by Syndicated News Feed | Mar 25, 2025 | IT Security
Generative AI assistants packaged up as browser extensions harvest personal data with minimal safeguards, researchers warn. Some of these extensions may violate their own privacy commitments and potentially run afoul of US regulations, such as HIPAA and FERPA, by...
by Syndicated News Feed | Mar 24, 2025 | IT Security
The FCC is investigating whether Chinese manufacturers black-listed on its so-called Covered List – including Huawei – are still somehow doing business in America, either by misreading the rules or willfully ignoring them. The US communications regulator...
by Syndicated News Feed | Mar 24, 2025 | IT Security
California-based genetic testing provider 23andMe has filed for Chapter 11 bankruptcy and plans to sell its assets following years of financial struggles. 23andMe has been providing direct-to-consumer DNA testing services since November 2007 to customers who send a...
by Syndicated News Feed | Mar 24, 2025 | IT Security
A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers. Researchers investigating the intrusion found...
by Syndicated News Feed | Mar 24, 2025 | IT Security
Analysis Is the US retreating from its hardline stance on crypto? On Friday, the US Treasury Department lifted sanctions imposed on notorious crypto mixer Tornado Cash, once accused of washing billions in illicit crypto for criminals and nation-states alike. In 2022,...
by Syndicated News Feed | Mar 24, 2025 | IT Security
At MWC 2025, Google confirmed it was working on screen and video share capabilities for Gemini Live, codenamed “Project Astra”. At that time, Google promised that the feature would begin rolling out soon, and now some users have spotted it in the wild....
by Syndicated News Feed | Mar 23, 2025 | IT Security
Asia In Brief China’s Cyberspace Administration and Ministry of Public Security have outlawed the use of facial recognition without consent. The two orgs last Friday published new rules on facial recognition and an explainer that spell out how orgs that want to use...
by Syndicated News Feed | Mar 23, 2025 | IT Security
The FBI is warning that fake online document converters are being used to steal peoples’ information and, in worst-case scenarios, to deploy ransomware on victims’ devices. The warning came last week from the FBI Denver field office, after receiving an...
by Syndicated News Feed | Mar 23, 2025 | IT Security
Interview Russia appears to be having second thoughts on how aggressively, or at least how visibly, it attempts to influence American elections, according to a former head of the NSA. I wonder if the Russians have said to themselves, ‘Look, we think...
by Syndicated News Feed | Mar 22, 2025 | IT Security
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. Threat actors have long sought after code-signing certificates as they can be used to sign malware to appear like they are...