Techno Blender
Digitally Yours.
Browsing Tag

Hacking

The White House Warns Cars Made in China Could Unleash Chaos on US Highways

The US government has launched an investigation into the national security risks posed by foreign-made vehicles with internet connectivity—especially those made in China. At a briefing on Wednesday, Secretary of Commerce Gina Raimondo even raised the specter of Beijing remotely triggering mayhem on US highways.“Imagine if there were thousands or hundreds of thousands of Chinese connected vehicles on American roads that could be immediately and simultaneously disabled by somebody in Beijing,” Raimondo said.The new US…

Epic Games responds to alleged ransomware hack, says there’s zero evidence

In the early hours of this morning, a ransomware group claimed to have hacked into Epic Games, taking personal data, such as names, payment details, and passwords. However, the Fortnite and Unreal studio has since responded to concerns that anyone has gained access to files, saying it’s investigating but hasn’t found any evidence so far. According to the Australian site Cyber Daily, a group calling itself the Mogilevich gang is claiming to have gotten hold of around 189GB of personal information from Epic. Some of the…

OpenAI Accuses the New York Times of ‘Hacking’ ChatGPT

Photo: Stefan Wermuth/Bloomberg (Getty Images)The New York Times is currently suing OpenAI for copyright infringement and claims that the influential tech startup used its journalistic material to train its chatbot, ChatGPT, without paying the proper licensing fees. But Sam Altman’s company is fighting back against these accusations with some accusations of its own. This week, OpenAI claimed that the newspaper had “hacked” its products.Why is Everyone Suing AI Companies? | Future TechIn a legal filing made public this

hacking: China to increase protections against hacking for key industries

China's ministry of industry and information technology (MIIT) unveiled a plan on Monday that aims to improve data security in China's industrial sector and effectively contain "major risks" by the end of 2026.The plan comes at a time when China and the United States both frequently accuse each other of cyberattacks and industrial espionage.Elevate Your Tech Prowess with High-Value Skill CoursesOffering CollegeCourseWebsiteIndian School of BusinessISB Professional Certificate in Product ManagementVisitIIM LucknowIIML…

Your online identity is not as safeguarded as you think—and it’s not o

I’ve been stealing people’s identities for over 20 years.  No, I’m not a criminal—I’m a hacker hired by companies to stress-test the digital identities of their workforce and verify that cybercriminals aren’t able to sneak onto company networks disguised as an employee.But after cracking virtually every login combination you can think of throughout my career, I no longer need to “hack” my way in—instead I can just log in.  For cybercriminals it’s becoming something alarmingly easy to do, too. Last year, most cyberattacks…

Spyware leak offers ‘first-of-its-kind’ look inside Chinese government hacking efforts

Over the weekend, someone posted a cache of files and documents apparently stolen from the Chinese government hacking contractor, I-Soon. This leak gives cybersecurity researchers and rival governments an unprecedented chance to look behind the curtain of Chinese government hacking operations facilitated by private contractors. Like the hack-and-leak operation that targeted the Italian spyware maker Hacking Team in 2015, the I-Soon leak includes company documents and internal communications, which show I-Soon was…

Meet the shadowy companies helping governments hack citizens’ phones

Named for the winged horse of Greek mythology and often sent by text message, Pegasus can burrow into your phone without your knowledge or even your click, hiding for days or weeks inside, surreptitiously recording everything—messages, photos, encrypted chats, and video and audio—in real-time. Exactly where your data is going often remains a mystery, lost in a tangle of servers. But the deadly impacts of Pegasus and other cyberweapons—wielded by governments from Spain to Saudi Arabia against human rights defenders,…

Apple’s reply on device vulnerability not totally clear: Rajeev Chandrasekhar on iPhone alert to MPs

The government is still waiting for a clear reply from iPhone maker Apple on iPhone alert sent to opposition political leaders around five months back on alleged hacking of their devices by state-backed hackers. In an interview to PTI, Minister of State for Electronics and IT Rajeev Chandrasekhar said the government has asked Apple two questions: whether their devices are safe, and if so the reason for the alert was sent to opposition members. "In my humble opinion, this is not something that any proprietary platform will…

Cyberattacks on hospitals are likely to increase, putting lives at risk, experts warn

WASHINGTON (AP) — Cybersecurity experts are warning that hospitals around the country are at risk for attacks like the one that is crippling operations at a premier Midwestern children’s hospital, and that the U.S. government is doing too little to prevent such breaches. Hospitals in recent years have shifted their use of online technology to support everything from telehealth to medical devices to patient records. Today, they are a favorite target for internet thieves who hold systems’ data and networks hostage…

DOJ disrupts Russian hacking campaign that infiltrated homes, small businesses

The Department of Justice (DOJ) announced Thursday that it successfully disrupted a Russian hacking campaign that infiltrated the routers of homes and small business. The department said it “neutralized a network” of hundreds of small office and home office routers in a court-authorized operation. The operations copied and deleted “stolen and malicious” data and files from routers that were compromised, the DOJ said. The crimes included “spearphishing” and other “credential harvesting” campaigns against…