ReportWire

Tag: Security

  • One Republican Now Controls a Huge Chunk of US Election Infrastructure

    [ad_1]

    The news last week that Dominion Voting Systems was purchased by the founder and CEO of Knowink, a Missouri-based maker of electronic poll books, has left election integrity activists confused over what, if anything, this could mean for voters and the integrity of US elections.

    The company, acquired by Scott Leiendecker, a former Republican Party operative and election director in Missouri before founding Knowink, said in a press release that he was rebranding Dominion, which has headquarters in Canada and the United States, under the name Liberty Vote “in a bold and historic move to transform and improve election integrity in America” and to distance the company from false allegations made previously by President Donald Trump and his supporters that the company had rigged the 2020 presidential election to give the win to President Joe Biden.

    The Liberty release said that the rebranded company will be 100 percent American owned, that it will have a “paper ballot focus” that leverages hand-marked paper ballots, will “prioritize facilitating third-party auditing,” and is “committed to domestic staffing and software development.” The press release provided no details, however, to explain what this means in practice.

    Dominion, the second leading provider of voting machines in the US, whose systems are used in 27 states—including the entire state of Georgia—has developed its software in Belgrade, Serbia and Canada for two decades. A search on LinkedIn shows numerous programmers and other workers in Serbia who claim to be employed by the company.

    The Liberty statement does not say whether the company plans to re-write code developed by these foreign workers—which would potentially involve rewriting hundreds of thousands of lines of code—or whether the company will move foreign developers to the US or replace them with American programmers. (Dominion already has a US headquarters in Colorado.) A Liberty official, who agreed to speak on the condition that they not be named, told WIRED only that Leiendecker “is committed to 100 percent … domestic staffing and software development.” An unnamed source told CNN, however, that Liberty will continue to have a presence in Canada, where its machines are used across the country.

    Philip Stark, professor of statistics at UC Berkeley and longtime election-integrity advocate, says that Liberty’s assurance about domestic-only workers is a red herring. “If the claim is that this is somehow a security measure, it isn’t. Because programmers based in the US also … may be interested in undermining or altering election integrity,” he tells WIRED.

    With regard to third-party audits mentioned in the press release, a Liberty official told WIRED this means the company will conduct a “third-party, top-to-bottom, independent review of [Dominion] software and equipment in a timely manner and will work closely with federal and state certification agencies and report any vulnerabilities” to give voters assurance in the machines and the results they produce. The company didn’t say when this review would occur, but a Liberty representative told Axios it would happen ahead of next year’s midterm elections, and the company would “rebuild or retire” machines as needed.

    [ad_2]

    Kim Zetter

    Source link

  • Years of CATS security staffing shortages preceded Iryna Zarutska’s stabbing

    [ad_1]

    The Charlotte Area Transit System has faced stiff criticism following the fatal stabbing of 23-year-old Ukrainian refugee Iryna Zarutska on the Blue Line in August.

    A Sept. 30 special report from the state auditor’s office accused the city of recently allowing security staffing gaps that left people using the transit system vulnerable at the time Zarutska was killed. It suggests that a focus on meeting diversity goals when selecting contractors resulted in a less-desirable security contract — one with fewer armed officers — than the previous CATS security agreement, which ended in 2023.

    Public records, however, show that that security staffing shortages prompted Charlotte officials’ decision to end at least one transit security contract in 2023. It’s also clear that city leaders have been told about the need to address security officer vacancies for at least five years.

    Evidence that city officials received multiple warnings about staffing shortages include:

    • 2020: A former CATS security provider, Allied Universal, asked CATS officials to raise contractor wages to address shortages as early as 2020, a company executive told the Charlotte City Council in 2023.

    • 2022: Allied Universal submitted a 13-page report to officials in November 2022 outlining security staffing challenges and the need to raise pay, company executive Charlie Bohnenberger said in 2023.

    • 2023: Allied Universal temporarily stopped placing security personnel on city buses due to staffing shortages, interim CATS CEO Brent Cagle said in May 2023 after a shootout between a passenger and driver.

    The Charlotte Area Transit System declined to make interim CEO Cagle available for an interview and did not directly address how it responded to Allied’s concerns.

    Security vacancies remain despite increased spending

    CATS, established in 2000 as a division of the City of Charlotte, is one of the largest transit systems in the Southeast. It operates a fleet of 173 fixed-route buses at peak demand and seven-day-a-week light rail service, with tracks covering nearly 20 miles.

    Iryna Zarutska boards a Charlotte Lynx Blue Line car at around 9:45 p.m. on Aug. 22 in this screenshot of footage released to media outlets. Zarutska was fatally stabbed on her way home from work.
    Iryna Zarutska boards a Charlotte Lynx Blue Line car at around 9:45 p.m. on Aug. 22 in this screenshot of footage released to media outlets. Zarutska was fatally stabbed on her way home from work. Charlotte Area Transit System

    As occurred after Zarutska was stabbed on a Blue Line car while on her way home from work, debates over security staffing have flared previously after violence on city buses and light rail.

    Multiple bus drivers have been shot over the past several years — one fatally. Pedestrians and drivers have shot at CATS buses and one person was hospitalized after a stabbing on the Gold Line. In at least one case, a bus driver shot a passenger. Violence against CATS operators reached a four-year high in 2021, The Charlotte Observer reported in 2023.

    Charlotte officials increased spending on CATS security from $5.9 million in 2022 to $18.4 million in 2025. The next year a contract with Professional Police Services, CATS’ current security provider, increased the total number of security positions to 219, from as few as 108 previously, according to the auditor’s report.

    Yet the number of armed officers declined from as many as 88 in a 2018 contract to 39 in the current contract, the state auditor’s report emphasizes.

    And what was on paper didn’t always match what occurred on CATS buses or light rail cars.

    Michael Bermudez drove from Spartanburg, S.C. to attend a Sept. 22 memorial service for Iryna Zarutska. The young woman’s death prompted questions about the adequacy of Charlotte Area Transit System security.
    Michael Bermudez drove from Spartanburg, S.C. to attend a Sept. 22 memorial service for Iryna Zarutska. The young woman’s death prompted questions about the adequacy of Charlotte Area Transit System security. JEFF SINER jsiner@charlotteobserver.com

    Professional Police Services — also known as Professional Security Services — had only 186 of 219 contracted positions filled 12 days after Zarutska was killed, with the city reporting more security on the job since then.

    CATS security contracts show the company took on additional security responsibilities in 2024. In December, CATS leadership transitioned armed security services to PPS after ending its relationship with another contractor, Strategic Security Corporation. PPS was already handling unarmed security for CATS.

    A PPS executive declined to comment for this story. His company was eight months into the process of staffing the additional services at the time of Zarutska’s death.

    Persistent problems with security staffing

    Long before the current shortfall, a former CATS security contractor had trouble filling its security positions. Cagle has said that CATS ended its contract with Allied, the previous security provider, in 2023 due to staffing shortages.

    In the company’s defense, Allied had “repeatedly engaged CATS leadership” about staffing concerns since 2020, company executive Charlie Bohnenberger told the Charlotte City Council in April 2023.

    Mayor Vi Lyles speaks during a press conference to announce and detail new security enhancements being implemented throughout CATS Charlotte, N.C., on Friday, October 3, 2025.
    Mayor Vi Lyles speaks during a press conference to announce new security enhancements being implemented throughout CATS on Oct. 3. KHADEJEH NIKOUYEH Knikouyeh@charlotteobserver.com

    “In November we provided a 13-page report, providing in great detail wage analysis from multiple independent sources showing CATS that in order to address the police staffing shortages, we need to do wage adjustments,” Bohnenberger said.

    Allied officials did not respond to multiple requests for an interview. The Charlotte Observer on Oct. 1 requested a copy of the 2022 report and other public documents from city officials but has not received them.

    When asked why the security staffing shortfalls have persisted, longtime Charlotte City Council member Ed Driggs said multiple problems with CATS came to light around 2022, when Allied said their report was submitted.

    “Security wasn’t the only thing that wasn’t working as well as it should have,” said Driggs, a member of the city council since 2013 who now chairs its Transportation, Planning and Development Committee.

    The decision to triple investment in CATS security since then was city leaders’ attempt to address gaps, Driggs said. Officials often have to make difficult decisions about where to allocate funds with so many competing priorities, Driggs said. And while the goal is zero crime, it may not be realistic.

    “We do have a responsibility as council to run a lean organization — we cannot be kind of extravagant in terms of spending 10 times as much money in order to achieve a 20% reduction in incidents on the trains,” Driggs said.

    Low wages have long plagued the private security sector, according to a 2025 analysis of federal data by the Center for American Progress. Turnover rates are more than 50% annually across the industry, the report found.

    Today, unarmed transit security officers make $30.96 per hour, according to CATS’ contract with Professional Police Services. Armed security guards make $42 per hour and company police officers make $46.97 per hour. Sergeants and captains are paid at higher rates.

    Stepped up protective efforts

    CATS officials did not respond to questions about previous struggles with security staffing. But they shared public documents listing recent security improvements.

    Tatyana Thulien sings Amazing Grace during a memorial service for Iryna Zarutska who was stabbed to death while riding the Charlotte Lynx Blue Line in Charlotte, NC on Friday, August 22, 2025. Zarutska was a 23-year-old Ukrainian refugee.
    Tatyana Thulien sings Amazing Grace during a memorial service for Iryna Zarutska, a 23-year-old Ukranian refugee. JEFF SINER jsiner@charlotteobserver.com

    They include the addition of off-duty Charlotte-Mecklenburg Police Department officers to supplement security contractors. PA announcements that started on Sept. 18 reminding passengers that fare is required. And ramped-up, random “fare blitzes” at Blue Line stations that began around the same time and are intended to make sure more passengers are paying for their rides.

    Transit security officers are now using bikes and utility terrain vehicles for patrols along the Blue Line, Charlotte officials announced during the Oct. 3 news conference. That increases accessibility to hard-to-reach platforms, like those in Uptown and South End, Cagle said.

    “PSS has around 200 officers currently employed and has deployed officers to fully staff the Blue Line,” CATS spokesperson Brett Baldeck said in an emailed statement. “Recruitment efforts are ongoing to bring additional staffing up to the 219 outlined in the security contract. We continue the addition of off-duty CMPD officers to supplement the work of our already established security personnel. “

    Looking ahead

    CATS plans within the next year to determine the optimal number of security officers, police officers and fare enforcement officers to cover rail and bus operations, according to CATS September 2025 security and safety plan.

    The transit system will then “work toward budgeting and/or obtaining funding to supply the resources identified,” the report states.

    Some Charlotte leaders say continued investment in the system will be critical. That includes passage of a 1% transportation sales tax referendum that voters will weigh in on in November.

    It would earmark $20 billion for the region’s transportation system over the next 30 years, allowing for the expansion of light rail and more.

    Those dollars would allow CATS to become a transit agency with its own sworn police force, according to the security plan.

    A police chief for the department would be tasked with conducting a planning study to determine “the most effective structure and size” of the transit police department, according to CATS’ September 2025 security and safety plan. Deployment of the force could take 18 to 24 months.

    “We have an ongoing effort that we had before Iryna to staff up and to improve security and to consider all the possibilities, and that will continue,” Driggs said.

    EDITOR’S NOTE: Do you have information about CATS security or an experience related to safety on the system’s buses or light rail system that you want to share? If yes, contact Charlotte Observer reporter Amber Gaudet at agaudet@charlotteobserver.com.

    Follow More of Our Reporting on

    Related Stories from Charlotte Observer

    [ad_2]

    Amber Gaudet

    Source link

  • Retirees lose millions to fake holiday charities as scammers exploit seasonal generosity

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The holidays are supposed to be a season of generosity, family and giving back. For many retirees, October through December is the time to support causes close to their hearts, whether it’s helping veterans, feeding families or donating to disaster relief. But there’s a darker side to this generosity. Scammers know that retirees are among the most generous members of our communities, and they exploit that kindness to line their own pockets.

    Millions of dollars are stolen through fake “charities” that pop up just before the holidays. Their calls, letters and emails look legitimate, but the money never reaches those in need. Instead, it funds criminals who are ready to strike again.

    Here’s what every retiree (and their loved ones) should know about holiday charity scams and how to protect their money, identity and peace of mind.

    HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Scammers mimic real charities to pressure retirees into quick donations. (Kurt “CyberGuy” Knutsson)

    Why retirees are prime targets for fake charities

    Retirees often give more generously than other groups. Scammers know this, and they know how to tailor their pitch.

    • Emotional appeals: Fraudsters will mention children, veterans or natural disaster victims to tug at heartstrings.
    • Polite persistence: Retirees tend to answer calls and engage longer on the phone, which scammers see as an opportunity.
    • Data exposure: Your name, age, phone number and even donation history can already be found online through data brokers. That means scammers don’t need to guess; they target you because they know you’ve donated before.

    When you combine generosity with publicly available data, scammers see retirees as the “perfect donors.”

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Fake charity red flags

    How do you know if a charity request is real or just a scam dressed up for the holidays? Look for these warning signs:

    • Pressure to act fast: If a caller insists you donate “right now” or tries to guilt you into giving before you hang up, it’s likely a scam. Real charities welcome donations anytime.
    • No details about how money is used: Authentic charities can explain where funds go. Scammers use vague promises like “helping the needy” without specifics.
    • Untraceable payment methods: Requests for gift cards, wire transfers or peer-to-peer app transfers (like Venmo or Zelle) are instant red flags.
    • Lookalike names: Fraudsters often invent names that sound similar to well-known charities, like “Veterans Hope Relief” or “Children’s Aid International.”
    • Caller ID tricks: Scammers can spoof numbers to make it look like they’re calling from a local area code or even a real charity office.

    How to safely check a charity before donating

    Here’s how to protect yourself while still supporting the causes that matter to you:

    • Research the charity’s name: Before donating, search it on sites like Charity Navigator or the Better Business Bureau’s Wise Giving Alliance at give.org/. If it doesn’t appear there, that’s a red flag.
    • Ask for written information: Real organizations will happily mail or email details about their mission, budgets and how donations are used.
    • Verify tax-exempt status: Use the IRS Tax-Exempt Organization Search at Irs.gov/charities-and-nonprofits to confirm the charity is legitimate.
    • Check how much goes to the cause: Some charities are real but inefficient, spending more on salaries than programs. Make sure your donation actually helps.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Protecting your payment details

    Even if the charity itself is real, you need to protect how you give:

    • Use a credit card rather than a debit card because credit cards offer stronger fraud protection.
    • Never give payment info over the phone if you didn’t initiate the call.
    • Donate through the charity’s official website instead of clicking links in unsolicited emails.
    • Keep records of your donations for tax purposes and to spot anything suspicious later.
    Elderly woman bakes holiday treat with children.

    The elderly must stay vigilant as holiday charity scams target older donors. (iStock)

    Why removing your data online reduces charity scam calls

    Here’s something most people don’t realize: many charity scams start with data brokers. These companies collect your personal details, such as age, phone number, donation history and even religious or political leanings, and sell them to anyone who asks. That means fraudsters can buy a ready-made list of “generous retirees who donate to veterans’ causes” and start calling immediately. The more information out there about you, the more personalized and convincing scam calls become. That’s why removing your data from broker sites is one of the most powerful defenses available to you.

    The easy way to do it

    Manually contacting hundreds of data brokers is a never-ending task. Each one has its own forms, emails and hoops to jump through, and many will re-add you months later. That’s where a data removal service comes in. They automatically reach out to data brokers on your behalf, demand the removal of your personal info and keep following up so it doesn’t creep back online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    A person types on a computer.

    Protect your personal information by donating only through verified official websites. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaways

    The holidays should be about joy, generosity and giving back, not about lining the pockets of fraudsters. By spotting the red flags of fake charities, double-checking where your money goes and removing your personal information from online databases, you can keep your donations safe and make sure they reach the people who truly need them. Remember: protecting your generosity is just as important as sharing it.

    Have you ever been contacted by a fake charity during the holidays? What tipped you off? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    [ad_1]

    Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

    Like Taking a Screenshot

    Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

    “Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

    The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

    Pixnapping targets the same side channel as GPU.zip, specifically the precise amount of time it takes for a given frame to be rendered on the screen.

    [ad_2]

    Dan Goodin, Ars Technica

    Source link

  • Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire

    [ad_1]

    “Chen Zhi was directly involved in managing the scam compounds and maintained records associated with each one, including records tracking profits from the scams that explicitly referenced ‘sha zhu,’ or pig-butchering,” the indictment claims, alleging there were also “ledgers of bribes to public officials.” One document allegedly held by Chen listed that two scam centers were equipped with 1,250 mobile phones that “controlled” 76,000 social media accounts. The indictment also claims that Chen held images demonstrating “Prince Group’s violent methods” against people who had been trafficked to the scam centers. The document includes images showing people bloodied and beaten.

    The seizure of 127,271 bitcoins worth more than $15 billion at the time they were confiscated represents by far the biggest monetary seizure in the US Justice Department’s history—not just of cryptocurrency, but of money of any kind. That US law enforcement record was previously set in 2022 with the seizure of 95,000 bitcoins worth $3.6 billion from a Manhattan couple who later pleaded guilty to stealing them from the Bitfinex exchange, and prior to that with a billion-dollar seizure in 2020 of bitcoins allegedly stolen from the Silk Road dark web drug market by an unnamed hacker. Meanwhile, police in the UK seized 61,000 bitcoins worth $6.7 billion in June from a Chinese woman accused of an investment scam, an even bigger sum than those US records but less than half the sum taken from the Prince Group operation.

    “It’s important to note that this seizure is extraordinary not only for its scale but for what it represents,” Ari Redbord, global head of policy at crypto-tracing firm TRM Labs, adding that the seizure is still a “small fraction” of the money generated by scam centers. “These are not isolated scams; they are factory-scale operations powered by forced labor, supercharged by the speed and scale of crypto, and connected through sophisticated money-laundering infrastructure that spans Cambodia, Myanmar, Laos, China, and beyond,” Redbord says.

    Redbord says the widespread action “strikes at the operational and financial core” of the widespread scam center ecosystem. In recent years, researchers tracking the scam compounds in Southeast Asia have seen them rapidly grow and use their illicitly gained money to invest in increasingly high-tech scam operations. Over the last two years, scam compounds have also been spotted emerging outside of Southeast Asia, with sites emerging in the Middle East, Eastern Europe, Latin America, and West Africa.

    “By targeting the financial architecture—the shell companies, banks, exchanges, and real estate that move and hide these proceeds—the US and UK are dismantling the economic engine that sustains these crimes,” Redbord says. “This is what a 21st-century counter-threat finance campaign looks like—coordinated, data-driven, and global.”

    [ad_2]

    Matt Burgess, Andy Greenberg

    Source link

  • How to spot and stop AI phishing scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial intelligence can do a lot for us. Need to draft an email? AI has you covered. Looking for a better job? AI can help with that, too. It can even boost our health and fitness. Some tools, like AI-powered exoskeletons, can lighten heavy loads and improve performance. 

    But it’s not all sunshine and progress. Hackers are also turning to AI, and they’re using it to make phishing scams smarter and harder to spot. These scams are designed to trick people into handing over personal details or money. One woman recently lost $850,000 after a scammer, posing as Brad Pitt with the help of AI, convinced her to send money. Scary, right? 

    The good news is that you can learn to recognize the warning signs. Before we dive into how to protect yourself, let’s break down what AI phishing scams really are.

    HOW AI BROWSERS OPEN THE DOOR TO NEW SCAMS

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    A single click on a fake link could expose your personal information. (Kurt “CyberGuy” Knutsson)

    What are AI phishing scams?

    AI phishing scams are when hackers use AI to make their scams more convincing. AI helps them create super-realistic emails, messages, voices and even videos. This makes it harder for people to tell what’s real and what’s fake. Old-school phishing emails were easy to spot because of typos and bad grammar. However, thanks to AI tools like ChatGPT, hackers can now create flawless, professional-sounding emails that are much harder to detect. AI-generated phishing emails aren’t the only threat. Hackers are also using AI to pull off scams like:

    • Voice clone scams: They use AI to copy the voice of someone you know, like a friend or family member, to trick you.
    • Deepfake video scams: They create super-realistic videos of someone you trust, like a loved one or a celebrity, to manipulate you.

    Here’s how you can spot these AI-driven scams before they fool you.

    1) Spot common phishing email red flags

    Though hackers can use AI tools to write grammatically perfect email copy, AI phishing emails still have some classical red flags. Here are some telltale signs that it is an AI-driven phishing email:

    • Suspicious sender’s address that doesn’t match the company’s domain.
    • Generic greetings like “Dear Customer” instead of your name.
    • Urgent requests pressuring you to act immediately.
    • Unsolicited attachments and links requiring you to take action

    The biggest red flag is the sender’s email address. There is often a slight change in the spelling of the email address, or it is an entirely different domain name. For example, a hacker might use an email like xyz@PayPall.com or a personal address from Gmail.com, such as the email below, or Outlook.com while pretending to be from PayPal.

    An example of a phishing email

    Hackers are using AI to create scams that look frighteningly real. (Kurt “CyberGuy” Knutsson)

    2) Analyze the language for AI-generated patterns

    It used to be easier to spot phishing emails by noticing silly typos. Thanks to AI, hackers can now craft flawless emails. But you can still sense a phishing email if you analyze the language of the email body copy carefully. The most prominent sign of AI-generated email copy is that it looks highly formal with a dash of failed attempts to be personal. You might not notice it at first, but looking at it closely is likely to give a red flag. The language of such emails is often robotic.

    3) Watch for AI voice clone scam warning signs 

    With AI, it is possible to clone voices. So, there is no surprise that there is a steep rise in voice phishing, which is also known as vishing. Recently, a father lost $4 billion in Bitcoin to vishing. Though AI voice cloning has improved, it’s still flawed. You can spot inconsistencies by verifying the speaker’s identity. Ask specific questions that only the real person would know. This can reveal gaps in the scammer’s script. The voice, also, at times may sound robotic due to imperfections in voice cloning technology. So the next time, whenever you receive a call that creates a sense of urgency, ask as many questions as you can to verify the identity of the person. You may also consider verifying the claims through the second channel. If the person on the other side of the phone says something, you can get it confirmed by the official email to be on the safer side.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    4) Identify visual glitches and oddities in video calls

    Deepfake videos are getting pretty convincing, but they’re not flawless yet. They have visual inconsistencies and oddities, which can make the voice or video appear fake. So watch the video carefully and try to catch the signs of unnatural eye movements, lip-sync issues, weird lighting, shadows and voice inconsistencies. You can also use a deepfake video detection tool to spot a fake video.

    5) Set up and use a shared secret

    A shared secret is something only you and your loved ones know. If someone claiming to be a friend or family member contacts you, ask for the shared secret. If they can’t answer, you’ll know it’s a scam.

    Young professional man works on laptop

    Hackers are turning to artificial intelligence to make phishing scams smarter and harder to spot. (miniseries/Getty Images)

    How to protect yourself from AI phishing scams

    AI phishing scams rely on tricking people into trusting what looks and sounds real. By staying alert and practicing safe habits, you can lower your risk. Here’s how to stay ahead of scammers:

    1) Stay cautious with unsolicited messages

    Never trust unexpected emails, texts or calls that ask for money, personal details or account access. Scammers use urgency to pressure you into acting fast. Slow down and double-check before clicking or responding. If something feels off, it probably is.

    2) Use a data removal service

    Protect your devices with a trusted data removal service to reduce the amount of personal info exposed online. Fewer exposed details make it harder for scammers to target you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    3) Check links before you click and install strong antivirus software

    Hackers often hide malicious links behind convincing text. Hover your cursor over a link to see the actual URL before you click. If the address looks odd, misspelled or unrelated to the company, skip it. Clicking blindly can download malware or expose your login details. Also, install strong antivirus software on all of your devices that blocks phishing links and scans for malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    4) Turn on two-factor authentication

    Even if a scammer steals your password, two-factor authentication (2FA) can keep them locked out. Enable 2FA on your email, banking and social media accounts. Choose app-based codes or a hardware key over text messages for stronger protection.

    5) Limit what you share online

    The more personal details you share, the easier it is for hackers to make AI scams believable. Avoid posting sensitive information like travel plans, birthdays or financial updates on social media. Scammers piece these details together to build convincing attacks.

    6) Verify requests through another channel

    If you get a message asking for money or urgent action, confirm it in another way. Call the person directly using a number you know, or reach out through official company channels. Don’t rely on the same email, text or call that raised suspicion in the first place.

    Kurt’s key takeaways 

    AI is making scams more convincing and harder to detect, but you can stay ahead by recognizing the warning signs. You should watch out for suspicious email addresses, unnatural language, robotic voices and visual glitches in videos, and always verify information through a second channel. You should also establish a shared secret with loved ones to protect yourself from AI-driven voice and video scams.

    Have you experienced any AI-driven phishing scams yet, and what do you think is the best way to spot such a scam? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    [ad_1]

    That suggests anyone could set up similar hardware somewhere else in the world and likely obtain their own collection of sensitive information. After all, the researchers restricted their experiment to only off-the-shelf satellite hardware: a $185 satellite dish, a $140 roof mount with a $195 motor, and a $230 tuner card, totaling less than $800.

    “This was not NSA-level resources. This was DirecTV-user-level resources. The barrier to entry for this sort of attack is extremely low,” says Matt Blaze, a computer scientist and cryptographer at Georgetown University and law professor at Georgetown Law. “By the week after next, we will have hundreds or perhaps thousands of people, many of whom won’t tell us what they’re doing, replicating this work and seeing what they can find up there in the sky.”

    One of the only barriers to replicating their work, the researchers say, would likely be the hundreds of hours they spent on the roof adjusting their satellite. As for the in-depth, highly technical analysis of obscure data protocols they obtained, that may now be easier to replicate, too: The researchers are releasing their own open-source software tool for interpreting satellite data, also titled “Don’t Look Up,” on Github.

    The researchers’ work may, they acknowledge, enable others with less benevolent intentions to pull the same highly sensitive data from space. But they argue it will also push more of the owners of that satellite communications data to encrypt that data, to protect themselves and their customers. “As long as we’re on the side of finding things that are insecure and securing them, we feel very good about it,” says Schulman.

    There’s little doubt, they say, that intelligence agencies with vastly superior satellite receiver hardware have been analyzing the same unencrypted data for years. In fact, they point out that the US National Security Agency warned in a 2022 security advisory about the lack of encryption for satellite communications. At the same time, they assume that the NSA—and every other intelligence agency from Russia to China—has set up satellite dishes around the world to exploit that same lack of protection. (The NSA did not respond to WIRED’s request for comment).

    “If they aren’t already doing this,” jokes UCSD cryptography professor Nadia Heninger, who co-led the study, “then where are my tax dollars going?”

    Heninger compares their study’s revelation—the sheer scale of the unprotected satellite data available for the taking—to some of the revelations of Edward Snowden that showed how the NSA and Britain’s GCHQ were obtaining telecom and internet data on an enormous scale, often by secretly tapping directly into communications infrastructure.

    “The threat model that everybody had in mind was that we need to be encrypting everything, because there are governments that are tapping undersea fiber optic cables or coercing telecom companies into letting them have access to the data,” Heninger says. “And now what we’re seeing is, this same kind of data is just being broadcast to a large fraction of the planet.”

    [ad_2]

    Andy Greenberg, Matt Burgess

    Source link

  • Don’t fall for fake settlement sites that steal your data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Sometimes, data breaches result in more than just free credit monitoring. Recently, Facebook began paying out its $725 million settlement, and AT&T is preparing to distribute $177 million. Those payouts caught scammers’ attention.

    Now, fake settlement claim emails and websites are flooding inboxes. They look convincing, but behind the plain design and official-sounding language is a trap for your Social Security number, banking info and more. So how can you make sure you get your money without losing even more in the process?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    TOP 5 OVERPAYMENT SCAMS TO AVOID

    Why fake settlement sites are so convincing

    Settlement claim websites rarely look polished. Most have generic layouts, long URLs and simple forms asking for a claim ID from your email or postcard. That makes it easy for scammers to mimic them. To test how simple it is, we created a fake settlement site (below) in minutes using AI tools like ChatGPT.

    To steal your data, scammers build fake settlement sites that mimic real sites (Kurt “CyberGuy” Knutsson)

    If we can do it, you can bet criminals are already exploiting the same shortcuts. Facebook has been the target. A fake site once popped up around the Equifax settlement, tricking thousands before it was shut down. The lesson? If the site appears unusual, it doesn’t necessarily mean it’s fake, but it should prompt you to double-check before entering your details or clicking on any links.

    Red flags that expose fake settlement sites

    Spotting a scam often comes down to noticing the little details. Watch for these common warning signs before you hand over your information.

    Requests for too much personal data

    If a site asks for your full Social Security number or the names of your children, stop. For example, the official Equifax settlement only requested the last six digits of SSNs. Genuine claim sites may ask for limited info (like the last four digits of your SSN), but they rarely demand complete Social Security or bank details.

    Promises of payout estimates upfront

    Real administrators calculate payments only after the claim period closes.

    Texts or social media messages

    Settlements are announced by mail or email, not through random DMs or SMS.

    Red flags like odd URLs, urgent countdowns, or fee requests often expose the fraud (Kurt "CyberGuy" Knutsson) 

    Fraud can be found with red flags like odd URLs, urgent countdowns, or fee requests (Kurt “CyberGuy” Knutsson)

    Odd or misspelled URLs

    Even one extra letter in the web address is a sign of a spoof site. Legitimate settlements use official or clearly named administrator domains. Be wary of addresses with unusual add-ons, such as “secure-pay” or “claims-pay.”

    Urgent language or countdowns

    Scammers rely on urgency to pressure you into acting fast. Real settlement sites don’t demand 24-hour turnarounds.

    Processing fee checkboxes

    A sure giveaway of a fake. Real settlement administrators never require money to file or to receive your payout.

    Cheap trust badges

    Scam sites often throw in fake “secure” seals. Look for recognized security seals and make sure they’re clickable and verifiable.

    Generic contact info tied to the suspicious domain

    Official sites list multiple, verifiable contacts. If the email or phone number matches the weird domain, that’s a red flag.

    Grammar or spelling mistakes in the fine print

    Sloppy errors in legal-sounding text are a classic sign you’re looking at a scam.

    Always start at official FTC links or mailed notices to file claims safely (Kurt "CyberGuy" Knutsson) 

    Start with official FTC links or mailed notices to file claims safely (Kurt “CyberGuy” Knutsson)

    How to safely handle settlement claim notices

    Before filing any claim, follow these steps to ensure you’re dealing with a legitimate settlement site and protecting your information.

    1) Start at the FTC

    The Federal Trade Commission keeps updated lists of approved class action settlements at ftc.gov/enforcement/refunds. The legitimate links always point to a .gov website. If your email sends you elsewhere, treat it with caution. 

    2) Cross-check with other resources

    Trusted outlets often cover large settlements and include safe links. ClassAction.org is another resource for checking legitimate URLs.

    3) Skip the links, use the mail

    Your claim notice may include a mailing address. Sending a paper form avoids the digital phishing minefield altogether.

    4) Use strong antivirus software

    Strong antivirus software can block malicious links, warn you about dangerous websites and prevent malware from taking over your device.

    The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS

    5) Try a data removal service

    Data removal services work to scrub your personal information from broker lists, making it more difficult for criminals to target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Never pay to file

    If a site asks for “administrative fees” or a “processing charge,” close it immediately. Real settlement administrators will never ask for money.

    7) Report suspicious sites

    Spot a fake? Protect others by reporting it to:

    • The FTC Complaint Assistant at reportfraud.ftc.gov/
    • The Internet Crime Complaint Center (IC3) at ic3.gov/
    • The Consumer Financial Protection Bureau (CFPB) at consumerfinance.gov/about-us/the-bureau/

    Quick reporting helps authorities shut down scams before more people fall victim.

    Can you tell a real email from a fake?

    Take our quick quiz at Cyberguy.com/ScamCheck to learn how to spot phishing scams, protect your inbox, and stay a step ahead of hackers. 

    Kurt’s key takeaways

    Class action settlements can feel like rare wins for consumers after data breaches. But scammers see them as easy hunting grounds. The best defense is skepticism. Check URLs, avoid clicking direct links and never give away details that don’t match the claim’s purpose. Your payout should help you recover, not put you at greater risk.

    Have you ever received a settlement notice that felt suspicious, and how did you handle it? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Ethernet vs Wi-Fi security comparison reveals surprising results for home users seeking protection

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We spend so much time online that how we connect to the internet has become almost as important as the devices we use. Most people never give it a second thought. They connect their computer to Wi-Fi, type in a password and get on with their day. But if you have ever wondered whether plugging in an Ethernet cable is safer than sticking to wireless, you are asking the right question. The way you connect can have real consequences for your privacy and security. Recently, Kathleen reached out to me with the same doubt.

    “Is it more secure to use the Ethernet connection at home for my computer, or is it safer to use the Wi-Fi from my cable provider?”

    It’s a great question, Kathleen, because both options seem similar on the surface but work very differently under the hood. Those differences can mean the difference between a private, secure connection and one that’s more vulnerable to attackers.

    BEWARE OF FAKE WI-FI NETWORKS THAT STEAL YOUR DATA WHEN TRAVELING

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Ethernet offers direct, wired security without wireless risks. (Kurt “CyberGuy” Knutsson)

    How Ethernet and Wi-Fi differ when it comes to security

    Ethernet and Wi-Fi both get you online, but they do it in completely different ways. Ethernet uses a physical cable that connects your computer directly to the router. Since it is a wired connection, data travels straight through that cable, making it much harder for anyone to intercept it. There is no wireless signal to hijack, no airwaves to eavesdrop on.

    Wi-Fi, on the other hand, is built on convenience. It sends your data through the air to and from your router, which is what makes it so easy to connect from anywhere in your home. But that convenience comes with more risk. Anyone within range of your signal could potentially try to break into the network. If your Wi-Fi is protected by a weak password or uses outdated encryption, a skilled attacker might gain access without ever stepping inside your house. 

    At home, that risk is smaller than in a coffee shop or hotel, but it is not zero. Even a poorly secured smart device on your network can give attackers a way in. Ethernet removes many of those risks simply because it is harder to access a connection that requires physical access to a cable. Check out our steps for setting up a home network like a pro here.

    DON’T USE YOUR HOME WI-FI BEFORE FIXING CERTAIN SECURITY RISKS

    Why one connection might be safer than the other

    It is easy to think Ethernet is automatically safer, but that is not the whole story. Your real security depends on how your entire network is set up. For example, a Wi-Fi network with a strong password, up-to-date router firmware, and WPA3 encryption is going to be far more secure than a poorly configured Ethernet setup connected to an outdated router.

    There is also the question of who else uses your network. If it is just you and a handful of devices, your risk is low. But if you live in a shared space or run smart home gadgets, that changes the equation. Each device connected to Wi-Fi is a potential entry point. Ethernet reduces the number of devices that can connect, which limits the attack surface.

    Ultimately, the connection type is one piece of the puzzle. The bigger factors are how your router is configured, how often you update your software, and how careful you are with what devices you connect.

    Wireless router with four antennas glowing in blue and pink light.

    Wi-Fi brings convenience but also potential exposure to hackers.  (Kurt “CyberGuy” Knutsson)

    6 ways to make your internet safer

    Whether you stick with Wi-Fi or switch to Ethernet, there are several practical steps you can take to protect your devices and data. Each step adds an extra layer of security to your network.

    IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN

    1) Use a strong network password

    Choose a long and unique password for your Wi-Fi. Avoid obvious choices like your name, address, or simple sequences. A strong password makes it far harder for attackers to guess or crack your network. A password manager helps you create and store strong, unique passwords for every account, reducing the chances of a hacker gaining access through weak or repeated credentials.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    2) Enable the latest encryption on your router

    Most modern routers support WPA3, which is much more secure than older standards like WPA2. Check your router’s settings to enable the latest encryption and ensure your network traffic is harder to intercept.

    3) Keep your router firmware updated

    Router manufacturers regularly release updates that patch security vulnerabilities. Log into your router’s admin panel occasionally to check for updates and install them as soon as they are available. This prevents attackers from exploiting known flaws. 

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    4) Review connected devices

    Regularly check which devices are connected to your network and disconnect anything you no longer use. Each connected device is a potential entry point for attackers, so keeping the list limited reduces your network’s exposure.

    5) Install strong antivirus software

    Even on a secure network, malware can sneak in through downloads, phishing attacks, or compromised websites. A strong antivirus program will detect and block malicious activity, protecting your computer before damage occurs.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    Close-up of a Wi-Fi router showing Ethernet ports and connected network cables.

    Ethernet cables connect to a router as part of a home network setup. (Kurt “CyberGuy” Knutsson)

    6) Use a VPN for sensitive tasks

    A virtual private network encrypts your internet traffic, making it unreadable to outsiders. This is especially useful if you ever use Wi-Fi in public or need an extra layer of privacy at home. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN

    Kurt’s key takeaway

    So, which is safer, Ethernet or Wi-Fi? Ethernet wins in raw security because it eliminates many of the risks that come with wireless connections. But in a well-secured home network, the difference is often smaller than most people think. What matters more is how you manage your devices, passwords, software, and online habits.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you trade the flexibility of wireless for the peace of mind of a wired connection? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • How malicious party invites target your inbox

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals are getting sneakier, and one of their latest tricks is using fake invitation emails that look like they’re coming from legitimate services. They promise you an “exclusive invite” or ask you to download and install something before you can see the details. If you’re not careful, that simple click could install malware on your computer.

    Recently, I received one of these deceptive emails. It used a Gmail address, which made it look more authentic at first glance. But the red flag was in the language: “Save the invite and install to join the list.” No legitimate service should ever ask you to install software just to see an invite.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Cybercriminals use fake “invitation” emails to trick users into downloading malware. (Photo by Felix Zahn/Photothek via Getty Images)

    How the fake invitation scam works

    The email looks polished and even mimics well-known event platforms. When you click the link, it sends you to a site that pretends to host the invitation. Instead of showing event details, it pushes you to download an “invitation” file.

    That file is likely malware. Once installed, it can:

    • Steal your personal information
    • Access your email contacts and spread the scam further
    • Hijack your system for criminal use

    The link in my case pointed to a suspicious domain ending in “.ru.com.” At first glance, it mimicked a legitimate brand name, but the extra suffix is a clue it’s not official. Hackers often use look-alike domains to trick you into thinking the site is real.

    Red flags that reveal fake invitation email scams

    Here are some warning signs that should make you pause before clicking:

    • Unusual instructions like “install” or “save” just to view an invite
    • Urgent or exclusive language pushing you to act fast
    • Look-alike URLs that swap in extra characters or use different endings
    • Download prompts when all you expected was an online invite

    If you see any of these, close the email and delete it.

    SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

    Hacker typing code.

    Scammers mimic legitimate services, urging victims to “install” files that steal data. (Photo by Jens Büttner/picture alliance via Getty Images)

    How to protect yourself from fake invitation email malware

    These fake party invite emails are designed to trick you into downloading malware before you even realize what’s happening. Follow these steps to stay safe and keep your inbox secure.

    1) Hover over links before clicking

    Before you click on any “Download Invitation” button, hover your mouse over the link. Real invites use the company’s official domain. Scams like this often use odd endings such as “.ru.com” instead of “.ru” or “.com.” That small clue can help you avoid a big problem.

    2) Use strong antivirus software

    If you click by mistake, strong antivirus protection can detect and block malware before it spreads. Think of it as your last line of defense against a fake invite that sneaks into your inbox.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    3) Use a personal data removal service

    Scammers often spread these emails by stealing contact lists from infected accounts. A personal data removal service reduces the amount of your personal information floating around online, making it harder for cybercriminals to target you in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Keep your system updated

    Hackers love outdated systems because they’re easier to exploit. Keeping your operating system and apps updated patches those holes and makes it much harder for malware to take hold.

    5) Report suspicious emails

    Don’t just delete a suspicious invite, report it to your email provider. This helps improve their filters, protecting you and others from future fake emails.

    6) Enable multi-factor authentication (MFA)

    Even if hackers get your password from a phishing attack, MFA adds an extra lock to your accounts. It makes breaking in nearly impossible without your phone or secondary code.

    7) Back up your files regularly

    If the worst happens and malware damages your computer, backups ensure you don’t lose everything. Use an external hard drive or a trusted cloud service for peace of mind.

    NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS

    A hacker typing into his laptop.

    Hackers send polished emails with malicious links disguised as exclusive invites. (Photo by Thomas Trutschel/Photothek via Getty Images)

    Kurt’s key takeaways

    Fake invitation emails are designed to catch you off guard. Hackers count on you being in a hurry and clicking without thinking. Taking a moment to question an unexpected email could save you from installing dangerous malware.

    Have you ever received a fake invitation email that looked convincing? How did you handle it? Let us know by writing to us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • ‘Happy Gilmore’ Producer Buys Spyware Maker NSO Group

    [ad_1]

    Research published this week indicates that North Korean scammers are trying to trick US companies into hiring them for architectural design work, using fake profiles, résumés, and Social Security numbers to pose as legitimate workers. The hustle fits into longstanding campaigns by the hermit kingdom to steal billions of dollars from organizations around the world using careful planning and coordination to pose as professionals in all different fields.

    Under pressure from the Department of Justice, Apple removed a series of apps from its iOS App Store this month related to monitoring US Immigration and Customs Enforcement activity and archiving content related to ICE’s actions. As more apps are removed, multiple developers told WIRED this week that they aren’t giving up on fighting Apple over the decisions—and many are still distributing their apps on other platforms in the meantime.

    WIRED examined increasing warnings from software supply chain security researchers that the proliferation of AI-generated software in codebases will create an even more extreme version of the code transparency and accountability issues that have come up with widespread integration of open source software components. And Apple announced expansions of its bug bounty program this week, including a maximum $2 million payout for certain exploit chains that could be abused to distribute spyware, and additional bonuses for exploits found in Apple’s Lockdown Mode or in beta versions of new software.

    But wait, there’s more! Each week, we round up the security and privacy news we didn’t report in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    The notorious spyware vendor NSO Group, known for developing the Pegasus malware, has faced financial issues since losing a long legal battle against the secure messaging platform WhatsApp as well as a lawsuit filed by Apple. Now, the company, which has long had Israeli ownership, has been purchased by a group of US-based investors led by movie producer Robert Simonds, who helped finance Happy Gilmore, Billy Madison, The Pink Panther, Hustlers, and Ferrari, among many other films. The deal is reportedly worth “several tens of millions of dollars” and is close to completion. Israel’s Defense Export Control Agency (DECA) within the Ministry of Defense will need to approve the sale. Use of mercenary spyware has increased within some US federal government agencies since the beginning of the Trump administration.

    Hundreds of national security and cybersecurity specialists who work in the US Department of Homeland Security have faced mandatory reassignment in recent weeks to roles related to President Donald Trump’s mass deportation agenda. Bloomberg reports that affected workers are largely senior staffers who are not union eligible. Workers who refuse to move roles will reportedly be dismissed. Members of DHS’s Cybersecurity and Infrastructure Security Agency (CISA) who have faced reassignment reportedly worked on “issuing alerts about threats against US agencies and critical infrastructure.” For example, CISA’s Capacity Building team has faced a number of reassignments, which could hinder access to emergency recommendations and directives for high-value federal government assets. Workers have been moved to agencies including Immigration and Customs Enforcement, Customs and Border Protection, and the Federal Protective Service.

    A recent breach of a third-party customer service provider used by the communication platform Discord included a trove of data from more than 70,000 Discord users that contained identification documents as well as selfies, email addresses, phone numbers, some home location information, and more. The data was collected as part of age verification checks, a mechanism that has long been criticized for centralizing users’ sensitive information. 404 Media reports that the breach was perpetrated by attackers who are attempting to extort Discord. “This is about to get really ugly,” the hackers wrote in a Telegram channel on Wednesday while posting the stolen data.

    US Immigration and Customs Enforcement inked a $825,000 contract in May with TechOps Specialty Vehicles (TOSV), a Maryland-based company that manufactures equipment and vehicles for law enforcement. The company provides products including rogue cellphone towers that are used for phone surveillance and sometimes called “stingrays” or “cell-site simulators.” Public records reviewed by TechCrunch show that the agreement describes how the company “provides Cell Site Simulator (CSS) Vehicles to support the Homeland Security Technical Operations program” and is a modification for “additional CSS Vehicles.” TOSV also began a similar $818,000 contract with ICE in September 2024, prior to the start of the Trump administration. In an email to TechCrunch, TOSV president Jon Brianas declined to share details about the contracts but confirmed that the company does provide cell-site simulators. The company does not manufacture them itself, he said.

    [ad_2]

    Lily Hay Newman

    Source link

  • Hackers leak children’s data in major nursery breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Over the past few years, data breaches targeting schools, healthcare providers, and childcare services have been making headlines, exposing sensitive personal information and leaving families vulnerable. Now, a new breach has come to light that targets a nursery chain. Kido, which operates in the U.S., U.K., China and India, has reportedly had sensitive data stolen from thousands of children. Names, photos, addresses, birthdates, parental details and even safeguarding notes and medical records were allegedly accessed by a hacker group called Radiant.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    The incident highlights how stolen data threatens not just privacy but also long-term child safety. (Kurt “CyberGuy” Knutsson)

    What you need to know about nursery breach

    According to reports, the hacker group Radiant claims to have stolen data related to around 8,000 children. To prove possession, they posted samples, including pictures and profiles of ten children, on a darknet website. They then issued a ransom demand, threatening to release more sensitive information unless Kido paid. In addition to targeting the nursery chain directly, Radiant reportedly called some of the children’s parents, pressuring them to push Kido into paying the ransom.

    FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA

    When questioned about their actions, the group defended their tactics as a form of “penetration testing” for which they supposedly deserved compensation. This defense is misleading, as such testing requires explicit permission from the organization being targeted or participation in an official bug bounty program. Without that consent, these actions are illegal and deeply unethical.

    A hacker types on a red, glowing keyboard.

    Hackers exploited children’s data in the Kido breach, exposing families to serious risks. (Kurt “CyberGuy” Knutsson)

    Why is this attack so disturbing?

    The Kido breach is alarming for multiple reasons. First, it involves children’s data, which is particularly sensitive and legally protected in most countries. Second, the attackers combined traditional data theft with intimidation tactics, reaching out to parents directly. History suggests that once criminals gain access to such information, the attacks can escalate.

    Breaches like this highlight how personal and digital security are intertwined. The potential misuse of data extends beyond simple identity theft. It can impact children’s safety, family privacy and long-term well-being. With attackers leveraging both the stolen data and psychological pressure on parents, the threat is particularly potent and long-lasting.

    A hacker types in a code terminal on a MacBook.

    Parents reported being directly contacted by attackers, showing how intimidation adds to the harm. (Kurt “CyberGuy” Knutsson)

    7 steps parents can take to protect their child’s data

    Even though the investigation into the Kido breach is ongoing, parents and schools can take immediate action to protect children’s data and reduce the risk of further exploitation. Here’s a detailed guide:

    1) Monitor your child’s online accounts regularly

    Log in to email, school portals and cloud storage accounts linked to your child. Look for unusual activity such as unrecognized logins, changes to passwords or new connected devices. Set up notifications for account activity whenever possible so you are alerted instantly if something suspicious happens.

    2) Enable two-factor authentication (2FA) on all accounts

    Adding 2FA creates an extra layer of security. Even if a hacker has a password, they won’t be able to access the account without the second verification step. Most email providers, school portals and messaging platforms support this, and it’s a simple step that dramatically improves security.

    3) Consider a personal data removal service

    Data broker sites often collect names, addresses and other personal details that hackers can use. Services that remove your child’s information from these databases can make it harder for attackers to find and exploit sensitive data.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan

    THINK YOU’RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS

    4) Use identity theft protection services

    These services can continuously scan for your child’s personal information online and alert you if their data appears on suspicious websites or the dark web. This early warning allows you to take action before criminals attempt to exploit it.

    Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com/IdentityTheft

    5) Install antivirus software on all devices

    A strong antivirus program protects devices from malware, phishing scams, and suspicious scripts. It is particularly important on devices that children use to access school portals or personal accounts. This ensures that if a hacker tries to use malware to get deeper access, it is blocked.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

    6) Use a secure mail provider for sensitive communications

    For communications with schools, healthcare providers or any service handling sensitive information about children, consider using an email service that offers strong encryption and built-in protection against spoofing. This makes it harder for attackers to impersonate a school or parent.

    For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail

    7) Educate your children about online safety

    Teach children not to share personal information online, including photos, addresses or school details. Encourage them to report anything suspicious and explain why it’s important to keep login information private.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Data breaches targeting children are particularly concerning because they can have long-lasting consequences. The Kido incident is a stark reminder of the importance of proactive digital security measures for families. While organizations bear responsibility for protecting sensitive data, parents can take significant steps to monitor, secure and respond to potential threats.

    Have you ever reviewed what personal information about your child is online? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

    [ad_1]

    Since launching its bug bounty program nearly a decade ago, Apple has always touted notable maximum payouts—$200,000 in 2016 and $1 million in 2019. Now the company is upping the stakes again. At the Hexacon offensive security conference in Paris on Friday, Apple vice president of security engineering and architecture Ivan Krstić announced a new maximum payout of $2 million for a chain of software exploits that could be abused for spyware.

    The move reflects how valuable exploitable vulnerabilities can be within Apple’s highly protected mobile environment—and the lengths the company will go to to keep such discoveries from falling into the wrong hands. In addition to individual payouts, the company’s bug bounty also includes a bonus structure, adding additional awards for exploits that can bypass its extra secure Lockdown Mode as well as those discovered while Apple software is still in its beta testing phase. Taken together, the maximum award for what would otherwise be a potentially catastrophic exploit chain will now be $5 million. The changes take effect next month.

    “We are lining up to pay many millions of dollars here, and there’s a reason,” Krstić tells WIRED. “We want to make sure that for the hardest categories, the hardest problems, the things that most closely mirror the kinds of attacks that we see with mercenary spyware—that the researchers who have those skills and abilities and put in that effort and time can get a tremendous reward.”

    Apple says that there are more than 2.35 billion of its devices active around the world. The company’s bug bounty was originally an invite-only program for prominent researchers, but since opening to the public in 2020, Apple says that it has awarded more than $35 million to more than 800 security researchers. Top-dollar payouts are very rare, but Krstić says that the company has made multiple $500,000 payouts in recent years.

    In addition to higher potential rewards, Apple is also expanding the bug bounty’s categories to include certain types of one-click “WebKit” browser infrastructure exploits as well as wireless proximity exploits carried out with any type of radio. And there is even a new offering known as “Target Flags” that puts the concept of capture the flag hacking competitions into real-world testing of Apple’s software to help researchers demonstrate the capabilities of their exploits quickly and definitively.

    Apple’s bug bounty is just one of many long-term investments aimed at reducing the prevalence of dangerous vulnerabilities or blocking their exploitation. For example, after more than five years of work, the company announced a security protection last month in the new iPhone 17 lineup that aims to nullify the most frequently exploited class of iOS bugs. Known as Memory Integrity Enforcement, the feature is a big swing aimed at protecting a small minority of the most vulnerable and highly targeted groups around the world—including activists, journalists, and politicians—while also adding defense for all users of new devices. To that end, the company announced on Friday that it will donate a thousand iPhone 17s to rights groups that work with people at risk of facing targeted digital attacks.

    “You can say, well, that seems like a very large effort to protect only that very small number of users that are being targeted by mercenary spyware, but there is just this incontrovertible track record described by journalists, tech companies, and civil society organizations that these technologies are constantly being abused,” Krstić says. “And we feel a great moral obligation to defend those users. Despite the fact that the vast majority of our users will never be targeted by anything like this, this work that we did will end up increasing protection for everyone.”

    [ad_2]

    Lily Hay Newman

    Source link

  • North Korean Scammers Are Doing Architectural Design Now

    [ad_1]

    “The plans are being used and being built,” says Michael “Barni” Barnhart, a leading authority in North Korean hacking and cyber threats, who works for insider threat security firm DTEX. Along with other DPRK researchers, who call themselves a “Misfit” alliance, Barnhart has seen this cluster of workers conducting architectural work and says similar other efforts have been detected. “They will do the CAD renderings, they’ll do the drawings,” he says. “It’s not like a hypothetical—those physical things do exist out there.”

    Barnhart—who previously found North Korean animators appearing to work on Amazon and Max shows—says that he has also seen potential front companies set up to help run the operations and provide a veneer of legitimacy. The findings raise questions about the quality of the structural work and concerns about safety, if structures are created in the physical world. “In some of our investigations, these plans and these products that they’re making for these remodels and renderings, they’re not getting good reviews,” Barnhart says. “We do have indications that also they’re being hired to do critical infrastructure.”

    One 24-minute long screen recording seen by WIRED shows how the freelance operation could work. In the video, a person signs up to a freelance work website and sets up a new profile where they write that they are a “licensed structural engineer/architect in the USA.” They pick a profile image from a folder of potentially downloaded files, translate text between English and Korean, and access a Social Security number generator website during the sign-up process.

    When their account is created, the video shows them start to message online requests for work, with one message saying: “I can provide you [sic] permit drawing plan set for your residential home design within a few days.”

    Other screen recordings show the workers having conversations with potential clients, and in at least one instance there is a recording of an online call discussing possible work. The Kela researcher, who asked not be named for security reasons, says it appeared some prospective customers returned to the scammers after likely having work completed. The researchers say some kinds of work appeared to be priced from a few hundred dollars up to around $1,000 per job.

    “This is an opportunistic nation,” DTEX’s Barnhart says. While many companies have started to figure out that North Korea’s IT workers are often applying for remote tech jobs, using false identities, deepfakes on video calls, and local workers to run their operations, they are consistently changing their approaches. Barnhart says it appears that architectural work has been successful for the alleged DPRK workers and that evidence shows the IT workers program can be more subtle than trying to get hired at companies.

    “They’re moving to places where we’re not looking,” Barnhart says. “They’re also doing things like call centers. They’re doing HR and payroll and accounting. Things that are just remote roles and not necessarily remote hires.”

    [ad_2]

    Matt Burgess

    Source link

  • Stop Fumbling With Your Keys and Get These Smart Locks Instead

    [ad_1]

    Ultraloq U-Bolt Pro for $170: WIRED reviewer Julian Chokkattu also tested the U-Bolt Pro from Ultraloq, which uses the same app that the Fingerprint models do. He says it took a few attempts to connect to Wi-Fi, but once connected it worked well with no Wi-Fi issues during the year he tested it. It has built-in Wi-Fi, uses four AA batteries that last around two months (less in super colder weather), and has a hidden mechanical keyhole as a backup in case the battery dies when you’re not home, and you get two spare keys. There’s a charging port underneath so you can give it some juice during emergencies if the lock is dead and you don’t have the key, but we wish it was USB-C instead of Micro USB. It’s a good lock, but he prefers the Fingerprint models since it has a nicer build quality and it has eight batteries, so the lock lasts twice as long.

    Photograph: Nena Farrell

    Yale Assure Lock 2 Touch for $300: I’ve been testing this lock for a few weeks in tandem with ADT’s security system and Google Home. Unlike the other locks in this guide, I didn’t install it—an ADT tech did, and installation can be included in an ADT security package like the one I’ve been testing. For the lock itself, it’s worked well. It’s a full dead-bolt replacement, and came with a single key, and has both a keypad and fingerprint reader for entry options. The fingerprint reader is speedy and efficient, and my husband says the keypad has been easy to use (you activate the keypad by touching the Yale button, but if your finger is registered to the app, that’s also the fingerprint reader button). Instead of using the Yale app, I primarily control this app with the ADT+ app, but there are versions of this lock that don’t use or require ADT’s service. I do wish I could set it to lock after every 10 minutes, rather than three, but that’s the longest option the ADT+ app gives me to set it. I can also partially control it in the Google Home app, but only to lock and unlock it, not to dive into detailed settings like passcodes and auto-lock times.

    Yale Assure Touchscreen Lever Lock for $240: I’ve been testing this no-dead-bolt lever door handle with its sleek-looking keypad for four months on the door to my house from inside my garage. Unlike Yale’s Approach Lock, it won’t sense you coming, but it awakens with even a light touch to the keypad. It’s easy to lock and unlock and view the activity log on the Yale Access app, or you can use a pin code to unlock. You can also create different codes for different people to know exactly who’s been coming and going and when. It works with Google Home, Apple Home, and Alexa, and has also got two physical keys for backup in case of battery failure. Setup wasn’t exactly a breeze, requiring the Bilt app to install and then the Yale app to configure, and online reviews are quite voluminous in their complaints of both battery life and the handle becoming loose over time. Neither of these issues has arisen during our test period; however, we will update this review with further observations as time goes on. —Kat Merck

    Avoid These Smart Locks

    We haven’t loved every smart lock we’ve tried. These are the ones to skip.

    Image may contain Blade Razor and Weapon

    Defiant Smart Deadbolt

    Photograph: Julian Chokkattu

    Defiant Smart Deadbolt Powered by Hubspace for $100: The shoddy build quality is a huge turn-off on this smart lock from Defiant. The buttons are mushy, it’s very loud, and what is the point of Wi-Fi connectivity if it never connects to Wi-Fi? I finally got it paired with the Hubspace app, but the lock never stayed connected to my Wi-Fi, so I had none of the benefits. —Julian Chokkattu

    Eufy FamiLock S3 Max for $400: This lock is cool because it includes a camera, letting the device double as a digital peephole (convenient for smaller family members!) and has a super interesting biometric option that uses the veins in your palm for authentication. Unfortunately, once installed, the lock didn’t work on my door, even though it was the correct size and placement.

    [ad_2]

    Nena Farrell

    Source link

  • How public probate records fuel inheritance scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Grieving the loss of a loved one is hard enough, and families are lucky if they’re able to prepare in advance for the worst. What most families aren’t prepared for, though, are the predatory calls and letters that begin just weeks after filing probate paperwork – the records necessary to officially manage the estate and assets of the decedent. 

    Digital scams take advantage of families during this time. They rely on probate records in particular, as they contain sensitive information and are a part of the public record. Fraudsters pose as attorneys, debt collectors and estate service providers, each demanding the immediate payment of made-up fees. This is also known as the “inheritance trap.” It’s a growing kind of cybercrime where scammers exploit public probate records to target grieving families when they’re at their most vulnerable.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The probate system’s problem with privacy

    Probate is a normal, legal process of settling a deceased person’s estate, and in most state jurisdictions, these filings become part of the public record. While transparency serves legitimate purposes, it creates an opportunity for scammers. Probate documents typically include:

    • Names and addresses of heirs and beneficiaries
    • Detailed asset inventories and estate values
    • Property descriptions and locations
    • Names of executors and personal representatives
    • Court dates and filing information.

    Digital inheritance scams take advantage of grieving families by relying on probate records. (uchar/Getty Images)

    These records are accessible to anyone, often through online databases that make bulk scraping simple. Criminals systematically monitor probate filings, building target lists of families who are emotionally vulnerable and potentially receiving significant inheritances.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    How to spot a probate scam

    There are four common types of inheritance traps that use probate records as sources for their fraudulent claims:

    The fake fee scam: Just like the DMV notice scam that claims the recipient has unpaid toll fees, scammers use probate data to pose as attorneys or court officials, claiming heirs owe fees to release inheritance funds. They create urgency with threats of legal action or frozen assets, demanding payment via wire transfer or gift cards.

    The fake debt collector: Fraudsters send texts or make AI-generated voice calls, claiming that the deceased person owed debts that have to be settled immediately. They often have enough information from probate records to sound legitimate, pressuring families to pay non-existent debts.

    The fake estate service: Scams that offer seemingly helpful services like “property appraisals,” “finding hidden assets,” or “estate clean-out services” can look like they offer reasonable deals. Some take payment and disappear—others perform unnecessary services that families never requested.

    Elderly man using his phone.

    Cyberguy lays out ways to avoid inheritance scams. (Cyberguy.com)

    The “advanced fee” gift: Anyone who promises to expedite probate proceedings or secure larger inheritances for an upfront fee is probably in it to win it (for themselves). Some cases even involve disgruntled family members acting out of greed. These are not your run-of-the-mill remote scammers from a foreign country; these can be local “facilitators” who have no actual authority and simply pocket the money. If someone claims you have an inheritance coming, but they need “a fee to unlock it” or they promise to “handle your probate case” for a small upfront fee, you guessed it — nothing ever comes from it.

    Why probate scams work

    Grief is a beacon for fraudsters. With grief comes diminished critical thinking from even the hardiest of privacy diehards. Scammers deliberately strike during this window when defenses are low. A scammer who can reference your personal information, family information or property details doesn’t sound like a criminal, they sound like a legitimate professional. Scams often use the weapon of urgency — you have to purportedly act fast to avoid asset seizures, legal penalties or missed deadlines. When something demands immediate action, victims feel compelled to respond before verifying claims or consulting attorneys, which is exactly what fraudsters count on.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    How to protect yourself against the inheritance trap

    The good news is that with awareness and a few smart steps, you can lower your risk of falling victim to inheritance scams.

    1) Verify, verify, verify

    Never send money or give information to an unsolicited contact about an estate. If someone claims you owe fees or have obligations, independently verify their identity or company. Contact the probate court directly using publicly listed numbers, not information provided by the caller. Ask your estate attorney about any claims before making payments.

    2) Limit information sharing

    In most jurisdictions, you can’t prevent a probate filing from going public. But you can minimize additional data exposure by not sharing anything on social media and limiting contact to only key parties that you trust with financial information.

    3) Use personal data removal services

    Data removal services specialize in removing personal information from data broker sites that scammers use to supplement probate data. Personal information combined with probate records create the perfect setup for inheritance traps—scammers can make super-convincing, alarmist content that can bypass your intuition about scams, especially during times of grief.

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    Illustration of a cybercriminal. (Kurt “CyberGuy” Knutsson)

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    5 STEPS TO PROTECT YOUR FINANCES FROM FAMILY SCAMS

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    4) Let them leave a voicemail

    Legitimate attorneys and court officials will leave detailed messages and provide callback numbers you can verify independently by searching online. Unknown callers without legit numbers are likely scams. 

    5) Ask about your bank’s fraud detection

    Set up appropriate fraud alerts and prevention methods with the bank or estate holder, especially if the estate holds a significant value that would be a golden opportunity for thieves. 

    Elderly man holding credit card and phone

    Scammers use convincing calls and messages to pressure people into paying fake debts, authorities warn. (Cyberguy.com)

    6) Report inheritance scams immediately

    You can report potential probate scams to your probate court. They can issue a special order to protect assets, require executors to adopt formal procedures or even remove an executor for fraudulent behavior. You can also go to ReportFraud.ftc.gov to file a complaint. 

    7) Share what you know

    Ensure elderly relatives or those less familiar with scam tactics understand these risks. Scammers often target multiple heirs, seeking the most vulnerable respondent. 

    Kurt’s key takeaway

    The probate system creates a privacy trade-off. You can’t prevent much of this information from entering the public record, but you can control how you respond, and how much personal data is out there. Any probate topics should come through official court channels, and never an unsolicited phone call, email or text message. When in doubt, verify with your probate court, and always consult your estate attorney. With a little vigilance and a bit of data cleanup, you can ensure that the probate process doesn’t put you in harm’s way, during the time when you’re at your most vulnerable.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Have you or someone you know ever been targeted during a vulnerable time? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Jeep and Chrysler parent Stellantis confirms data breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Automotive giant Stellantis has just revealed that it suffered a data breach, exposing customer contact details, after attackers infiltrated a third-party platform used for North American customer services. The announcement comes at a time when large-scale attacks on cloud CRM systems have already shaken tech and retail sectors alike, with Salesforce clients such as Google, Allianz and Dior reporting similar intrusions. These earlier incidents exposed names, emails, and phone numbers, which were sufficient for attackers to launch phishing campaigns or extortion attempts.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    What you need to know about the Stellantis breach

    Stellantis was formed in 2021 through the merger of the PSA Group and Fiat Chrysler Automobiles. Today, it ranks among the world’s largest automakers by revenue and is fifth in volume globally. The company houses 14 well-known brands, including Jeep and Dodge, as well as Peugeot, Maserati and Vauxhall, and operates manufacturing infrastructure across more than 130 countries. That global scale naturally makes it a tempting target for cyber adversaries.

    Stellantis confirmed hackers stole customer contact details in a recent breach. (Kurt “CyberGuy” Knutsson)

    In its public statement, Stellantis clarified that only contact information was taken. Since the compromised third-party platform does not host financial or deeply sensitive personal data, Stellantis asserts that social security numbers, payment details and health records were out of reach of the attackers. In response, the company activated its incident response protocols, launched a full investigation, contained the breach, notified authorities and began alerting affected customers. It also issued warnings about phishing and urged customers not to click suspicious links.

    Stellantis has not revealed how many customers the breach affected. The company also has not specified which contact fields, such as email, phone, or address, attackers accessed.

    The alleged culprit, ShinyHunters, and Salesforce breaches

    While Stellantis has not explicitly named the hacker group behind the breach, multiple sources tie this incident to the ShinyHunters extortion campaign, which has spearheaded a wave of data thefts targeting Salesforce this year.

    ShinyHunters claims to have stolen over 18 million records from Stellantis’ Salesforce instance, which includes names and contact details, according to Bleeping Computer. These attacks form part of a broader campaign aimed at Salesforce customers. In recent months, ShinyHunters has often worked in concert with groups like Scattered Spider and targeted companies including Google, Cisco, Adidas, Allianz Life, Qantas, and brands under LVMH such as Dior and Tiffany & Co.

    OVER 2B USERS FACE PHISHING RISKS AFTER GOOGLE DATA LEAK

    Stellantis brands

    The attack is linked to a wider wave of Salesforce data thefts this year. (Kurt “CyberGuy” Knutsson)

    Their reported method is fairly ingenious. Attackers exploit OAuth tokens tied to integrations like Salesloft’s Drift AI chat tool to pivot into Salesforce environments. Once inside, they can harvest valuable metadata, credentials, AWS keys, Snowflake tokens and more.

    In fact, the FBI recently issued a Flash alert that surfaced numerous indicators of compromise linked to these Salesforce environment attacks and warned organizations to harden defenses. The cumulative toll is staggering. ShinyHunters asserts it has stolen over 1.5 billion Salesforce records across some 760 companies.

    7 ways to protect yourself from breaches like Stellantis

    Even if only contact details were exposed, that’s enough for attackers to target you. Here’s how to stay protected.

    1) Clean up exposed personal data from the web

    Even basic contact details can be scraped from breaches and sold on data broker platforms, where they are used for spam, scams and targeted attacks. A data removal service can help track down and request the deletion of your information from these databases, reducing your long-term exposure.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    Jeep Wrangler Rubicon on sale at dealership

    Stolen emails and phone numbers could fuel phishing campaigns. (REUTERS /Rebecca Cook)

    2) Stay alert for phishing attempts and use antivirus software

    The most immediate risk after a breach like this is targeted phishing. Attackers now have legitimate contact details, so their emails and texts can look convincingly real. Be skeptical of any message claiming to be from Stellantis, your car brand or a related service, especially if it urges you to click a link, download an attachment or share personal details.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    3) Use a password manager to secure your accounts

    If attackers get your contact information, they may try the same password on other sites. This is called credential stuffing. A password manager can create strong, unique passwords for every account. That way, one breach will not put your other accounts at risk. It also helps you quickly update credentials in case you suspect a compromise.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    4) Enable two-factor authentication (2FA) wherever possible

    2FA adds an extra step to your logins by requiring a temporary code or approval in addition to your password. Even if attackers manage to steal your password, they will need that second factor to gain access. This significantly reduces the chances of account takeover attempts succeeding.

    5) Invest in identity theft protection

    Attackers often combine exposed contact information with other data to build complete identity profiles. Identity theft protection services monitor for suspicious activity, such as unauthorized credit applications or changes to official records, and alert you early so you can act before serious damage occurs. Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.

    6) Regularly review account activity

    After a breach, it is worth auditing your accounts, not just with Stellantis but also with related services such as financing portals, insurance accounts or loyalty programs. Look for unusual sign-ins, unfamiliar devices, or changes to your personal details. Most services offer tools to review login history and security events, making checking these a routine habit.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Even giants in manufacturing are vulnerable when cloud platforms and third-party systems are part of their customer workflow. The same patterns seen in attacks on Google, LVMH, and others have now reached the auto industry in a serious way. As Stellantis confronts the fallout, the broader lesson is clear. Organizations must treat the surfaces exposed by their service providers and SaaS integrations with as much vigilance as their own core systems.

    Do you trust companies to secure your data, or do you feel they’re not doing enough? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • How a single MacBook compromise spread across a user’s Apple devices

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We trust Macs to be reliable, secure, and mostly resistant to viruses. Apple’s software reputation has long been built around the idea that macOS is harder to compromise than Windows. And while there is some truth to that, it does not mean that Macs are immune. Modern malware is smarter, more targeted, and often designed to slip past built-in defenses quietly. Recently, I heard from Jeffrey from Phoenix, AZ, who’s been dealing with this exact situation.

    “I used a MacBook at work and noticed it was performing oddly. I didn’t use an Apple ID on that machine per company protocol. But I had personal devices that I could work from that are now infected. The notepad, maps, and home, among others, seem to be getting hung up. I’ve tried to advise Apple but have had little success. It’s completely taken over my devices, and I don’t know how to resolve this.”

    If your Mac has started acting strange, you are not alone, Jeffrey. Malware infections are more common than many Mac users realize, and spotting them early can make all the difference. Let us break down how to tell if your system is compromised, what protections Apple already provides, and the steps you should take to keep your data safe. If you’re a Windows user facing similar issues, check out our guide: What to do if you think your PC has a virus for step-by-step help.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    Mac malware often hides in the background, making it hard to spot at first. (Kurt “CyberGuy” Knutsson)

    Signs your Mac might be infected

    Spotting malware on macOS is not always straightforward. Many threats are designed to stay hidden, running quietly in the background while collecting data or opening a backdoor for attackers. Still, there are a few red flags that usually signal something is wrong.

    One of the first signs is slower performance or frequent overheating. If your Mac suddenly takes a long time to boot, runs hot during light tasks, or lags when performing simple actions, it might be doing more behind the scenes than you realize. Apps that crash or freeze more often than usual are another warning sign. Occasional app failures are normal, but if built-in tools like Safari, Notes, or Mail begin acting unstable, it may point to malicious interference.

    It is also worth paying attention to what is happening under the hood. Checking Activity Monitor for unknown processes or unusually high CPU or memory usage can reveal malware that tries to hide itself with random or unfamiliar names. Redirected web traffic is another classic symptom. If your browser takes you to strange websites, shows pop-ups, or installs new extensions you never approved, adware or spyware might already be present.

    Finally, unexplained changes to your security settings should always raise suspicion. If you notice your firewall turned off, privacy permissions modified, or login items appearing without your knowledge, something could have gained unauthorized control of your system.

    SHAMOS MALWARE TRICKS MAC USERS WITH FAKE FIXES

    Apple logo glows on the front of an Apple Store building at night.

    Strange app behavior, pop-ups, or overheating may signal something’s wrong (Kurt “CyberGuy” Knutsson)

    How macOS protects you by default

    Apple has built several layers of defense into macOS, many of which run silently in the background to keep your system secure. Knowing how they work can help you understand what protections are already in place and where you might still need to add more safeguards.

    Gatekeeper is one of the most important built-in security tools. It checks every app before it runs to make sure it comes from a verified developer, warning or blocking you if the app is not trusted. Another layer of defense is XProtect, Apple’s built-in malware scanner. It updates automatically and can stop many known threats from running, although it is not as thorough as specialized antivirus software.

    System Integrity Protection, or SIP, is another important safeguard. It locks down critical system files and processes so that malware cannot tamper with them even if it gains access. macOS also uses sandboxing and strict permission controls to contain threats. Apps run in isolated environments and must explicitly request permission to access sensitive data such as your camera, files, or location.

    Together, these features make it significantly harder for malicious software to infect your Mac or cause serious damage. However, they are not perfect. Attackers are constantly developing new techniques to bypass these protections, and many threats rely on human error rather than technical exploits. That is why taking additional precautions is still essential, even on a Mac.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Person typing on a laptop at a desk with computer monitors in the background.

    Even Apple’s built-in protections can miss new or advanced threats (Kurt “CyberGuy” Knutsson)

    What to do if your Mac is already infected

    If you find yourself dealing with a Mac that’s already compromised these steps can help you get back in control:

    1) Disconnect from the internet immediately

    Unplug Ethernet or turn off Wi-Fi and Bluetooth. This prevents malware from sending more data out or pulling in additional malicious code.

    2) Back up your important files safely

    Use an external drive or cloud service you trust. Avoid copying entire system folders-just grab personal documents, photos, and files you can’t replace. You don’t want to back up the malware along with them.

    3) Boot into Safe Mode

    Restart your Mac and hold the Shift key. Safe Mode prevents some malware from launching and makes it easier to run cleanup tools.

    4) Run a trusted malware removal tool

    While macOS includes XProtect, you may need something more powerful. A strong antivirus program can detect and remove infections. Run a full system scan to catch hidden threats.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    5) Check your login items and Activity Monitor

    Review what apps are set to launch at startup and remove anything you don’t recognize. If you spot unfamiliar processes hogging resources, don’t just guess. Use our guides at Cyberguy.com/LockUpYourTech to compare what’s safe and learn how to shut down anything suspicious before it causes more trouble.

    6) Consider a clean reinstall of macOS

    If malware persists, wiping your system may be the only option. Erase your Mac’s drive and reinstall macOS from scratch. Restore only the clean files you backed up earlier.

    7) Secure your other devices

    If your iPhone, iPad, or other personal devices are showing strange behavior, run security scans, update their software, and reset key passwords. Malware can sometimes spread through shared Wi-Fi networks, cloud accounts, or files.

    8) Reset key passwords and enable two-factor authentication

    Even after cleanup, assume some of your data may have been exposed. Update your Apple ID, email, banking, and work accounts with strong, unique passwords. Turn on 2FA wherever possible.

    9) Get professional help if needed

    If you’re overwhelmed, you can bring your Mac to an Apple Store for in-person help at the Genius Bar, or schedule a free appointment with Apple Support.

    Person working on a MacBook at a white desk with a smartphone and pen nearby.

    Simple steps like scanning, updating, and using strong passwords can keep your data safe (Kurt “CyberGuy” Knutsson)

    7 ways to keep your Mac from getting infected

    Some cyber threats do not reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they have stolen. These steps can help you strengthen your defenses and reduce the chances of future infections.

    1) Install strong antivirus software

    macOS’s built-in protections are useful but basic. A strong antivirus adds an extra layer by detecting threats in real time, blocking malicious downloads, and even identifying new types of malware before they spread. A strong antivirus also scans email attachments and browser activity, areas where many Mac users are most vulnerable.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Consider a personal data removal service

    Many cyberattacks begin with information freely available online. A data removal service scrubs your personal details from broker sites, reducing the chances of targeted attacks or identity theft. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    3) Use a password manager

    Many malware attacks rely on stolen credentials rather than technical exploits. A password manager stores unique, complex passwords for every account and can automatically flag weak or reused ones. It also helps protect you from phishing attempts because it will only autofill passwords on legitimate websites.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4) Enable two-factor authentication

    Even if someone steals your password, two-factor authentication (2FA) makes it much harder for them to access your accounts. It adds an extra step to the login process, requiring a code from your phone or a security key.

    5) Keep macOS and apps updated

    Outdated software is a common entry point for malware. Updates often patch vulnerabilities that attackers could exploit, so turning on automatic updates for both macOS and third-party apps is an easy but effective defense.

    6) Review login items and background processes

    Malware often tries to run at startup so it can operate undetected. Regularly check System Settings to make sure only trusted apps are launching automatically, and use Activity Monitor to investigate anything suspicious.

    7) Use identity theft protection

    If your personal data has already been exposed, an identity theft protection service can monitor for suspicious activity, alert you to breaches, and help you recover quickly if something does go wrong. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Macs have a reputation for being safer than other computers, but that does not mean they are untouchable. Malware has evolved to target macOS more aggressively than ever, and many attacks now rely on tricking users rather than breaking through security software. If your device is behaving strangely, taking action early is the best way to prevent deeper damage.

    How important is cybersecurity when choosing the devices you use every day? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Vibe Coding Is the New Open Source—in the Worst Way Possible

    [ad_1]

    Just like you probably don’t grow and grind wheat to make flour for your bread, most software developers don’t write every line of code in a new project from scratch. Doing so would be extremely slow and could create more security issues than it solves. So developers draw on existing libraries—often open source projects—to get various basic software components in place.

    While this approach is efficient, it can create exposure and lack of visibility into software. Increasingly, however, the rise of vibe coding is being used in a similar way, allowing developers to quickly spin up code that they can simply adapt rather than writing from scratch. Security researchers warn, though, that this new genre of plug-and-play code is making software-supply-chain security even more complicated—and dangerous.

    “We’re hitting the point right now where AI is about to lose its grace period on security,” says Alex Zenla, chief technology officer of the cloud security firm Edera. “And AI is its own worst enemy in terms of generating code that’s insecure. If AI is being trained in part on old, vulnerable, or low-quality software that’s available out there, then all the vulnerabilities that have existed can reoccur and be introduced again, not to mention new issues.”

    In addition to sucking up potentially insecure training data, the reality of vibe coding is that it produces a rough draft of code that may not fully take into account all of the specific context and considerations around a given product or service. In other words, even if a company trains a local model on a project’s source code and a natural language description of goals, the production process is still relying on human reviewers’ ability to spot any and every possible flaw or incongruity in code originally generated by AI.

    “Engineering groups need to think about the development lifecycle in the era of vibe coding,” says Eran Kinsbruner, a researcher at the application security firm Checkmarx. “If you ask the exact same LLM model to write for your specific source code, every single time it will have a slightly different output. One developer within the team will generate one output and the other developer is going to get a different output. So that introduces an additional complication beyond open source.”

    In a Checkmarx survey of chief information security officers, application security managers, and heads of development, a third of respondents said that more than 60 percent of their organization’s code was generated by AI in 2024. But only 18 percent of respondents said that their organization has a list of approved tools for vibe coding. Checkmarx polled thousands of professionals and published the findings in August—emphasizing, too, that AI development is making it harder to trace “ownership” of code.

    [ad_2]

    Lily Hay Newman

    Source link

  • A breach every month raises doubts about South Korea’s digital defenses | TechCrunch

    [ad_1]

    South Korea is world-famous for its blazing-fast internet, near-universal broadband coverage, and as a leader in digital innovation, hosting global tech brands like Hyundai, LG, and Samsung. But this very success has made the country a prime target for hackers and exposed how fragile its cybersecurity defenses remain.  

    The country is reeling from a string of high-profile hacks, affecting credit card companies, telecoms, tech startups, and government agencies, impacting vast swathes of the South Korean population. In each case, ministries and regulators appeared to scramble in parallel, sometimes deferring to one another rather than moving in unison. 

    Critics argue that South Korea’s cyber defenses are hindered by a fragmented system of government ministries and agencies, often resulting in slow and uncoordinated responses, per local media reports

    With no clear government agency acting as “first responder” following a cyberattack, the country’s cyber defenses are struggling to keep pace with its digital ambitions. 

    “The government’s approach to cybersecurity remains largely reactive, treating it as a crisis management issue rather than as critical national infrastructure,” Brian Pak, the chief executive of Seoul-based cybersecurity firm Theori, told TechCrunch.  

    Pak, who also serves as an advisor to SK Telecom’s parent company’s special committee on cybersecurity innovations, told TechCrunch that because government agencies tasked with cybersecurity work in silos, developing digital defenses and training skilled workers often get overlooked. 

    The country is also facing a severe shortage of skilled cybersecurity experts.  

    “[That’s] mainly because the current approach has held back workforce development. This lack of talent creates a vicious cycle. Without enough expertise, it’s impossible to build and maintain the proactive defenses needed to stay ahead of threats,” Pak continued.  

    Political deadlock has fostered a habit of seeking quick, obvious “quick fixes” after each crisis, said Pak, all the while the more challenging, long-term work of building digital resilience continues to be sidelined. 

    This year alone, there has been a major cybersecurity incident in South Korea almost every month, further mounting concerns over the resilience of South Korea’s digital infrastructure.  

    January 2025 

    • GS Retail, the operator of convenience stores and grocery markets across South Korea, confirmed a data breach that exposed the personal details of about 90,000 customers after its website was attacked between December 27 and January 4. The stolen information included names, birth dates, contact details, addresses, and email addresses. 

    February 2025 

    April and May 2025 

    • South Korea’s part-time job platform Albamon was hit by a hacking attack on April 30. The breach exposed the resumes of more than 20,000 users, including names, phone numbers, and email addresses.
    • In April, South Korea’s telecom giant SK Telecom was hit by a major cyberattack. Hackers stole the personal data of about 23 million customers — nearly half the country’s population. Much of the aftermath of the cyberattack lasted through May, in which millions of customers were offered a new SIM card following the breach. 

    June 2025  

    • Yes24, South Korea’s online ticketing and retail platform, was hit by a ransomware attack on June 9, which knocked its services offline. The disruption lasted for about four days, with the company back online by mid-June. 

    July 2025 

    August 2025

    • Yes24 faced a second ransomware attack in August 2025, which took its website and services offline for a few hours. 
    • Hackers broke into South Korean financial services company Lotte Card, which issues credit and debit cards, between July 22 and August. The breach exposed around 200GB of data and is believed to have affected roughly 3 million customers. The breach remained unnoticed for approximately 17 days, until the company discovered it on August 31. 
    • Welcome Financial: In August 2025, Welrix F&I, a lending arm of Welcome Financial Group, was hit by a ransomware attack. A Russian-linked hacking group claimed it stole over a terabyte of internal files, including sensitive customer data, and even leaked samples on the dark web.
    • North Korea-linked hackers, believed to be the Kimsuky group, have been spying on foreign embassies in South Korea for months by disguising their attacks as routine diplomatic emails. According to Trellix, the campaign has been active since March and has targeted at least 19 embassies and foreign ministries in South Korea. 

    September 2025  

    • KT, one of South Korea’s biggest telecom operators, has reported a cyber breach that exposed subscriber data from more than 5,500 customers. The attack was linked to illegal “fake base stations” that tapped into KT’s network, enabling hackers to intercept mobile traffic, steal information like IMSI, IMEI, and phone numbers, and even make unauthorized micro-payments. 

    In light of the recent surge in hacking incidents, the South Korean Presidential Office’s National Security is stepping in to tighten defenses, pushing for a cross-ministerial effort that brings multiple agencies together in a coordinated, whole-of-government response.  

    In September 2025, the National Security Office announced that it would implement “comprehensive” cyber measures through an interagency plan, led by the South Korean president’s office. Regulators also signaled a legal change giving the government power to launch probes at the first sign of hacking — even if companies haven’t filed a report. Both steps aim to address the lack of a first responder that has long hindered South Korea’s cyber defenses. 

    But South Korea’s fragmented system leaves accountability weak, placing all authority in a presidential “control tower” could risk “politicization” and overreach, according to Pak.  

    A better path may be balance: a central body to set strategy and coordinate crises, paired with independent oversight to keep power in check. In a hybrid model, expert agencies like KISA would still handle the technical work — just with more straightforward rules and accountability, Pak told TechCrunch.  

    When reached for comment, a spokesperson for the South Korea’s Ministry of Science in ICT said the ministry, with KISA and other relevant agencies, is “committed to addressing increasingly sophisticated and advanced cyber threats.”  

    “We continue to work diligently to minimize potential harm to Korean businesses and the general public,” the spokesperson added.

    This article was originally published on September 30.

    [ad_2]

    Kate Park

    Source link