Even security experts can be fooled. In July 2024, Knowbe4, a Florida-based company that offers security training, discovered that a new hire known as “Kyle” was actually a foreign agent. “He interviewed great,” says Brian Jack, KnowBe4’s chief information security officer. “He was on camera, his résumé was right, his …
Read More »AI Code Hallucinations Increase the Risk of ‘Package Confusion’ Attacks
AI-generated computer code is rife with references to non-existent third-party libraries, creating a golden opportunity for supply-chain attacks that poison legitimate programs with malicious packages that can steal data, plant backdoors, and carry out other nefarious actions, newly published research shows. The study, which used 16 of the most widely …
Read More »WhatsApp Is Walking a Tightrope Between AI Features and Privacy
Last year, Apple debuted a similar scheme, known as Private Cloud Compute, for its Apple Intelligence AI platform. And users can turn the service on in Apple’s end-to-end encrypted communication app, Messages, to generate message summaries and compose “Smart Reply” messages on both iPhones and Macs. Looking at Private Cloud …
Read More »Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi
Apple’s AirPlay feature enables iPhones and Macbooks to seamlessly play music or show photos and videos on other Apple devices or third-party speakers and TVs that integrate the protocol. Now newly uncovered security flaws in AirPlay mean that those same wireless connections could allow hackers to move within a network …
Read More »Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show
What is also clear from the documents is that US police are aware of the control corporations have over their ability to acquire vehicle location data, expressing fears that they could abruptly decide to kill off certain capabilities at any time. In a letter sent in April 2024 to the …
Read More »Pete Hegseth’s Signal Scandal Spirals Out of Control
As the Trump administration’s aggressive immigration policy ramps up, people have started to seriously consider their privacy and security when crossing into the United States. That’s especially true when it comes to searches of travelers’ phones and other devices, which US Customs and Border Protection agents have broad authority to …
Read More »Protecting Your Phone—and Your Privacy—at the US Border
Lauren Goode: I think Katie should go first. She’s the boss. Katie Drummond: So as you all know, because I can’t stop talking about it, I recently returned from France, and one thing in particular that I am now pathologically fixated on, that I am recommending to all of you, …
Read More »Gmail’s New Encrypted Messages Feature Opens a Door for Scams
Google announced at the beginning of April that it is launching a streamlined tool that will allow business users to easily send “end-to-end encrypted” emails—an effort to address the longstanding challenge of adding additional security protections to email messages. The feature is currently in beta for enterprise users to try …
Read More »The Tech That Safeguards the Conclave’s Secrecy
In 2005, cell phones were banned for the first time during the conclave, the process by which the Catholic Church elects its new pope. Twenty years later, after the death of Pope Francis, the election process is underway again. Authorities have two priorities: to protect the integrity of those attending …
Read More »How to Protect Yourself From Phone Searches at the US Border
Privacy and digital rights advocates largely prefer the approach of building a travel device from scratch, but they caution that a phone that is too squeaky clean, too much like a burner phone, can arouse suspicion. “You have to ‘seed’ the device. Use the phone for a day or even …
Read More »