Techno Blender
Digitally Yours.
Browsing Tag

Hacking

Meta Abandons Hacking Victims, Draining Law Enforcement Resources, Officials Say

Forty-one state attorneys general penned a letter to Meta’s top attorney on Wednesday saying complaints are skyrocketing across the United States about Facebook and Instagram user accounts being stolen and declaring “immediate action” necessary to mitigate the rolling threat.The coalition of top law enforcement officials, spearheaded by New York attorney general Letitia James, says the “dramatic and persistent spike” in complaints concerning account takeovers amounts to a “substantial drain” on governmental resources, as…

Flipper Zero’s Co-Founder Says the Hacking Tool Is All About Exposing Big Tech’s Shoddy Security

The Flipper Zero may be one of the most versatile, and most controversial keychain-sized devices ever put to market. The device can scan, receive, send, and mimic several types of signals. It can scan NFC and RFID signals used by many common products. It can replicate the frequency used for your workplace’s ID card. It’s a $169 doohickey useful for everyday operations like opening your garage door or pen-testing security systems. It’s also been accused by the Canadian government of being capable of replicating vehicle key…

The White House Warns Cars Made in China Could Unleash Chaos on US Highways

The US government has launched an investigation into the national security risks posed by foreign-made vehicles with internet connectivity—especially those made in China. At a briefing on Wednesday, Secretary of Commerce Gina Raimondo even raised the specter of Beijing remotely triggering mayhem on US highways.“Imagine if there were thousands or hundreds of thousands of Chinese connected vehicles on American roads that could be immediately and simultaneously disabled by somebody in Beijing,” Raimondo said.The new US…

Epic Games responds to alleged ransomware hack, says there’s zero evidence

In the early hours of this morning, a ransomware group claimed to have hacked into Epic Games, taking personal data, such as names, payment details, and passwords. However, the Fortnite and Unreal studio has since responded to concerns that anyone has gained access to files, saying it’s investigating but hasn’t found any evidence so far. According to the Australian site Cyber Daily, a group calling itself the Mogilevich gang is claiming to have gotten hold of around 189GB of personal information from Epic. Some of the…

OpenAI Accuses the New York Times of ‘Hacking’ ChatGPT

Photo: Stefan Wermuth/Bloomberg (Getty Images)The New York Times is currently suing OpenAI for copyright infringement and claims that the influential tech startup used its journalistic material to train its chatbot, ChatGPT, without paying the proper licensing fees. But Sam Altman’s company is fighting back against these accusations with some accusations of its own. This week, OpenAI claimed that the newspaper had “hacked” its products.Why is Everyone Suing AI Companies? | Future TechIn a legal filing made public this

hacking: China to increase protections against hacking for key industries

China's ministry of industry and information technology (MIIT) unveiled a plan on Monday that aims to improve data security in China's industrial sector and effectively contain "major risks" by the end of 2026.The plan comes at a time when China and the United States both frequently accuse each other of cyberattacks and industrial espionage.Elevate Your Tech Prowess with High-Value Skill CoursesOffering CollegeCourseWebsiteIndian School of BusinessISB Professional Certificate in Product ManagementVisitIIM LucknowIIML…

Your online identity is not as safeguarded as you think—and it’s not o

I’ve been stealing people’s identities for over 20 years.  No, I’m not a criminal—I’m a hacker hired by companies to stress-test the digital identities of their workforce and verify that cybercriminals aren’t able to sneak onto company networks disguised as an employee.But after cracking virtually every login combination you can think of throughout my career, I no longer need to “hack” my way in—instead I can just log in.  For cybercriminals it’s becoming something alarmingly easy to do, too. Last year, most cyberattacks…

Spyware leak offers ‘first-of-its-kind’ look inside Chinese government hacking efforts

Over the weekend, someone posted a cache of files and documents apparently stolen from the Chinese government hacking contractor, I-Soon. This leak gives cybersecurity researchers and rival governments an unprecedented chance to look behind the curtain of Chinese government hacking operations facilitated by private contractors. Like the hack-and-leak operation that targeted the Italian spyware maker Hacking Team in 2015, the I-Soon leak includes company documents and internal communications, which show I-Soon was…

Meet the shadowy companies helping governments hack citizens’ phones

Named for the winged horse of Greek mythology and often sent by text message, Pegasus can burrow into your phone without your knowledge or even your click, hiding for days or weeks inside, surreptitiously recording everything—messages, photos, encrypted chats, and video and audio—in real-time. Exactly where your data is going often remains a mystery, lost in a tangle of servers. But the deadly impacts of Pegasus and other cyberweapons—wielded by governments from Spain to Saudi Arabia against human rights defenders,…

Apple’s reply on device vulnerability not totally clear: Rajeev Chandrasekhar on iPhone alert to MPs

The government is still waiting for a clear reply from iPhone maker Apple on iPhone alert sent to opposition political leaders around five months back on alleged hacking of their devices by state-backed hackers. In an interview to PTI, Minister of State for Electronics and IT Rajeev Chandrasekhar said the government has asked Apple two questions: whether their devices are safe, and if so the reason for the alert was sent to opposition members. "In my humble opinion, this is not something that any proprietary platform will…