her noncustodial mother, Heather Unbehaun, who was accused of the abduction, following her trail to Georgia, where they hit a dead end. During that time, the department signed a contract with Global Intelligence, and sergeant Dan Eichholz received a Cybercheck report that placed Unbehaun and her mother in Oregon, he tells WIRED. It was a new lead, but because Cybercheck didn’t provide any evidence to support its findings, Eichholz couldn’t use the report to obtain a search warrant.

    Unbehaun was finally reunited with her father in 2023, after an employee at a consignment shop in Asheville, North Carolina, recognized her mother from a picture shown on the Netflix show Unsolved Mysteries. After Unbehaun was located, Eichholz learned during the follow-up investigation that, until several months earlier, the pair had indeed been living in Oregon.

    “I don’t want to say it wasn’t actionable, but I couldn’t just take their information and go with it,” Eichholz says. “That was always the hang-up for us. ‘OK, you got me this information, but I still have to check and verify and do my thing with search warrants.’” The child abduction case against Heather Unbehaun is ongoing.

    Any Help They Can Get

    Cybercheck has spread to law enforcement agencies across the country thanks to generous marketing offers and word-of-mouth recommendations. But in interviews with WIRED and the email exchanges we examined, there was little evidence that law enforcement agencies sought or received evidence to support Global Intelligence’s claims about what its technology could do.

    Prosecutors who spoke to WIRED, such as Borden from Midland County, say they learned about Cybercheck because law enforcement in their jurisdiction had been using it. And when it came up in a case, they let the adversarial court system decide whether or not it was legitimate.

    “It was new technology and I was curious, so I was like, ‘Let’s give it a try and see how far we can get,’” Borden says. “I’m thankful that it didn’t come into evidence in my case, that I didn’t need it to get my conviction.”

    Emails show Global Intelligence sales representatives regularly offered to run police departments’ cases through Cybercheck for free in order to demonstrate the technology. They also referenced cases that Global Intelligence characterized as high profile and that Cybercheck supposedly helped solve, without naming the cases outright or providing evidence that Cybercheck had made any difference in the investigations.

    Emails obtained by WIRED from the Ohio Bureau of Criminal Investigation show that investigators were initially excited to see what information Cybercheck could provide about their cold cases. They even introduced Global Intelligence sales representatives to other law enforcement agencies in Ohio. That enthusiasm seems to have helped convince other agencies to trust the company.

    Gessner, from the Summit County Prosecutor’s office, says that when his agency was deciding whether to use Cybercheck evidence, it asked the Ohio BCI’s cybercrimes unit for an opinion. “They said, yes, it makes sense … we don’t have the technology to do this, but we’d love to have it.” County prosecutors also reached out to the SANS Institute, he says, and were told the institute didn’t “do this type of stuff.”

    But even as it has withdrawn evidence that Cybercheck provided, Gessner says the Summit County Prosecutor’s Office is asking other companies whether they can do the same kind of open source locating that Global Intelligence marketed.

    “We don’t want to shut doors that can help point to the truth in our cases,” he says.

    [ad_2]

    Todd Feathers

    Source link

  • The War on Passwords Is One Step Closer to Being Over

    The War on Passwords Is One Step Closer to Being Over

    [ad_1]

    The password-killing tech known as “passkeys” have proliferated over the past two years, developed by the tech industry association known as the FIDO Alliance as an easier and more secure authentication alternative. And although superseding any technology as entrenched as passwords is difficult, new features and resources launching this week are pushing passkeys toward a tipping point.

    At the FIDO Alliance’s Authenticate Conference in Carlsbad, California, on Monday, researchers are announcing two projects that will make passkeys easier for organizations to offer—and easier for everyone to use. One is a new technical specification called Credential Exchange Protocol (CXP) that will make passkeys portable between digital ecosystems, a feature that users have increasingly demanded. The other is a website, called Passkey Central, where developers and system administrators can find resources like metrics and implementation guides that make it easier to add support for passkeys on existing digital platforms.

    “To me, both announcements are part of the broader story of the industry working together to stop our dependence on passwords,” Andrew Shikiar, CEO of the FIDO Alliance, told WIRED ahead of Monday’s announcements. “And when it comes to CXP, we have all these companies who are fierce competitors willing to collaborate on credential exchange.”

    CXP comprises a set of draft specifications developed by the FIDO Alliance’s “Credential Provider Special Interest Group.” Development of technical standards can often be a fraught bureaucratic process, but the creation of CXP seems to have been positive and collaborative. Researchers from the password managers 1Password, Bitwarden, Dashlane, NordPass, and Enpass all worked on CXP, as did those from the identity providers Okta as well as Apple, Google, Microsoft, Samsung, and SK Telecom.

    The specifications are significant for a few reasons. CXP was created for passkeys and is meant to address a longstanding criticism that passkeys could contribute to user lock-in by making it prohibitively difficult for people to move between operating system vendors and types of devices. In many ways, though, this problem already exists with passwords. Export features that allow you to move all of your passwords from one manager to another are often dangerously exposed and essentially just dump a list of all of your passwords into a plaintext file.

    It’s gotten much easier to sync passkeys across your devices through a single password manager, but CXP aims to standardize the technical process for securely transferring them between platforms so users are free—and safe—to roam the digital landscape. Importantly, while CXP was designed with passkeys in mind, it is really a specification that can be adapted to securely exchange other secrets as well, including passwords or other types of data.

    [ad_2]

    Lily Hay Newman

    Source link

  • How to Stop Your Data From Being Used to Train AI

    How to Stop Your Data From Being Used to Train AI

    [ad_1]

    If you’re using a personal Adobe account, it’s easy to opt out of the content analysis. Open up Adobe’s privacy page, scroll down to the Content analysis for product improvement section, and click the toggle off. If you have a business or school account, you are automatically opted out.

    Amazon: AWS

    AI services from Amazon Web Services, like Amazon Rekognition or Amazon CodeWhisperer, may use customer data to improve the company’s tools, but it’s possible to opt out of the AI training. This used to be one of the most complicated processes on the list, but it’s been streamlined in recent months. Outlined on this support page from Amazon is the full process for opting out your organization.

    Figma

    Figma, a popular design software, may use your data for model training. If your account is licensed through an Organization or Enterprise plan, you are automatically opted out. On the other hand, Starter and Professional accounts are opted in by default. This setting can be changed at the team level by opening the settings to the AI tab and switching off the Content training.

    Google Gemini

    For users of Google’s chatbot, Gemini, conversations may sometimes be selected for human review to improve the AI model. Opting out is simple, though. Open up Gemini in your browser, click on Activity, and select the Turn Off drop-down menu. Here you can just turn off the Gemini Apps Activity, or you can opt out as well as delete your conversation data. While this does mean in most cases that future chats won’t be seen for human review, already selected data is not erased through this process. According to Google’s privacy hub for Gemini, these chats may stick around for three years.

    Grammarly

    Grammarly updated its policies, so personal accounts can now opt out of AI training. Do this by going to Account, then Settings, and turning the Product Improvement and Training toggle off. Is your account through an enterprise or education license? Then, you are automatically opted out.

    Grok AI (X)

    Kate O’Flaherty wrote a great piece for WIRED about Grok AI and protecting your privacy on X, the platform where the chatbot operates. It’s another situation where millions of users of a website woke up one day and were automatically opted in to AI training with minimal notice. If you still have an X account, it’s possible to opt out of your data being used to train Grok by going to the Settings and privacy section, then Privacy and safety. Open the Grok tab, then deselect your data sharing option.

    HubSpot

    HubSpot, a popular marketing and sales software platform, automatically uses data from customers to improve its machine-learning model. Unfortunately, there’s not a button to press to turn off the use of data for AI training. You have to send an email to privacy@hubspot.com with a message requesting that the data associated with your account be opted out.

    LinkedIn

    Users of the career networking website were surprised to learn in September that their data was potentially being used to train AI models. “At the end of the day, people want that edge in their careers, and what our gen-AI services do is help give them that assist,” says Eleanor Crum, a spokesperson for LinkedIn.

    You can opt out from new LinkedIn posts being used for AI training by visiting your profile and opening the Settings. Tap on Data Privacy and uncheck the slider labeled Use my data for training content creation AI models.

    OpenAI: ChatGPT and Dall-E

    OpenAI via Matt Burgess

    People reveal all sorts of personal information while using a chatbot. OpenAI provides some options for what happens to what you say to ChatGPT—including allowing its future AI models not to be trained on the content. “We give users a number of easily accessible ways to control their data, including self-service tools to access, export, and delete personal information through ChatGPT. That includes easily accessible options to opt out from the use of their content to train models,” says Taya Christianson, an OpenAI spokesperson. (The options vary slightly depending on your account type, and data from enterprise customers is not used to train models).

    [ad_2]

    Matt Burgess, Reece Rogers

    Source link

  • How Should We Feel About Ring?

    How Should We Feel About Ring?

    [ad_1]

    Ring cameras have come a long way. Since the security camera brand launched 11 years ago, its video doorbells and cams have become vigilant, constant surveyors of patios, porches, and vestibules everywhere. Amazon now owns the company, and has ushered it through controversies over privacy concerns, security breaches, incidents of vigilantism, and the company’s cozy relationship with law enforcement. The drama has not slowed growth; over 10 million Rings have been installed, and the cameras currently blanket our urban and suburban landscape, filming the movements of you, your family, and any strangers who wander near your door.

    That makes for a lot of video to sift through if you’re trying to find something important, like whether or not a delivery was made, or what time your kids left for soccer practice. That abundance of footage is why Ring cameras, along with many other consumer products right now, are getting some AI-powered capabilities. Ring’s software update helps users search for specific moments their cameras may have captured.

    This week, WIRED senior writer Paresh Dave joins the show again to talk about the evolution of Ring—how the security cameras have become nearly ubiquitous security tech, and what the future holds now that they’re being infused with AI.

    Show Notes

    Read Paresh’s story about Ring’s AI updates. Read WIRED’s guides to the best indoor and outdoor security cameras. Read more about all the data Ring collects from its users and why we recently stopped recommending Ring cameras for a couple of years.

    Recommendations

    Paresh recommends getting a Sling TV subscription from Dish to watch live sports. Mike recommends searching for decoy security cameras you can install if your landlord requires you to put up a security camera. Lauren recommends the streaming shows Nobody Wants This and Killing Eve. Both are on Netflix.

    Paresh Dave can be found on social media @peard33. Lauren Goode is @LaurenGoode. Michael Calore is @snackfight@heads.social. Bling the main hotline at @GadgetLab. The show is produced by Boone Ashworth (@booneashworth). Our theme music is by Solar Keys.

    How to Listen

    You can always listen to this week’s podcast through the audio player on this page, but if you want to subscribe for free to get every episode, here’s how:

    If you’re on an iPhone or iPad, open the app called Podcasts, or just tap this link. You can also download an app like Overcast or Pocket Casts, and search for Gadget Lab. If you use Android, you can find us in the Google Podcasts app just by tapping here. We’re on Spotify too. And in case you really need it, here’s the RSS feed.

    [ad_2]

    Lauren Goode, Michael Calore

    Source link

  • The FBI Still Hasn’t Cracked NYC Mayor Eric Adams’ Phone

    The FBI Still Hasn’t Cracked NYC Mayor Eric Adams’ Phone

    [ad_1]

    Pig butchering, the crypto-based scammer scourge that has pulled in an estimated $75 billion from victims globally, is spreading beyond its roots in Southeast Asia, with operations proliferating across the Middle East, Eastern Europe, Latin America, and West Africa.

    The UK’s National Crime Agency disclosed new details about the identities of the Russian ransomware group known as Evil Corp—as well as the group’s ties to Russian intelligence agencies and even its direct participation in espionage operations targeting NATO allies.

    A WIRED investigation revealed how car-mounted automatic license plate reader cameras are capturing far more than just license plates, including campaign yard signs, bumper stickers, and other politically sensitive text, all examples of how a system for tracking vehicles threatens to become a broader surveillance tool.

    In other news, ICE signed a $2 million contract with Paragon Solutions, a known vendor of spyware including the hacking tool Graphite. And the Pentagon is increasingly adopting handheld controllers for weapons systems in an effort provide more intuitive interfaces to soldiers who have grown up playing Xbox and PlayStation consoles.

    And there’s more. Each week, we round up the privacy and security news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    As the politics of America’s biggest city have been turned upside down by the criminal charges against New York mayor Eric Adams, there’s still a “significant wild card” in the corruption case against him, prosecutors said in court this week: The FBI can’t manage to get into his phone.

    Prosecutors in the case against Adams, which centers on alleged illegal payments the mayor received from the Turkish government, revealed that the FBI still hasn’t cracked the encryption on Adams’ personal phone, nearly a year after it was seized. That phone is one of three that the bureau has taken from Adams, but agents seized Adams’ personal phone a day later than the other two devices he used in an official capacity. By that time, Adams had not only changed the passcode on the phone from a four digit PIN to six digits—a measure he says he took to prevent staffers from intentionally or unintentionally deleting information from the device. He also claims he immediately “forgot” that code to unlock it.

    That very convenient amnesia may leave the FBI and prosecutors in a situation similar to their investigation into the San Bernardino mass shooting carried out by Syed Rizwan Farook in 2016, when the US government demanded Apple help unlock the shooter’s encrypted iPhone, leading to a high-profile standoff between the Apple and the FBI. In that case, the cybersecurity firm Azimuth eventually used a closely guarded—and expensive—hacking technique to unlock the device. In Adams’ case, prosecutors hinted that the FBI may have to resort to similar measures. “Decryption always catches up with encryption,” a prosecutor in the case, Hagan Scotten, told the judge.

    Face recognition is one of only a few technologies that even Facebook and Google have hesitated to integrate into products like Google Glass and the Ray-Ban Meta smart glasses—and rightly so, given the privacy implications of a device that would allow anyone to look at a stranger on the street and immediately determine their phone number and home address. Now, however, a group of Harvard students has shown how easy it is to bolt that face recognition onto Meta’s augmented-reality eyewear. The project, known as I-XRAY, integrates with the face-recognition service Pimeyes to let Ray-Ban Meta wearers learn the name of virtually anyone they see and then immediately scour databases of personal information to determine other info about them, including names of family members, phone numbers, and home addresses. The students say they’re not releasing the code for their experiment, instead intending it as a demonstration of the privacy-invasive potential of augmented-reality devices. Point made.

    If that warning about the privacy risks of AR eyewear needed more reinforcement, Meta this week also conceded to TechCrunch that it will use input from users’ smart glasses to train its AI products. Initially, Meta declined to answer TechCrunch’s questions about whether and how it would collect information from Ray-Ban Meta smart glasses for use as AI training data, in contrast to companies like OpenAI and Anthropic that explicitly say they don’t exploit user inputs to train their AI services. A couple of days later, however, Meta confirmed to TechCrunch that it does in fact use images or video collected through its smart glasses to train its AI, but only if the user submits them to Meta’s AI tools. That means anything that a user sees and asks Meta’s AI chatbot to comment on or analyze will become part of Meta’s massive AI-training data trove.

    If you can’t arrest Russian hackers, at least you can nab their web domains. That, at least, is the approach this week of the US Justice Department, which along with Microsoft and the NGO Information Sharing and Analysis Center used a lawsuit to take control of more than a hundred web domains that had been used by Russian hackers working for the Kremlin’s intelligence and law enforcement agency known as the FSB. Those domains had been exploited in phishing campaigns by the Russian hacker group known as Star Blizzard, which has a history of targeting the typical victims of geopolitical spying such as journalists, think tanks, and NGOs. The domain seizures seem designed in part to head off threats of foreign interference in next month’s US election. “Rebuilding infrastructure takes time, absorbs resources, and costs money,” Steven Masada, the assistant general counsel of Microsoft’s Digital Crimes Unit, said in a statement. “Today’s action impacts [the hackers’] operations at a critical point in time when foreign interference in US democratic processes is of utmost concern.”

    [ad_2]

    Andy Greenberg

    Source link

  • Meta Can’t Use Sexual Orientation to Target Ads in the EU, Court Rules

    Meta Can’t Use Sexual Orientation to Target Ads in the EU, Court Rules

    [ad_1]

    Europe’s most famous privacy activist, Max Schrems, landed another blow against Meta today after the EU’s top court ruled the tech giant cannot exploit users’ public statements about their sexual orientation for online advertising.

    Since 2014, Schrems has complained of seeing advertising on Meta platforms targeting his sexual orientation. Schrems claims, based on data he obtained from the company, that advertisers using Meta can deduce his sexuality from proxies, such as his app logins or website visits. Meta denies it showed Schrems personalized ads based on his off-Facebook data, and the company has long said it excludes any sensitive data it detects from its advertising operations.

    The case started with Schrems challenging whether this practice violated Europe’s GDPR privacy law. But it took an unexpected turn when a judge in his home country of Austria ruled Meta was entitled to use his sexuality data for advertising because he had spoken about it publicly during an event in Vienna. The Austrian Supreme Court then referred the case to the EU’s top court in 2021.

    Today, the Court of Justice of the European Union (CJEU) finally ruled that a person’s sexual orientation cannot be used for advertising, even if that person speaks publicly about being gay.

    “Meta Platforms Ireland collects the personal data of Facebook users, including Mr. Schrems, concerning those users’ activities both on and outside that social network,” the court said. “With the data available to it, Meta Platforms Ireland is also able to identify Mr. Schrems’ interest in sensitive topics, such as sexual orientation, which enables it to direct targeted advertising at him.”

    The fact that Schrems had spoken publicly about his sexual identity does not authorize any platform to process related data to offer him personalized advertising, the court added.

    “Now we know that if you’re on a public stage, that doesn’t necessarily mean that you agree to this personal data being processed,” says Schrems, founder of the Austrian privacy group NOYB. He believes only a handful of Facebook users will have the same issue. “It’s a really, really niche problem.”

    The CJEU also ruled today Meta has to limit the data it uses for advertising more broadly, essentially setting ground rules for how the GDPR should be enforced. Europe’s privacy law means personal data should not be “aggregated, analyzed, and processed for the purposes of targeted advertising without restriction as to time and without distinction as to type of data,” the court said in a statement.

    “It’s really important to set ground rules,” says Katharina Raabe-Stuppnig, the lawyer representing Schrems. “There are some companies who think they can just disregard them and get a competitive advantage from this behavior.”

    Meta said it was waiting for the CJEU’s judgment to be published in full. “Meta takes privacy very seriously and has invested over 5 billion Euros to embed privacy at the heart of all of our products,” Meta spokesperson Matt Pollard told WIRED. “Everyone using Facebook has access to a wide range of settings and tools that allow people to manage how we use their information.”

    Schrems has been a prolific campaigner against Meta since a legal challenge he made resulted in a surprise 2015 ruling invalidating a transatlantic data transfer system over concerns US spies could use it to access EU data. His organization has since filed legal complaints against Meta’s pay-for-privacy subscription model and the company’s plans to use Europeans’ data to train its AI.

    “It’s major for the whole online advertisement space. But for Meta, it’s just another one in the long list of violations they have,” says Schrems, of this latest ruling. “The walls are closing in.”

    [ad_2]

    Morgan Meaker

    Source link

  • Austrian activist Schrems wins privacy case against Meta over personal data on sexual orientation

    Austrian activist Schrems wins privacy case against Meta over personal data on sexual orientation

    [ad_1]

    LONDON — The European Union’s top court said Friday that social media company Meta can’t use public information about a user’s sexual orientation obtained outside its platforms for personalized advertising under the bloc’s strict data privacy rules.

    The decision from the Court of Justice of the European Union in Luxembourg is a victory for Austrian privacy activist Max Schrems, who has been a thorn in the side of Big Tech companies over their compliance with 27-nation bloc’s data privacy rules.

    The EU court issued its ruling after Austria’s supreme court asked for guidance in Schrems’ case on how to apply the privacy rules, known as the General Data Protection Regulation, or GDPR.

    Schrems had complained that Facebook had processed personal data including information about his sexual orientation to target him with online advertising, even though he had never disclosed on his account that he was gay. The only time he had publicly revealed this fact was during a panel discussion.

    “An online social network such as Facebook cannot use all of the personal data obtained for the purposes of targeted advertising, without restriction as to time and without distinction as to type of data,” the court said in a press release summarizing its decision.

    Even though Schrems revealed he was gay in the panel discussion, that “does not authorise the operator of an online social network platform to process other data relating to his sexual orientation, obtained, as the case may be, outside that platform, with a view to aggregating and analysing those data, in order to offer him personalised advertising.”

    Meta said it was awaiting publication of the court’s full judgment and that it “takes privacy very seriously.”

    “Everyone using Facebook has access to a wide range of settings and tools that allow people to manage how we use their information,” the company said in a statement.

    Schrems’ lawyer, Katharina Raabe-Stuppnig, lawyer representing Mr Schrems, welcomed the court’s decision.

    “Meta has basically been building a huge data pool on users for 20 years now, and it is growing every day. However, EU law requires ‘data minimisation’,” she said in a statement. “Following this ruling only a small part of Meta’s data pool will be allowed to be used for advertising — even when users consent to ads.”

    [ad_2]

    Source link